Results

By type

          2022-10-22 05:00:56,946 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-10-22 05:00:58,183 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-10-22 05:00:59.453  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Oct 22, 2022 5:01:01 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Oct 22, 2022 5:01:01 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Oct 22, 2022 5:01:01 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Oct 22, 2022 5:01:02 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-10-22 05:01:02.584 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-10-22 05:01:02.870  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-10-22 05:01:03.035  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-10-22 05:01:03.782 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-10-22 05:01:03.784 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-10-22 05:01:03.786 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-10-22 05:01:03.789 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-10-22 05:01:03.852 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-10-22 05:01:03.855 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-10-22 05:01:03.984 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-10-22 05:01:05.016 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Oct 22, 2022 5:01:05 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-10-22 05:01:06.147  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 10.659 seconds (JVM running for 12.682)
Oct 22, 2022 5:01:33 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-10-22 05:01:52.861  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-22 05:01:52.876 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-22 05:01:52.920 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-10-22 05:01:52.928 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-22 05:01:52.957  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-10-22 05:01:52.960  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-22 05:01:52.961  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-22 05:01:52.963 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-22 05:01:52.963 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 05:01:52.967 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-22 05:01:52.984 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-22 05:01:52.990 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-22 05:01:53.055 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-22 05:01:53.068 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 05:01:53.069 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 05:01:53.073 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 05:01:53.736  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-22 05:01:53.739  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-22 05:01:53.739 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-22 05:01:53.741 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 05:01:53.751  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-22 05:01:53.752  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-22 05:01:53.753 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 05:01:53.753 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 05:01:53.754 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 05:01:53.773 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 05:01:53.774 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 05:01:53.775 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 05:01:53.781 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 05:01:53.781 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 05:01:53.782 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 05:01:53.783 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-22 05:01:53.820 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 323374953942323490910386849784994853583840888122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 22 04:57:58 UTC 2022
           Final Date: Thu Oct 21 04:57:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4]
        modulus: b1b7a31593af8142da957e1a6966e7caf947512b906e095011ce46bd5f825b51eb72df33596ec69efa3cd0b625ce16f962e8c32a84a05a8a16677198a34828783bc8a5cd002a5b3be43fd902653d119577f3c4a3994f1d8a6dd603befa94ad5f7822c208a4dc515b50febdbeb4c84b248e5362d3c10352dc2f4ae2db03ea7ac62bc75563e51d19d1143e6222f0480723186090554c8f5a4d4b50a0d60ad33f17420b02901af271e045b7261a4de001497a11d50d9a8283e8ab02e4e9155e2bc0f4aa40a99543ee63f4330d219ce6a7f3496688ca08b5a15127c087f223c480ee0d0d8b7a0aabf6459c2ac0ff7ed25eb7840ba02badbfe9f222f6f7c957126cca051c928fac1bafcd3d5ad79b22f33726d1ae17791ec4ca09c72041227aac6f55f41a3c3a0c6e5be3d6caf61a39cdbaba9d2f98155d42a090e78917b93bd1fe2b0ed9760db17d6759bf62e205bdd3ce837e322280e0833577107f6bbce8fd8e2309272aa93b44c1d06389e3b92ba311920a3a190d3f7b0e6846961a9425826a65
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b0a730594681a46de10e3e8d437ead031397abe
                       eef4470c984a5f1d23f8253fd571681db7735df3
                       67d550622562de601abe04b1669033d6afe0f6ec
                       e91e6911092ab8e964714e5d7c3aead951fbba38
                       c9368a2269dd904ea0d4dc945077f9a0b5784fea
                       66c2b302af41d526cf2129847a1b95cb0a146aa7
                       bb016430ecd8237d7ec7e775aefddf2e027c9fa6
                       9ac6506f421df12355ea694e9432531fa86eb801
                       667bbbf7a43c9ee77818c927064ffaf2df963680
