Results

By type

          2022-11-12 05:03:12,065 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-12 05:03:13,027 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-12 05:03:13.827  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 12, 2022 5:03:15 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 12, 2022 5:03:15 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 12, 2022 5:03:15 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 12, 2022 5:03:15 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-12 05:03:16.444 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-12 05:03:16.726  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-12 05:03:16.898  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-12 05:03:17.696 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-12 05:03:17.699 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-11-12 05:03:17.700 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-12 05:03:17.704 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-12 05:03:17.745 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-12 05:03:17.749 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-11-12 05:03:17.877 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-12 05:03:18.650 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 12, 2022 5:03:19 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-12 05:03:19.737  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.476 seconds (JVM running for 10.365)
Nov 12, 2022 5:03:44 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-12 05:04:00.453  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-12 05:04:00.461 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-12 05:04:00.510 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-12 05:04:00.515 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-12 05:04:00.530  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-12 05:04:00.532  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-12 05:04:00.533  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-12 05:04:00.534 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-12 05:04:00.535 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 05:04:00.541 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-12 05:04:00.555 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-12 05:04:00.558 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-12 05:04:00.618 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-12 05:04:00.625 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 05:04:00.627 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 05:04:00.637 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 05:04:01.465  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-12 05:04:01.467  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-12 05:04:01.467 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-12 05:04:01.469 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 05:04:01.478  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-12 05:04:01.479  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-12 05:04:01.480 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 05:04:01.480 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 05:04:01.480 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 05:04:01.495 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 05:04:01.496 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 05:04:01.496 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 05:04:01.501 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 05:04:01.502 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 05:04:01.502 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 05:04:01.503 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-12 05:04:01.543 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 665432390982186298299782860940689282063413649811
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 12 04:59:46 UTC 2022
           Final Date: Thu Nov 11 04:59:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4]
        modulus: e3d925df21100bbca82ad8faebd38196225f98ac8f2ae7947a22dc29f7abd96de6963ae23c0fa1641e47c6aa8a41099189e870196110d277062d1c15b391f4dbb689682f12e6f624c9bb66628649323fe5096c9c68d7ed6938c271872d6ba4aee9ae1d53a6f85a55ca9dd647b1b13a8716acdc7e0df4ab9368768f8c2b4d832099191fe9cf60a623f89735e2e931f5d014b1d711ef8af45b03a78b92c6e08f425878ab06bbdbf70fefc46429b33f2561dbc53cd13e3ad126dfa12af80dd29a034280be9bc311e449b398ec649a431f4920d31b181116a96979f2172052fee2137ef2a70f29abf168924dcca93a81d1e312f61af56525a093b3179e50b3b72dee3086bdae1d69140ca06acb5a47f6c43d2c980a42290d012b23d5c7681b1b46c5f10f4c5a15d57cf65ee830dcfc1b23d8d03398e3cab4053d0cece0720ce708453542782872754534390307199411ec38c9e8e2f83c886b618cdc5008e2695e3c06ff28d78b498e28d539f277cfa49ee636449ac05bd24b9ab4eca6ef83e43d41
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f
                       86fbcba0d303480c34ece797cb1c4137d2f52817
                       02f99871823111a148ed78e3e2a2e17698964c3d
                       eed7d5759e0068eef1420268b58cf523e66cbe45
                       00f918b66d8278436aba0564d9310557469d13b5
                       967a73ada171a2a3ea01ee3249114e68f6b17936
                       baec494bf61a4f1cca7e6c431f50f2176041c7aa
                       4d9807f829990e76eb5bb921c20832557f1789bd
                       789294702782f4f9ac6ee685f3cb2a781b62e73f
                       1e6371b7a2b40600ede739de923a633a110c0bc0
                       c68e87f198ec80bf25169fb08480869e7796a471
