Results

By type

          2022-11-13 05:02:59,896 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-13 05:03:00,980 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-13 05:03:01.639  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 13, 2022 5:03:03 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 13, 2022 5:03:03 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 13, 2022 5:03:03 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 13, 2022 5:03:03 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-13 05:03:04.263 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-13 05:03:04.503  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-13 05:03:04.662  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-13 05:03:05.445 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-13 05:03:05.449 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-11-13 05:03:05.451 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-13 05:03:05.454 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-13 05:03:05.503 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-13 05:03:05.509 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-11-13 05:03:05.605 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-13 05:03:06.370 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 13, 2022 5:03:07 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-13 05:03:07.365  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.329 seconds (JVM running for 10.127)
Nov 13, 2022 5:03:30 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-13 05:04:03.422  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-13 05:04:03.428 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-13 05:04:03.456 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-13 05:04:03.460 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-13 05:04:03.476  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-13 05:04:03.480  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-13 05:04:03.482  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-13 05:04:03.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 05:04:03.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 05:04:03.488 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 05:04:03.496 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-13 05:04:03.500 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-13 05:04:03.546 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-13 05:04:03.553 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 05:04:03.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 05:04:03.558 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 05:04:04.178  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-13 05:04:04.181  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-13 05:04:04.182 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-13 05:04:04.183 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 05:04:04.194  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-13 05:04:04.196  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-13 05:04:04.197 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 05:04:04.197 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 05:04:04.197 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 05:04:04.210 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 05:04:04.211 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 05:04:04.212 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 05:04:04.216 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 05:04:04.217 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 05:04:04.217 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 05:04:04.219 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-13 05:04:04.250 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 538556996655796121079551713408308382294188709306
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 13 04:59:47 UTC 2022
           Final Date: Fri Nov 12 04:59:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba
                       54472996883570a7ccf70d01b01e432408ee6e79
                       2ba16417ccc21ec2f8c1c01bef8f1ec130333604
                       e32c6bde13a4755bfc2084689a64e26b57c2d44a
                       9e5af927637c4f60c7a827916acccbffb36df212
                       72ca61b7658ad8c141fa03986cd043d1938109c3
                       3e3871f2ecc7ac1c0f47304291a0f235d3b6b674
                       98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9
                       19ece431baf9a8420a5aa8b59057cb994072c54c
                       dfd1ffee770f4685dcbf6a824a0060adb77ddfa1
                       205a596cdc2523fe01e537e265345339fe68b427
                       f18d59916395511e960d37d11c373402e4f4c2e9
                       836f2354aeb918a8806e973aca841f7170947fc6
                       7452e4d59a4de98b15e170b0132cd294966b1fd5
                       4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c
                       fb4c1d05f1c845f0e9dd9795480f85317f5cc28e
                       c08b86ea95243198d484ceda85d3dfbf60e1755c
                       af2b74df09e9be36b481097f8ad7f0e3d9402345
                       53eb3f71762a0e4607ceec42265c34e8cc686f93
                       4fd4dbf9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:96:b0:30:89:e9:68:03:d2:3e:26:b7:72:84:f9:66:29:26:d6:74],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-13 06:26:18.658  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-13 06:26:18.661 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-13 06:26:18.664 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-13 06:26:18.672 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-13 06:26:18.672  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-13 06:26:18.673  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-13 06:26:18.674  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-13 06:26:18.674 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 06:26:18.674 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-13 06:26:18.675 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-13 06:26:18.685 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-13 06:26:18.687 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 06:26:18.688 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 06:26:18.688 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 06:26:18.915  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-13 06:26:18.916  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-13 06:26:18.917 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-13 06:26:18.917 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 06:26:18.919  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-13 06:26:18.921  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-13 06:26:18.921 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:26:18.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:26:18.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:26:18.925 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:26:18.925 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:26:18.925 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:26:18.926 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:26:18.927 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:26:18.927 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:26:18.927 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-13 06:26:18.931 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 538556996655796121079551713408308382294188709306
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 13 04:59:47 UTC 2022
           Final Date: Fri Nov 12 04:59:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba
                       54472996883570a7ccf70d01b01e432408ee6e79
                       2ba16417ccc21ec2f8c1c01bef8f1ec130333604
                       e32c6bde13a4755bfc2084689a64e26b57c2d44a
                       9e5af927637c4f60c7a827916acccbffb36df212
                       72ca61b7658ad8c141fa03986cd043d1938109c3
                       3e3871f2ecc7ac1c0f47304291a0f235d3b6b674
                       98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9
                       19ece431baf9a8420a5aa8b59057cb994072c54c
                       dfd1ffee770f4685dcbf6a824a0060adb77ddfa1
                       205a596cdc2523fe01e537e265345339fe68b427
                       f18d59916395511e960d37d11c373402e4f4c2e9
                       836f2354aeb918a8806e973aca841f7170947fc6
                       7452e4d59a4de98b15e170b0132cd294966b1fd5
                       4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c
                       fb4c1d05f1c845f0e9dd9795480f85317f5cc28e
                       c08b86ea95243198d484ceda85d3dfbf60e1755c
                       af2b74df09e9be36b481097f8ad7f0e3d9402345
                       53eb3f71762a0e4607ceec42265c34e8cc686f93
                       4fd4dbf9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [45:7c:5a:a1:d9:08:1f:d5:f7:72:8f:59:63:a9:c5:77:f0:5d:dd:d8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-13 06:28:06.627  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-13 06:28:06.628 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-13 06:28:06.630 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-13 06:28:06.631 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-13 06:28:06.632  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-13 06:28:06.633  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-13 06:28:06.633  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-13 06:28:06.633 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 06:28:06.634 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-13 06:28:06.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-13 06:28:06.640 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-13 06:28:06.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 06:28:06.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 06:28:06.642 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 06:28:06.954  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-13 06:28:06.955  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-13 06:28:06.955 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-13 06:28:06.955 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 06:28:06.958  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-13 06:28:06.959  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-13 06:28:06.960 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:28:06.960 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:28:06.960 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:28:06.961 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:28:06.961 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:28:06.961 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:28:06.962 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:28:06.962 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:28:06.963 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:28:06.964 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-13 06:28:06.969 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 538556996655796121079551713408308382294188709306
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 13 04:59:47 UTC 2022
           Final Date: Fri Nov 12 04:59:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba
                       54472996883570a7ccf70d01b01e432408ee6e79
                       2ba16417ccc21ec2f8c1c01bef8f1ec130333604
                       e32c6bde13a4755bfc2084689a64e26b57c2d44a
                       9e5af927637c4f60c7a827916acccbffb36df212
                       72ca61b7658ad8c141fa03986cd043d1938109c3
                       3e3871f2ecc7ac1c0f47304291a0f235d3b6b674
                       98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9
                       19ece431baf9a8420a5aa8b59057cb994072c54c
                       dfd1ffee770f4685dcbf6a824a0060adb77ddfa1
                       205a596cdc2523fe01e537e265345339fe68b427
                       f18d59916395511e960d37d11c373402e4f4c2e9
                       836f2354aeb918a8806e973aca841f7170947fc6
                       7452e4d59a4de98b15e170b0132cd294966b1fd5
                       4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c
                       fb4c1d05f1c845f0e9dd9795480f85317f5cc28e
                       c08b86ea95243198d484ceda85d3dfbf60e1755c
                       af2b74df09e9be36b481097f8ad7f0e3d9402345
                       53eb3f71762a0e4607ceec42265c34e8cc686f93
                       4fd4dbf9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ba:df:06:46:9d:2d:8f:b9:81:f6:f2:ea:8e:42:fb:f7:06:2e:ad:c7],[56:66:d1:a4]
        modulus: e0e38f87a060ee89d4a844c5ac0d15c5b70c8ff3a2280a0b1c958134ac02a427c43a15ff804505019b37b4a9e82746d6c1830228f401ca8342d0a9c3635e6161e854252cd6cd45710bd1baa53a71a52b691c71e4bc48ffb065a4fd575ea0e5509f32d8f2e2938c2ce36f872a4cc460954fc91c2d0d9bad5f5cb6b8950adc37f5645aaa5f489095b18030ff55e8b83ea61e797f101eab136f6defca7648e05baea988283dc90962a0407028ab7eb485341e882bd8a1aea14da48ee7a39b0efe9592bc20f91cab30a3fe9e59c02be57a3948bcbbc5bab55b4d286c0c6794ef084a199413011a93f7de67fe3f705f558d670810a0ac50d38637a92d286bd520a7f9
public exponent: 10001