                       5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6
                       8f80542760bc8739988a0aa50cdabc5e1fe305cc
                       ee042916f1e8c987caf3a67ca8267f465a1efdf7
                       e1c61c066bf6a5126c3051948f1fedb9b7599eb3
                       635d0885ebad84ea165654986a3680588b65a470
                       97e861b6ee643a216cdc3df67636f24878b8fe85
                       3d484f03c8f2ee971c3f7fd3dedae57b8c6de426
                       431e2620817b1709d127ca33b75d6d80e401f254
                       f2f14a19eccc8da725dbd453a127be64ad41fbae
                       c40364ee6b3501437764f14c9324d75b20765d8f
                       20dea253
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c9:38:0b:f5:72:bf:f3:13:b0:8f:0c:e9:0c:f4:a6:1f:26:a2:ba:e9],[56:66:d1:a4]
        modulus: d5de88e3646a636d0a8375a0fa2e6298733b5d2bc1655693a71140f1494a4900b83e0edcc6d0f709d7538ed36bedd8c1021addb6fd833ee6aebb0f033a6f34e31f6c666d189adb1ceffb0159794d05f123c33957040e1d3be771001c02a95116c7c9cfdc2b0d7d072f8a977d9880f0f28cb978ff7f399cb3f172a2075936e2155cfddf716286b27cfdefffbb3a527e291b0e89de90fbe181d63f18fe19c0579a572fd1b71ab6bbbad8563650507fbdc1ff6846e8fb08587a2c72a85b13218a6911dd89af79ba5bc84f1a8327feb2c5db206a9dc33f9ba25106bfdff6a9987963a5275a2287650ae23a7f81c7657478bbbd2cce26d8f40f711845e8360b3653eb
public exponent: 10001

] 
2022-10-22 06:17:16.061  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-22 06:17:16.065 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-22 06:17:16.068 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-22 06:17:16.069 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-22 06:17:16.070  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-22 06:17:16.071  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-22 06:17:16.071  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-22 06:17:16.072 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-22 06:17:16.072 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-22 06:17:16.073 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-22 06:17:16.078 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-22 06:17:16.079 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 06:17:16.080 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 06:17:16.080 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 06:17:16.289  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-22 06:17:16.290  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-22 06:17:16.291 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-22 06:17:16.291 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 06:17:16.293  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-22 06:17:16.294  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-22 06:17:16.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:17:16.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:17:16.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:17:16.299 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:17:16.299 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:17:16.299 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:17:16.301 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:17:16.301 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:17:16.301 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:17:16.302 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-22 06:17:16.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 323374953942323490910386849784994853583840888122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 22 04:57:58 UTC 2022
           Final Date: Thu Oct 21 04:57:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b0a730594681a46de10e3e8d437ead031397abe
                       eef4470c984a5f1d23f8253fd571681db7735df3
                       67d550622562de601abe04b1669033d6afe0f6ec
                       e91e6911092ab8e964714e5d7c3aead951fbba38
                       c9368a2269dd904ea0d4dc945077f9a0b5784fea
                       66c2b302af41d526cf2129847a1b95cb0a146aa7
                       bb016430ecd8237d7ec7e775aefddf2e027c9fa6
                       9ac6506f421df12355ea694e9432531fa86eb801
                       667bbbf7a43c9ee77818c927064ffaf2df963680
                       5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6
                       8f80542760bc8739988a0aa50cdabc5e1fe305cc
                       ee042916f1e8c987caf3a67ca8267f465a1efdf7
                       e1c61c066bf6a5126c3051948f1fedb9b7599eb3
                       635d0885ebad84ea165654986a3680588b65a470
                       97e861b6ee643a216cdc3df67636f24878b8fe85
                       3d484f03c8f2ee971c3f7fd3dedae57b8c6de426
                       431e2620817b1709d127ca33b75d6d80e401f254
                       f2f14a19eccc8da725dbd453a127be64ad41fbae
                       c40364ee6b3501437764f14c9324d75b20765d8f
                       20dea253