                       09ce3829116b8301117868f780d1cda5302f699f
                       14ac820a80bb8f1266b06ab43d1880e35a1e4072
                       1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f
                       edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7
                       9430fb09d42f250e2c504ac0e8b24f41023e60bd
                       197c85adcc3ddc2feaa94d0abecf95b216a8288c
                       41831a67cba188e78b9d76bbe9d496ab92342e9f
                       d732f6c929bec6ee8906e305dcca7c9af013b001
                       f03e29b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [69:c4:98:23:03:bc:27:b2:1e:77:92:3f:83:db:6d:99:54:96:e9:99],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-12 06:24:30.054  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-12 06:24:30.059 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-12 06:24:30.065 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-12 06:24:30.067 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-12 06:24:30.068  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-12 06:24:30.070  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-12 06:24:30.071  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-12 06:24:30.072 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-12 06:24:30.073 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-12 06:24:30.074 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-12 06:24:30.101 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-12 06:24:30.114 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 06:24:30.114 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 06:24:30.115 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 06:24:30.332  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-12 06:24:30.333  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-12 06:24:30.334 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-12 06:24:30.334 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 06:24:30.337  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-12 06:24:30.338  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-12 06:24:30.339 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:24:30.339 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:24:30.340 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:24:30.341 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:24:30.342 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:24:30.343 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:24:30.344 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:24:30.345 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:24:30.345 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:24:30.346 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-12 06:24:30.351 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 665432390982186298299782860940689282063413649811
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 12 04:59:46 UTC 2022
           Final Date: Thu Nov 11 04:59:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4]
        modulus: e3d925df21100bbca82ad8faebd38196225f98ac8f2ae7947a22dc29f7abd96de6963ae23c0fa1641e47c6aa8a41099189e870196110d277062d1c15b391f4dbb689682f12e6f624c9bb66628649323fe5096c9c68d7ed6938c271872d6ba4aee9ae1d53a6f85a55ca9dd647b1b13a8716acdc7e0df4ab9368768f8c2b4d832099191fe9cf60a623f89735e2e931f5d014b1d711ef8af45b03a78b92c6e08f425878ab06bbdbf70fefc46429b33f2561dbc53cd13e3ad126dfa12af80dd29a034280be9bc311e449b398ec649a431f4920d31b181116a96979f2172052fee2137ef2a70f29abf168924dcca93a81d1e312f61af56525a093b3179e50b3b72dee3086bdae1d69140ca06acb5a47f6c43d2c980a42290d012b23d5c7681b1b46c5f10f4c5a15d57cf65ee830dcfc1b23d8d03398e3cab4053d0cece0720ce708453542782872754534390307199411ec38c9e8e2f83c886b618cdc5008e2695e3c06ff28d78b498e28d539f277cfa49ee636449ac05bd24b9ab4eca6ef83e43d41
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f
                       86fbcba0d303480c34ece797cb1c4137d2f52817
                       02f99871823111a148ed78e3e2a2e17698964c3d
                       eed7d5759e0068eef1420268b58cf523e66cbe45
                       00f918b66d8278436aba0564d9310557469d13b5
                       967a73ada171a2a3ea01ee3249114e68f6b17936
                       baec494bf61a4f1cca7e6c431f50f2176041c7aa
                       4d9807f829990e76eb5bb921c20832557f1789bd
                       789294702782f4f9ac6ee685f3cb2a781b62e73f
                       1e6371b7a2b40600ede739de923a633a110c0bc0
                       c68e87f198ec80bf25169fb08480869e7796a471
                       09ce3829116b8301117868f780d1cda5302f699f
                       14ac820a80bb8f1266b06ab43d1880e35a1e4072
                       1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f
                       edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7
                       9430fb09d42f250e2c504ac0e8b24f41023e60bd
                       197c85adcc3ddc2feaa94d0abecf95b216a8288c
                       41831a67cba188e78b9d76bbe9d496ab92342e9f
                       d732f6c929bec6ee8906e305dcca7c9af013b001
                       f03e29b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [91:66:46:3b:f7:46:17:53:6b:ef:da:b1:b0:c8:67:7d:71:87:ad:2f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-12 06:26:02.167  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-12 06:26:02.170 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-12 06:26:02.172 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-12 06:26:02.173 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-12 06:26:02.173  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-12 06:26:02.174  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-12 06:26:02.175  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-12 06:26:02.175 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-12 06:26:02.176 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-12 06:26:02.177 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-12 06:26:02.182 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-12 06:26:02.182 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 06:26:02.183 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 06:26:02.183 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 06:26:02.345  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-12 06:26:02.346  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-12 06:26:02.347 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-12 06:26:02.347 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 06:26:02.350  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-12 06:26:02.350  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-12 06:26:02.351 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:26:02.351 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:26:02.352 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:26:02.353 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:26:02.353 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:26:02.354 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:26:02.355 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:26:02.355 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:26:02.356 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:26:02.357 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-12 06:26:02.361 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 665432390982186298299782860940689282063413649811
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 12 04:59:46 UTC 2022
           Final Date: Thu Nov 11 04:59:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4]
        modulus: e3d925df21100bbca82ad8faebd38196225f98ac8f2ae7947a22dc29f7abd96de6963ae23c0fa1641e47c6aa8a41099189e870196110d277062d1c15b391f4dbb689682f12e6f624c9bb66628649323fe5096c9c68d7ed6938c271872d6ba4aee9ae1d53a6f85a55ca9dd647b1b13a8716acdc7e0df4ab9368768f8c2b4d832099191fe9cf60a623f89735e2e931f5d014b1d711ef8af45b03a78b92c6e08f425878ab06bbdbf70fefc46429b33f2561dbc53cd13e3ad126dfa12af80dd29a034280be9bc311e449b398ec649a431f4920d31b181116a96979f2172052fee2137ef2a70f29abf168924dcca93a81d1e312f61af56525a093b3179e50b3b72dee3086bdae1d69140ca06acb5a47f6c43d2c980a42290d012b23d5c7681b1b46c5f10f4c5a15d57cf65ee830dcfc1b23d8d03398e3cab4053d0cece0720ce708453542782872754534390307199411ec38c9e8e2f83c886b618cdc5008e2695e3c06ff28d78b498e28d539f277cfa49ee636449ac05bd24b9ab4eca6ef83e43d41
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f
                       86fbcba0d303480c34ece797cb1c4137d2f52817
                       02f99871823111a148ed78e3e2a2e17698964c3d
                       eed7d5759e0068eef1420268b58cf523e66cbe45
                       00f918b66d8278436aba0564d9310557469d13b5
                       967a73ada171a2a3ea01ee3249114e68f6b17936
                       baec494bf61a4f1cca7e6c431f50f2176041c7aa
                       4d9807f829990e76eb5bb921c20832557f1789bd
                       789294702782f4f9ac6ee685f3cb2a781b62e73f
                       1e6371b7a2b40600ede739de923a633a110c0bc0
                       c68e87f198ec80bf25169fb08480869e7796a471
                       09ce3829116b8301117868f780d1cda5302f699f
                       14ac820a80bb8f1266b06ab43d1880e35a1e4072
                       1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f
                       edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7
                       9430fb09d42f250e2c504ac0e8b24f41023e60bd
                       197c85adcc3ddc2feaa94d0abecf95b216a8288c
                       41831a67cba188e78b9d76bbe9d496ab92342e9f
                       d732f6c929bec6ee8906e305dcca7c9af013b001
                       f03e29b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f1:73:c4:48:32:3a:d4:31:15:38:c0:dd:41:76:1d:33:3e:34:e8:a2],[56:66:d1:a4]
        modulus: e379e32b80a68fef117b6c294e708c3e46aa1557e235f747e2a4b8183d6b7238beae0f4687f9a1c71880c8ac53a8681c2ccda30de0fee9c5fbf22cb2fb72afefbe48f9ac4cb34af1565c3930e801f299d2cc1495a60266947dad860a08068d3eedcf7384fa8717234906ffc56149f1547fa943314b6cfef2abceaed79e8583fba19ec1dbe387295dc0f3c06fb1669ac770027744ec9cdf5a08db09ec4e8c7d5f6faae3eecb481217c7f1a005c765b6c020c3154d19a4a53aea188df913f5f68d74c10193194b4a45f80ebe62d64fe211f9cdc382332060431eef05c2111c2ba894c3d8f6d92fd559bab88988dd632c41b63eab44ac625e6ce50992024120bb49
public exponent: 10001

] 