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dd:1b:99:46:e6:72:d8:1a:3e:d2:0b:f0:ec:c7:2a:eb:76:b8:55:a1],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-22 06:19:03.641  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-22 06:19:03.644 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-22 06:19:03.646 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-10-22 06:19:03.647 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-22 06:19:03.648  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-10-22 06:19:03.649  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-22 06:19:03.650  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-22 06:19:03.651 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-22 06:19:03.651 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-22 06:19:03.652 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-22 06:19:03.659 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-22 06:19:03.660 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 06:19:03.660 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 06:19:03.661 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 06:19:03.836  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-22 06:19:03.837  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-22 06:19:03.838 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-22 06:19:03.838 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 06:19:03.841  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-22 06:19:03.842  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-22 06:19:03.842 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:19:03.842 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:19:03.843 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:19:03.844 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:19:03.845 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:19:03.845 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:19:03.846 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:19:03.847 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:19:03.847 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:19:03.848 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-22 06:19:03.852 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 323374953942323490910386849784994853583840888122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 22 04:57:58 UTC 2022
           Final Date: Thu Oct 21 04:57:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b0a730594681a46de10e3e8d437ead031397abe
                       eef4470c984a5f1d23f8253fd571681db7735df3
                       67d550622562de601abe04b1669033d6afe0f6ec
                       e91e6911092ab8e964714e5d7c3aead951fbba38
                       c9368a2269dd904ea0d4dc945077f9a0b5784fea
                       66c2b302af41d526cf2129847a1b95cb0a146aa7
                       bb016430ecd8237d7ec7e775aefddf2e027c9fa6
                       9ac6506f421df12355ea694e9432531fa86eb801
                       667bbbf7a43c9ee77818c927064ffaf2df963680
                       5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6
                       8f80542760bc8739988a0aa50cdabc5e1fe305cc
                       ee042916f1e8c987caf3a67ca8267f465a1efdf7
                       e1c61c066bf6a5126c3051948f1fedb9b7599eb3
                       635d0885ebad84ea165654986a3680588b65a470
                       97e861b6ee643a216cdc3df67636f24878b8fe85
                       3d484f03c8f2ee971c3f7fd3dedae57b8c6de426
                       431e2620817b1709d127ca33b75d6d80e401f254
                       f2f14a19eccc8da725dbd453a127be64ad41fbae
                       c40364ee6b3501437764f14c9324d75b20765d8f
                       20dea253
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fa:0b:f8:52:2f:c2:b7:1c:dc:1b:cb:a3:8a:ef:ad:11:7c:2d:6b:d9],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-22 06:20:13.636  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-22 06:20:13.638 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-22 06:20:13.639 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-10-22 06:20:13.640 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-22 06:20:13.640  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-10-22 06:20:13.641  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-22 06:20:13.641  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-22 06:20:13.642 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-22 06:20:13.642 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-22 06:20:13.643 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-22 06:20:13.647 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-22 06:20:13.647 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 06:20:13.648 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 06:20:13.648 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 06:20:13.803  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-22 06:20:13.804  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-22 06:20:13.805 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-22 06:20:13.805 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 06:20:13.811  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-22 06:20:13.811  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-22 06:20:13.812 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:20:13.813 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:20:13.813 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:20:13.815 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:20:13.815 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:20:13.816 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:20:13.818 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:20:13.818 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:20:13.819 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:20:13.821 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-22 06:20:13.829 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 323374953942323490910386849784994853583840888122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 22 04:57:58 UTC 2022