2022-11-12 06:27:23.342  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-12 06:27:23.344 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-12 06:27:23.346 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-12 06:27:23.347 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-12 06:27:23.347  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-12 06:27:23.348  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-12 06:27:23.349  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-12 06:27:23.349 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-12 06:27:23.350 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-12 06:27:23.350 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-12 06:27:23.354 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-12 06:27:23.355 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 06:27:23.355 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 06:27:23.356 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 06:27:23.553  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-12 06:27:23.554  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-12 06:27:23.555 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-12 06:27:23.557 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 06:27:23.559  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-12 06:27:23.560  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-12 06:27:23.561 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:27:23.561 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:27:23.562 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:27:23.563 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:27:23.564 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:27:23.564 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:27:23.566 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:27:23.567 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:27:23.568 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:27:23.569 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-12 06:27:23.577 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 665432390982186298299782860940689282063413649811
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 12 04:59:46 UTC 2022
           Final Date: Thu Nov 11 04:59:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f
                       86fbcba0d303480c34ece797cb1c4137d2f52817
                       02f99871823111a148ed78e3e2a2e17698964c3d
                       eed7d5759e0068eef1420268b58cf523e66cbe45
                       00f918b66d8278436aba0564d9310557469d13b5
                       967a73ada171a2a3ea01ee3249114e68f6b17936
                       baec494bf61a4f1cca7e6c431f50f2176041c7aa
                       4d9807f829990e76eb5bb921c20832557f1789bd
                       789294702782f4f9ac6ee685f3cb2a781b62e73f
                       1e6371b7a2b40600ede739de923a633a110c0bc0
                       c68e87f198ec80bf25169fb08480869e7796a471
                       09ce3829116b8301117868f780d1cda5302f699f
                       14ac820a80bb8f1266b06ab43d1880e35a1e4072
                       1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f
                       edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7
                       9430fb09d42f250e2c504ac0e8b24f41023e60bd
                       197c85adcc3ddc2feaa94d0abecf95b216a8288c
                       41831a67cba188e78b9d76bbe9d496ab92342e9f
                       d732f6c929bec6ee8906e305dcca7c9af013b001
                       f03e29b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [81:38:15:55:cb:98:85:e2:70:46:6b:5e:aa:1c:fc:13:e4:0d:49:7f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-12 06:29:59.135  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-12 06:29:59.137 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-12 06:29:59.139 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-12 06:29:59.140 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-12 06:29:59.141  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-12 06:29:59.142  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-12 06:29:59.142  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-12 06:29:59.143 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-12 06:29:59.143 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-12 06:29:59.144 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-12 06:29:59.148 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-12 06:29:59.149 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 06:29:59.149 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 06:29:59.149 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 06:29:59.319  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-12 06:29:59.320  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-12 06:29:59.320 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-12 06:29:59.321 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 06:29:59.323  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-12 06:29:59.323  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-12 06:29:59.324 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:29:59.325 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:29:59.325 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:29:59.326 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:29:59.327 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:29:59.327 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:29:59.328 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:29:59.328 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:29:59.329 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:29:59.330 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-12 06:29:59.334 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 665432390982186298299782860940689282063413649811
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 12 04:59:46 UTC 2022
           Final Date: Thu Nov 11 04:59:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4]
        modulus: e3d925df21100bbca82ad8faebd38196225f98ac8f2ae7947a22dc29f7abd96de6963ae23c0fa1641e47c6aa8a41099189e870196110d277062d1c15b391f4dbb689682f12e6f624c9bb66628649323fe5096c9c68d7ed6938c271872d6ba4aee9ae1d53a6f85a55ca9dd647b1b13a8716acdc7e0df4ab9368768f8c2b4d832099191fe9cf60a623f89735e2e931f5d014b1d711ef8af45b03a78b92c6e08f425878ab06bbdbf70fefc46429b33f2561dbc53cd13e3ad126dfa12af80dd29a034280be9bc311e449b398ec649a431f4920d31b181116a96979f2172052fee2137ef2a70f29abf168924dcca93a81d1e312f61af56525a093b3179e50b3b72dee3086bdae1d69140ca06acb5a47f6c43d2c980a42290d012b23d5c7681b1b46c5f10f4c5a15d57cf65ee830dcfc1b23d8d03398e3cab4053d0cece0720ce708453542782872754534390307199411ec38c9e8e2f83c886b618cdc5008e2695e3c06ff28d78b498e28d539f277cfa49ee636449ac05bd24b9ab4eca6ef83e43d41
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f
                       86fbcba0d303480c34ece797cb1c4137d2f52817
                       02f99871823111a148ed78e3e2a2e17698964c3d
                       eed7d5759e0068eef1420268b58cf523e66cbe45
                       00f918b66d8278436aba0564d9310557469d13b5
                       967a73ada171a2a3ea01ee3249114e68f6b17936
                       baec494bf61a4f1cca7e6c431f50f2176041c7aa
                       4d9807f829990e76eb5bb921c20832557f1789bd
                       789294702782f4f9ac6ee685f3cb2a781b62e73f
                       1e6371b7a2b40600ede739de923a633a110c0bc0
                       c68e87f198ec80bf25169fb08480869e7796a471
                       09ce3829116b8301117868f780d1cda5302f699f
                       14ac820a80bb8f1266b06ab43d1880e35a1e4072
                       1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f
                       edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7
                       9430fb09d42f250e2c504ac0e8b24f41023e60bd
                       197c85adcc3ddc2feaa94d0abecf95b216a8288c
                       41831a67cba188e78b9d76bbe9d496ab92342e9f
                       d732f6c929bec6ee8906e305dcca7c9af013b001
                       f03e29b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5b:1c:36:34:39:9e:68:2d:6e:07:35:6f:8d:2f:18:3c:ec:2c:3e:f4],[56:66:d1:a4]
        modulus: a4da81981aa02f8a20f873608ce81a7e76ee9cb27ca04269fa6cb9c93488a93fc50419a473f644b75c8c6e6d9c069f3342f944925a08a98c10f06dd535e4bc075a879c2d82342fa43016f4cee7e33a98637b508116d4a8a40a38df99f7446f25fab3f1e6605fcf46fcdfaaf5d6faef26a070a1cec3a33c2ea90112cb9247159f1ab69332cf71d0d8e06cb5e51bea72b1c00a9b3b2f6e673ad4bd9b31cbdcffe2f67f04584c826fdb9d66f67fbc0dbc49bb27b1125a884fde343e9d22f6d41fd90863efca7848e58e179c685a525271d796a9818843391f687b031027dd1b5d595b788bbca94ea00031dbd4d87ff2b93c2f8a9c3f7447a757e55c1270a236c6bf
public exponent: 10001

] 
2022-11-12 06:43:48.060  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-12 06:43:48.064 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-12 06:43:48.068 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-12 06:43:48.069 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-12 06:43:48.070  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-12 06:43:48.071  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-12 06:43:48.072  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-12 06:43:48.072 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-12 06:43:48.073 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-12 06:43:48.074 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-12 06:43:48.101 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-12 06:43:48.104 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 06:43:48.104 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 06:43:48.105 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 06:43:48.328  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-12 06:43:48.329  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-12 06:43:48.329 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-12 06:43:48.329 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 06:43:48.332  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-12 06:43:48.332  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-12 06:43:48.332 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:43:48.333 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:43:48.333 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:43:48.334 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:43:48.334 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:43:48.334 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:43:48.335 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:43:48.336 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:43:48.336 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:43:48.337 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-12 06:43:48.340 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 665432390982186298299782860940689282063413649811
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 12 04:59:46 UTC 2022
           Final Date: Thu Nov 11 04:59:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f
                       86fbcba0d303480c34ece797cb1c4137d2f52817
                       02f99871823111a148ed78e3e2a2e17698964c3d
                       eed7d5759e0068eef1420268b58cf523e66cbe45
                       00f918b66d8278436aba0564d9310557469d13b5
                       967a73ada171a2a3ea01ee3249114e68f6b17936
                       baec494bf61a4f1cca7e6c431f50f2176041c7aa
                       4d9807f829990e76eb5bb921c20832557f1789bd
                       789294702782f4f9ac6ee685f3cb2a781b62e73f
                       1e6371b7a2b40600ede739de923a633a110c0bc0
                       c68e87f198ec80bf25169fb08480869e7796a471
                       09ce3829116b8301117868f780d1cda5302f699f
                       14ac820a80bb8f1266b06ab43d1880e35a1e4072