           Final Date: Thu Oct 21 04:57:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4]
        modulus: b1b7a31593af8142da957e1a6966e7caf947512b906e095011ce46bd5f825b51eb72df33596ec69efa3cd0b625ce16f962e8c32a84a05a8a16677198a34828783bc8a5cd002a5b3be43fd902653d119577f3c4a3994f1d8a6dd603befa94ad5f7822c208a4dc515b50febdbeb4c84b248e5362d3c10352dc2f4ae2db03ea7ac62bc75563e51d19d1143e6222f0480723186090554c8f5a4d4b50a0d60ad33f17420b02901af271e045b7261a4de001497a11d50d9a8283e8ab02e4e9155e2bc0f4aa40a99543ee63f4330d219ce6a7f3496688ca08b5a15127c087f223c480ee0d0d8b7a0aabf6459c2ac0ff7ed25eb7840ba02badbfe9f222f6f7c957126cca051c928fac1bafcd3d5ad79b22f33726d1ae17791ec4ca09c72041227aac6f55f41a3c3a0c6e5be3d6caf61a39cdbaba9d2f98155d42a090e78917b93bd1fe2b0ed9760db17d6759bf62e205bdd3ce837e322280e0833577107f6bbce8fd8e2309272aa93b44c1d06389e3b92ba311920a3a190d3f7b0e6846961a9425826a65
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b0a730594681a46de10e3e8d437ead031397abe
                       eef4470c984a5f1d23f8253fd571681db7735df3
                       67d550622562de601abe04b1669033d6afe0f6ec
                       e91e6911092ab8e964714e5d7c3aead951fbba38
                       c9368a2269dd904ea0d4dc945077f9a0b5784fea
                       66c2b302af41d526cf2129847a1b95cb0a146aa7
                       bb016430ecd8237d7ec7e775aefddf2e027c9fa6
                       9ac6506f421df12355ea694e9432531fa86eb801
                       667bbbf7a43c9ee77818c927064ffaf2df963680
                       5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6
                       8f80542760bc8739988a0aa50cdabc5e1fe305cc
                       ee042916f1e8c987caf3a67ca8267f465a1efdf7
                       e1c61c066bf6a5126c3051948f1fedb9b7599eb3
                       635d0885ebad84ea165654986a3680588b65a470
                       97e861b6ee643a216cdc3df67636f24878b8fe85
                       3d484f03c8f2ee971c3f7fd3dedae57b8c6de426
                       431e2620817b1709d127ca33b75d6d80e401f254
                       f2f14a19eccc8da725dbd453a127be64ad41fbae
                       c40364ee6b3501437764f14c9324d75b20765d8f
                       20dea253
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a5:b5:09:92:dd:81:d0:d9:8a:b9:0f:dd:0c:3d:ac:58:95:98:37:aa],[56:66:d1:a4]
        modulus: c2c136db0ca2c30b95fd484c31c3fdfa8124ffbf06946d0d37586fb1acb56201b33abab837a69f3b088b347dad99f082c0b0768cb8af7b5e394e28eaa22601785fd39c2aa4eb6047137cf3a02d68ab4e8d75511822ff7fbc5eaad76450d7401cf8883b90bcc3d8cc1b90f6211afc8ccb5ed0140457ad0d541531da196bcc5055f81796dd423509970722597dd664ea108b852098588fd95cf0cde3e3d2d09dc433898b84f2f89794bb05c703dadb191d7d414fb1b3c3d43634310ea35e1e4dfe1983c44e84303db64d0e71e3578893834a8c36abffac8a54c94dafbe5ed35607ff6fb8045218e486f0fb2b1e4165bd2eade14b1fd49d803bf989d35aa801a7bf
public exponent: 10001

] 
2022-10-22 06:22:16.828  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-22 06:22:16.833 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-22 06:22:16.837 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-22 06:22:16.838 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-22 06:22:16.839  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-22 06:22:16.840  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-22 06:22:16.841  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-22 06:22:16.842 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-22 06:22:16.843 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-22 06:22:16.844 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-22 06:22:16.849 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-22 06:22:16.851 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 06:22:16.851 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 06:22:16.852 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 06:22:17.007  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-22 06:22:17.009  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-22 06:22:17.009 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-22 06:22:17.010 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 06:22:17.013  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-22 06:22:17.014  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-22 06:22:17.023 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:22:17.024 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:22:17.024 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:22:17.026 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:22:17.026 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:22:17.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:22:17.036 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:22:17.040 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:22:17.040 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:22:17.042 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-22 06:22:17.048 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 323374953942323490910386849784994853583840888122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 22 04:57:58 UTC 2022
           Final Date: Thu Oct 21 04:57:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b0a730594681a46de10e3e8d437ead031397abe
                       eef4470c984a5f1d23f8253fd571681db7735df3
                       67d550622562de601abe04b1669033d6afe0f6ec
                       e91e6911092ab8e964714e5d7c3aead951fbba38
                       c9368a2269dd904ea0d4dc945077f9a0b5784fea
                       66c2b302af41d526cf2129847a1b95cb0a146aa7
                       bb016430ecd8237d7ec7e775aefddf2e027c9fa6
                       9ac6506f421df12355ea694e9432531fa86eb801
                       667bbbf7a43c9ee77818c927064ffaf2df963680
                       5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6
                       8f80542760bc8739988a0aa50cdabc5e1fe305cc
                       ee042916f1e8c987caf3a67ca8267f465a1efdf7
                       e1c61c066bf6a5126c3051948f1fedb9b7599eb3
                       635d0885ebad84ea165654986a3680588b65a470
                       97e861b6ee643a216cdc3df67636f24878b8fe85
                       3d484f03c8f2ee971c3f7fd3dedae57b8c6de426
                       431e2620817b1709d127ca33b75d6d80e401f254
                       f2f14a19eccc8da725dbd453a127be64ad41fbae
                       c40364ee6b3501437764f14c9324d75b20765d8f
                       20dea253
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c6:ae:09:ad:1e:fb:0a:32:e5:5a:e6:51:9d:59:39:72:a5:14:87:3a],[56:66:d1:a4]
        modulus: bd658ce47610e8fe87622801a622fffb98696950b8c04bb09431c17786e01e00f38f6093611b17beec79d235b8519d21eaba0892be63d051393b3040ae8ce337fa20a7088788b17b1d024e723981d136e00b1ba61154882be0182771a78b07ee9a156548b8e337480d39dcc19e26e10226003691b36908ffa3f87ec33afe3289e7d29ebea0ba1998cf2e004d1b63f9278b6e884241f3eb2e78a223b67c52d2881d47f4172d60f2255a15fb8d23e7a93554f25585481576eaeb375ddadc89f52ad13e4a898e41d07e6630b93502a5cfcf1d6b0e64f86530552909b1b50527fbed43b7e42ecbd3e0769d3c6f94dd7e6d77da381a0ab0de232c68ffa9609a61f8c9
public exponent: 10001

] 
2022-10-22 06:31:18.034  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-22 06:31:18.039 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-22 06:31:18.043 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-10-22 06:31:18.045 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-22 06:31:18.046  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-10-22 06:31:18.048  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-22 06:31:18.049  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-22 06:31:18.050 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-22 06:31:18.050 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-22 06:31:18.051 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-22 06:31:18.070 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-22 06:31:18.073 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 06:31:18.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 06:31:18.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 06:31:18.231  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-22 06:31:18.232  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-22 06:31:18.232 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-22 06:31:18.233 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 06:31:18.234  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-22 06:31:18.235  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-22 06:31:18.236 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:31:18.236 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:31:18.236 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:31:18.238 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:31:18.238 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:31:18.238 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:31:18.239 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:31:18.240 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:31:18.240 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:31:18.241 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-22 06:31:18.245 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 323374953942323490910386849784994853583840888122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 22 04:57:58 UTC 2022
           Final Date: Thu Oct 21 04:57:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b0a730594681a46de10e3e8d437ead031397abe
                       eef4470c984a5f1d23f8253fd571681db7735df3
                       67d550622562de601abe04b1669033d6afe0f6ec
                       e91e6911092ab8e964714e5d7c3aead951fbba38
                       c9368a2269dd904ea0d4dc945077f9a0b5784fea
                       66c2b302af41d526cf2129847a1b95cb0a146aa7
                       bb016430ecd8237d7ec7e775aefddf2e027c9fa6
                       9ac6506f421df12355ea694e9432531fa86eb801
                       667bbbf7a43c9ee77818c927064ffaf2df963680
                       5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6
                       8f80542760bc8739988a0aa50cdabc5e1fe305cc
                       ee042916f1e8c987caf3a67ca8267f465a1efdf7
                       e1c61c066bf6a5126c3051948f1fedb9b7599eb3
                       635d0885ebad84ea165654986a3680588b65a470
                       97e861b6ee643a216cdc3df67636f24878b8fe85
                       3d484f03c8f2ee971c3f7fd3dedae57b8c6de426
                       431e2620817b1709d127ca33b75d6d80e401f254
                       f2f14a19eccc8da725dbd453a127be64ad41fbae
                       c40364ee6b3501437764f14c9324d75b20765d8f
                       20dea253