                       1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f
                       edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7
                       9430fb09d42f250e2c504ac0e8b24f41023e60bd
                       197c85adcc3ddc2feaa94d0abecf95b216a8288c
                       41831a67cba188e78b9d76bbe9d496ab92342e9f
                       d732f6c929bec6ee8906e305dcca7c9af013b001
                       f03e29b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d1:a2:36:5e:62:ad:67:83:3b:f1:63:1d:db:9f:ac:da:34:89:d2:07],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-12 06:49:06.993  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-12 06:49:06.996 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-12 06:49:06.999 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-12 06:49:07.000 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-12 06:49:07.000  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-12 06:49:07.001  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-12 06:49:07.002  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-12 06:49:07.002 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-12 06:49:07.003 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-12 06:49:07.003 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-12 06:49:07.008 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-12 06:49:07.013 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 06:49:07.014 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 06:49:07.014 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 06:49:07.185  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-12 06:49:07.186  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-12 06:49:07.186 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-12 06:49:07.187 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 06:49:07.188  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-12 06:49:07.189  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-12 06:49:07.189 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:49:07.190 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:49:07.190 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:49:07.191 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:49:07.191 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:49:07.192 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:49:07.192 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:49:07.193 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:49:07.193 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:49:07.194 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-12 06:49:07.200 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 665432390982186298299782860940689282063413649811
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 12 04:59:46 UTC 2022
           Final Date: Thu Nov 11 04:59:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f
                       86fbcba0d303480c34ece797cb1c4137d2f52817
                       02f99871823111a148ed78e3e2a2e17698964c3d
                       eed7d5759e0068eef1420268b58cf523e66cbe45
                       00f918b66d8278436aba0564d9310557469d13b5
                       967a73ada171a2a3ea01ee3249114e68f6b17936
                       baec494bf61a4f1cca7e6c431f50f2176041c7aa
                       4d9807f829990e76eb5bb921c20832557f1789bd
                       789294702782f4f9ac6ee685f3cb2a781b62e73f
                       1e6371b7a2b40600ede739de923a633a110c0bc0
                       c68e87f198ec80bf25169fb08480869e7796a471
                       09ce3829116b8301117868f780d1cda5302f699f
                       14ac820a80bb8f1266b06ab43d1880e35a1e4072
                       1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f
                       edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7
                       9430fb09d42f250e2c504ac0e8b24f41023e60bd
                       197c85adcc3ddc2feaa94d0abecf95b216a8288c
                       41831a67cba188e78b9d76bbe9d496ab92342e9f
                       d732f6c929bec6ee8906e305dcca7c9af013b001
                       f03e29b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:fd:46:ee:c6:e6:2b:37:d3:43:23:8c:91:54:53:bb:f9:8b:b2:5d],[56:66:d1:a4]
        modulus: bc3e6f9445985e1b08b116f11b7b5daee9d86a3fd2ae724b48e02871e97e54f69a153d03263973f882bb1c76534ea84c3fcc22408dcb02001003f18973b8f6521ed05cd7321be763a9cee4a3982ed7319ca0c4c4906104956a247601633e0eea65d3b2cc8e6c10302e79d4d106575aac16ceab2f49d5addce41b94306a9811a63fb71e5c77725d4e39fdb325ff572775ebc9e27dc0101cb9a54ccecf7cfda1d8e83f5e0a226795d5432c3684eab17c83bd8ac275943145f0dbaa0ef16dd726cfb848c0124ea93e3213b6cd42dbf96bf5203e4f21b2cb8d7a18963ce187bdc12eefd8c8f128ee82543c525b42d009bda5b27fdd89d0788bbb26b430633830c827
public exponent: 10001

] 