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f7:e0:ae:8a:e5:80:3d:25:c4:f7:28:4b:d6:dc:bb:fd:31:f0:2e:c4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-22 06:36:02.787  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-22 06:36:02.791 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-22 06:36:02.795 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-22 06:36:02.796 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-22 06:36:02.797  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-22 06:36:02.798  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-22 06:36:02.799  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-22 06:36:02.800 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-22 06:36:02.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-22 06:36:02.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-22 06:36:02.806 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-22 06:36:02.807 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 06:36:02.808 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 06:36:02.808 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 06:36:02.987  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-22 06:36:02.989  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-22 06:36:02.989 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-22 06:36:02.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 06:36:02.992  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-22 06:36:02.993  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-22 06:36:02.994 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:36:02.995 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:36:02.996 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:36:02.999 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:36:03.000 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:36:03.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:36:03.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:36:03.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:36:03.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:36:03.006 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-22 06:36:03.010 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 323374953942323490910386849784994853583840888122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 22 04:57:58 UTC 2022
           Final Date: Thu Oct 21 04:57:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b0a730594681a46de10e3e8d437ead031397abe
                       eef4470c984a5f1d23f8253fd571681db7735df3
                       67d550622562de601abe04b1669033d6afe0f6ec
                       e91e6911092ab8e964714e5d7c3aead951fbba38
                       c9368a2269dd904ea0d4dc945077f9a0b5784fea
                       66c2b302af41d526cf2129847a1b95cb0a146aa7
                       bb016430ecd8237d7ec7e775aefddf2e027c9fa6
                       9ac6506f421df12355ea694e9432531fa86eb801
                       667bbbf7a43c9ee77818c927064ffaf2df963680
                       5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6
                       8f80542760bc8739988a0aa50cdabc5e1fe305cc
                       ee042916f1e8c987caf3a67ca8267f465a1efdf7
                       e1c61c066bf6a5126c3051948f1fedb9b7599eb3
                       635d0885ebad84ea165654986a3680588b65a470
                       97e861b6ee643a216cdc3df67636f24878b8fe85
                       3d484f03c8f2ee971c3f7fd3dedae57b8c6de426
                       431e2620817b1709d127ca33b75d6d80e401f254
                       f2f14a19eccc8da725dbd453a127be64ad41fbae
                       c40364ee6b3501437764f14c9324d75b20765d8f
                       20dea253
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [74:e3:ea:ef:99:48:37:8b:b5:8e:ad:be:e0:18:d7:81:31:f6:2b:af],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-22 06:36:22.378  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-22 06:36:22.380 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-22 06:36:22.381 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-22 06:36:22.382 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-22 06:36:22.385  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-22 06:36:22.385  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-22 06:36:22.386  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-22 06:36:22.386 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-22 06:36:22.387 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-22 06:36:22.392 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-22 06:36:22.396 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-22 06:36:22.404 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 06:36:22.405 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 06:36:22.405 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 06:36:22.529  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-22 06:36:22.529  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-22 06:36:22.530 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-22 06:36:22.531 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 06:36:22.533  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-22 06:36:22.534  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-22 06:36:22.537 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:36:22.537 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:36:22.540 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:36:22.541 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:36:22.541 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:36:22.545 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:36:22.546 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:36:22.546 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:36:22.547 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:36:22.547 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-22 06:36:22.552 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 323374953942323490910386849784994853583840888122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 22 04:57:58 UTC 2022
           Final Date: Thu Oct 21 04:57:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4]
        modulus: b1b7a31593af8142da957e1a6966e7caf947512b906e095011ce46bd5f825b51eb72df33596ec69efa3cd0b625ce16f962e8c32a84a05a8a16677198a34828783bc8a5cd002a5b3be43fd902653d119577f3c4a3994f1d8a6dd603befa94ad5f7822c208a4dc515b50febdbeb4c84b248e5362d3c10352dc2f4ae2db03ea7ac62bc75563e51d19d1143e6222f0480723186090554c8f5a4d4b50a0d60ad33f17420b02901af271e045b7261a4de001497a11d50d9a8283e8ab02e4e9155e2bc0f4aa40a99543ee63f4330d219ce6a7f3496688ca08b5a15127c087f223c480ee0d0d8b7a0aabf6459c2ac0ff7ed25eb7840ba02badbfe9f222f6f7c957126cca051c928fac1bafcd3d5ad79b22f33726d1ae17791ec4ca09c72041227aac6f55f41a3c3a0c6e5be3d6caf61a39cdbaba9d2f98155d42a090e78917b93bd1fe2b0ed9760db17d6759bf62e205bdd3ce837e322280e0833577107f6bbce8fd8e2309272aa93b44c1d06389e3b92ba311920a3a190d3f7b0e6846961a9425826a65
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b0a730594681a46de10e3e8d437ead031397abe
                       eef4470c984a5f1d23f8253fd571681db7735df3
                       67d550622562de601abe04b1669033d6afe0f6ec
                       e91e6911092ab8e964714e5d7c3aead951fbba38
                       c9368a2269dd904ea0d4dc945077f9a0b5784fea
                       66c2b302af41d526cf2129847a1b95cb0a146aa7
                       bb016430ecd8237d7ec7e775aefddf2e027c9fa6
                       9ac6506f421df12355ea694e9432531fa86eb801
                       667bbbf7a43c9ee77818c927064ffaf2df963680
                       5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6
                       8f80542760bc8739988a0aa50cdabc5e1fe305cc
                       ee042916f1e8c987caf3a67ca8267f465a1efdf7
                       e1c61c066bf6a5126c3051948f1fedb9b7599eb3
                       635d0885ebad84ea165654986a3680588b65a470
                       97e861b6ee643a216cdc3df67636f24878b8fe85
                       3d484f03c8f2ee971c3f7fd3dedae57b8c6de426
                       431e2620817b1709d127ca33b75d6d80e401f254
                       f2f14a19eccc8da725dbd453a127be64ad41fbae
                       c40364ee6b3501437764f14c9324d75b20765d8f
                       20dea253
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [30:fd:3e:a2:0d:ff:ac:aa:bc:d6:e4:6a:49:a0:95:45:02:11:d9:22],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-22 06:54:51.897  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-22 06:54:51.900 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-22 06:54:51.903 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-22 06:54:51.904 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-22 06:54:51.905  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-22 06:54:51.906  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-22 06:54:51.906  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-22 06:54:51.907 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-22 06:54:51.907 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-22 06:54:51.908 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-22 06:54:51.914 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-22 06:54:51.915 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 06:54:51.916 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 06:54:51.916 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 06:54:52.161  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-22 06:54:52.162  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-22 06:54:52.162 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-22 06:54:52.163 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 06:54:52.164  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-22 06:54:52.164  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-22 06:54:52.165 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:54:52.165 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:54:52.166 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:54:52.167 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:54:52.167 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:54:52.167 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:54:52.172 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:54:52.173 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:54:52.173 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:54:52.174 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-22 06:54:52.177 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 323374953942323490910386849784994853583840888122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 22 04:57:58 UTC 2022
           Final Date: Thu Oct 21 04:57:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b0a730594681a46de10e3e8d437ead031397abe
                       eef4470c984a5f1d23f8253fd571681db7735df3
                       67d550622562de601abe04b1669033d6afe0f6ec
                       e91e6911092ab8e964714e5d7c3aead951fbba38
                       c9368a2269dd904ea0d4dc945077f9a0b5784fea
                       66c2b302af41d526cf2129847a1b95cb0a146aa7
                       bb016430ecd8237d7ec7e775aefddf2e027c9fa6
                       9ac6506f421df12355ea694e9432531fa86eb801