2022-11-12 06:49:23.855  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-12 06:49:23.858 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-12 06:49:23.860 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-12 06:49:23.862 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-12 06:49:23.862  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-12 06:49:23.863  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-12 06:49:23.863  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-12 06:49:23.864 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-12 06:49:23.865 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-12 06:49:23.866 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-12 06:49:23.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-12 06:49:23.875 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 06:49:23.875 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 06:49:23.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 06:49:24.012  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-12 06:49:24.013  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-12 06:49:24.014 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-12 06:49:24.015 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 06:49:24.018  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-12 06:49:24.018  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-12 06:49:24.021 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:49:24.021 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:49:24.021 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:49:24.022 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:49:24.023 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:49:24.023 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:49:24.025 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 06:49:24.025 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 06:49:24.025 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 06:49:24.026 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-12 06:49:24.032 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 665432390982186298299782860940689282063413649811
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 12 04:59:46 UTC 2022
           Final Date: Thu Nov 11 04:59:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f
                       86fbcba0d303480c34ece797cb1c4137d2f52817
                       02f99871823111a148ed78e3e2a2e17698964c3d
                       eed7d5759e0068eef1420268b58cf523e66cbe45
                       00f918b66d8278436aba0564d9310557469d13b5
                       967a73ada171a2a3ea01ee3249114e68f6b17936
                       baec494bf61a4f1cca7e6c431f50f2176041c7aa
                       4d9807f829990e76eb5bb921c20832557f1789bd
                       789294702782f4f9ac6ee685f3cb2a781b62e73f
                       1e6371b7a2b40600ede739de923a633a110c0bc0
                       c68e87f198ec80bf25169fb08480869e7796a471
                       09ce3829116b8301117868f780d1cda5302f699f
                       14ac820a80bb8f1266b06ab43d1880e35a1e4072
                       1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f
                       edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7
                       9430fb09d42f250e2c504ac0e8b24f41023e60bd
                       197c85adcc3ddc2feaa94d0abecf95b216a8288c
                       41831a67cba188e78b9d76bbe9d496ab92342e9f
                       d732f6c929bec6ee8906e305dcca7c9af013b001
                       f03e29b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [60:1b:c0:6c:76:64:ee:f6:0a:f6:34:23:fd:ea:39:9f:16:4f:d6:20],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-12 07:12:43.200  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-12 07:12:43.204 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-12 07:12:43.207 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-12 07:12:43.208 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-12 07:12:43.208  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-12 07:12:43.209  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-12 07:12:43.210  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-12 07:12:43.210 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-12 07:12:43.210 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-12 07:12:43.211 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-12 07:12:43.216 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-12 07:12:43.217 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 07:12:43.217 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 07:12:43.218 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 07:12:43.390  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-12 07:12:43.391  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-12 07:12:43.391 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-12 07:12:43.392 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 07:12:43.393  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-12 07:12:43.393  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-12 07:12:43.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 07:12:43.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 07:12:43.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 07:12:43.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 07:12:43.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 07:12:43.396 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 07:12:43.412 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 07:12:43.412 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 07:12:43.412 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 07:12:43.413 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-12 07:12:43.417 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 665432390982186298299782860940689282063413649811
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 12 04:59:46 UTC 2022
           Final Date: Thu Nov 11 04:59:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f
                       86fbcba0d303480c34ece797cb1c4137d2f52817
                       02f99871823111a148ed78e3e2a2e17698964c3d
                       eed7d5759e0068eef1420268b58cf523e66cbe45