                       667bbbf7a43c9ee77818c927064ffaf2df963680
                       5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6
                       8f80542760bc8739988a0aa50cdabc5e1fe305cc
                       ee042916f1e8c987caf3a67ca8267f465a1efdf7
                       e1c61c066bf6a5126c3051948f1fedb9b7599eb3
                       635d0885ebad84ea165654986a3680588b65a470
                       97e861b6ee643a216cdc3df67636f24878b8fe85
                       3d484f03c8f2ee971c3f7fd3dedae57b8c6de426
                       431e2620817b1709d127ca33b75d6d80e401f254
                       f2f14a19eccc8da725dbd453a127be64ad41fbae
                       c40364ee6b3501437764f14c9324d75b20765d8f
                       20dea253
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:10:c1:57:a6:63:44:6b:1f:40:df:01:ff:e5:ad:7b:37:ee:ab:7c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-22 06:55:08.766  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-22 06:55:08.767 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-22 06:55:08.769 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-22 06:55:08.769 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-22 06:55:08.770  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-22 06:55:08.770  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-22 06:55:08.771  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-22 06:55:08.772 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-22 06:55:08.772 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-22 06:55:08.772 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-22 06:55:08.777 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-22 06:55:08.777 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 06:55:08.778 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-22 06:55:08.778 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 06:55:09.039  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-22 06:55:09.040  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-22 06:55:09.040 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-22 06:55:09.041 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-22 06:55:09.042  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-22 06:55:09.043  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-22 06:55:09.043 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:55:09.044 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:55:09.044 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:55:09.045 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:55:09.045 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:55:09.045 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:55:09.046 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-22 06:55:09.046 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-22 06:55:09.047 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-22 06:55:09.047 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-22 06:55:09.050 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 323374953942323490910386849784994853583840888122
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 22 04:57:58 UTC 2022
           Final Date: Thu Oct 21 04:57:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4]
        modulus: b1b7a31593af8142da957e1a6966e7caf947512b906e095011ce46bd5f825b51eb72df33596ec69efa3cd0b625ce16f962e8c32a84a05a8a16677198a34828783bc8a5cd002a5b3be43fd902653d119577f3c4a3994f1d8a6dd603befa94ad5f7822c208a4dc515b50febdbeb4c84b248e5362d3c10352dc2f4ae2db03ea7ac62bc75563e51d19d1143e6222f0480723186090554c8f5a4d4b50a0d60ad33f17420b02901af271e045b7261a4de001497a11d50d9a8283e8ab02e4e9155e2bc0f4aa40a99543ee63f4330d219ce6a7f3496688ca08b5a15127c087f223c480ee0d0d8b7a0aabf6459c2ac0ff7ed25eb7840ba02badbfe9f222f6f7c957126cca051c928fac1bafcd3d5ad79b22f33726d1ae17791ec4ca09c72041227aac6f55f41a3c3a0c6e5be3d6caf61a39cdbaba9d2f98155d42a090e78917b93bd1fe2b0ed9760db17d6759bf62e205bdd3ce837e322280e0833577107f6bbce8fd8e2309272aa93b44c1d06389e3b92ba311920a3a190d3f7b0e6846961a9425826a65
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b0a730594681a46de10e3e8d437ead031397abe
                       eef4470c984a5f1d23f8253fd571681db7735df3
                       67d550622562de601abe04b1669033d6afe0f6ec
                       e91e6911092ab8e964714e5d7c3aead951fbba38
                       c9368a2269dd904ea0d4dc945077f9a0b5784fea
                       66c2b302af41d526cf2129847a1b95cb0a146aa7
                       bb016430ecd8237d7ec7e775aefddf2e027c9fa6
                       9ac6506f421df12355ea694e9432531fa86eb801
                       667bbbf7a43c9ee77818c927064ffaf2df963680
                       5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6
                       8f80542760bc8739988a0aa50cdabc5e1fe305cc
                       ee042916f1e8c987caf3a67ca8267f465a1efdf7
                       e1c61c066bf6a5126c3051948f1fedb9b7599eb3
                       635d0885ebad84ea165654986a3680588b65a470
                       97e861b6ee643a216cdc3df67636f24878b8fe85
                       3d484f03c8f2ee971c3f7fd3dedae57b8c6de426
                       431e2620817b1709d127ca33b75d6d80e401f254
                       f2f14a19eccc8da725dbd453a127be64ad41fbae
                       c40364ee6b3501437764f14c9324d75b20765d8f
                       20dea253
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f5:c3:33:98:2f:20:52:4e:37:32:f3:4d:76:f6:20:cf:44:39:b8:ee],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]