                       00f918b66d8278436aba0564d9310557469d13b5
                       967a73ada171a2a3ea01ee3249114e68f6b17936
                       baec494bf61a4f1cca7e6c431f50f2176041c7aa
                       4d9807f829990e76eb5bb921c20832557f1789bd
                       789294702782f4f9ac6ee685f3cb2a781b62e73f
                       1e6371b7a2b40600ede739de923a633a110c0bc0
                       c68e87f198ec80bf25169fb08480869e7796a471
                       09ce3829116b8301117868f780d1cda5302f699f
                       14ac820a80bb8f1266b06ab43d1880e35a1e4072
                       1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f
                       edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7
                       9430fb09d42f250e2c504ac0e8b24f41023e60bd
                       197c85adcc3ddc2feaa94d0abecf95b216a8288c
                       41831a67cba188e78b9d76bbe9d496ab92342e9f
                       d732f6c929bec6ee8906e305dcca7c9af013b001
                       f03e29b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a3:fa:12:af:86:0b:22:f9:6c:6a:b7:d8:70:9d:17:3a:a7:ee:79:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-12 07:12:50.407  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-12 07:12:50.408 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-12 07:12:50.409 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-12 07:12:50.410 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-12 07:12:50.410  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-12 07:12:50.411  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-12 07:12:50.411  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-12 07:12:50.412 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-12 07:12:50.412 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-12 07:12:50.413 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-12 07:12:50.416 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-12 07:12:50.417 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 07:12:50.417 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-12 07:12:50.417 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 07:12:50.526  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-12 07:12:50.526  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-12 07:12:50.527 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-12 07:12:50.527 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-12 07:12:50.528  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-12 07:12:50.528  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-12 07:12:50.529 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 07:12:50.529 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 07:12:50.529 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 07:12:50.530 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 07:12:50.530 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 07:12:50.530 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 07:12:50.531 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-12 07:12:50.531 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-12 07:12:50.531 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-12 07:12:50.532 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-12 07:12:50.534 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 665432390982186298299782860940689282063413649811
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 12 04:59:46 UTC 2022
           Final Date: Thu Nov 11 04:59:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:41:a6:f4:e7:98:94:25:a0:4c:44:8e:88:96:9f:7a:41:03:63:70],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 45baac0d3e97e11d45b1292e0a1312cda23e381f
                       86fbcba0d303480c34ece797cb1c4137d2f52817
                       02f99871823111a148ed78e3e2a2e17698964c3d
                       eed7d5759e0068eef1420268b58cf523e66cbe45
                       00f918b66d8278436aba0564d9310557469d13b5
                       967a73ada171a2a3ea01ee3249114e68f6b17936
                       baec494bf61a4f1cca7e6c431f50f2176041c7aa
                       4d9807f829990e76eb5bb921c20832557f1789bd
                       789294702782f4f9ac6ee685f3cb2a781b62e73f
                       1e6371b7a2b40600ede739de923a633a110c0bc0
                       c68e87f198ec80bf25169fb08480869e7796a471
                       09ce3829116b8301117868f780d1cda5302f699f
                       14ac820a80bb8f1266b06ab43d1880e35a1e4072
                       1d72c854e66cd6e1760a1dd6d3ba9dcb27bd8d0f
                       edc9238c0a2e9ad2ecd17ffa381f4b7034d2eda7
                       9430fb09d42f250e2c504ac0e8b24f41023e60bd
                       197c85adcc3ddc2feaa94d0abecf95b216a8288c
                       41831a67cba188e78b9d76bbe9d496ab92342e9f
                       d732f6c929bec6ee8906e305dcca7c9af013b001
                       f03e29b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [60:54:1a:e1:fc:fb:ec:e6:df:e7:65:c1:f7:75:99:eb:5d:f6:f0:c5],[56:66:d1:a4]
        modulus: ed04525693fb2870483b9e9866de5cf0cf91203abee673959a697856b17fde209b0b058fcfe8e17acf4223cb2a864816c3fc67e0519987a3ec6bad807c2d18c87c650c8c8496d55ce801fde4839fa20d8f7a77c5e19270e807998cee484afe4cf0396048a0127a08c565376adb4670f23a83a54f0177a59c9e12e05386ee0f8dd9a44baadcdfe15251cb77654f0a513ad0e7707b1b4a17d96f9503486e5eff7a6ffef3b8f82b63d36c4fc9906dd9633837e572f8645531cb9fb0efb69b10565ff694b25b20be555d283c97206792601af4dc99610d98986867d1072cba8819fe9434049596641c12961aaa1024e15872cd669aeb155380d53cbbf64dcc43aa8f
public exponent: 10001

]