] 
2022-11-13 06:29:30.915  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-13 06:29:30.917 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-13 06:29:30.920 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-13 06:29:30.921 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-13 06:29:30.922  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-13 06:29:30.923  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-13 06:29:30.923  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-13 06:29:30.923 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 06:29:30.924 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-13 06:29:30.924 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-13 06:29:30.933 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-13 06:29:30.934 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 06:29:30.935 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 06:29:30.935 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 06:29:31.126  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-13 06:29:31.126  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-13 06:29:31.127 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-13 06:29:31.127 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 06:29:31.129  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-13 06:29:31.130  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-13 06:29:31.131 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:29:31.131 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:29:31.131 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:29:31.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:29:31.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:29:31.133 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:29:31.134 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:29:31.134 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:29:31.134 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:29:31.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-13 06:29:31.142 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 538556996655796121079551713408308382294188709306
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 13 04:59:47 UTC 2022
           Final Date: Fri Nov 12 04:59:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba
                       54472996883570a7ccf70d01b01e432408ee6e79
                       2ba16417ccc21ec2f8c1c01bef8f1ec130333604
                       e32c6bde13a4755bfc2084689a64e26b57c2d44a
                       9e5af927637c4f60c7a827916acccbffb36df212
                       72ca61b7658ad8c141fa03986cd043d1938109c3
                       3e3871f2ecc7ac1c0f47304291a0f235d3b6b674
                       98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9
                       19ece431baf9a8420a5aa8b59057cb994072c54c
                       dfd1ffee770f4685dcbf6a824a0060adb77ddfa1
                       205a596cdc2523fe01e537e265345339fe68b427
                       f18d59916395511e960d37d11c373402e4f4c2e9
                       836f2354aeb918a8806e973aca841f7170947fc6
                       7452e4d59a4de98b15e170b0132cd294966b1fd5
                       4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c
                       fb4c1d05f1c845f0e9dd9795480f85317f5cc28e
                       c08b86ea95243198d484ceda85d3dfbf60e1755c
                       af2b74df09e9be36b481097f8ad7f0e3d9402345
                       53eb3f71762a0e4607ceec42265c34e8cc686f93
                       4fd4dbf9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [af:f9:8f:d2:4b:b0:f8:39:5e:21:f0:67:77:28:00:a4:45:c7:98:62],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-13 06:31:48.343  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-13 06:31:48.345 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-13 06:31:48.347 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-13 06:31:48.348 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-13 06:31:48.348  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-13 06:31:48.349  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-13 06:31:48.350  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-13 06:31:48.350 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 06:31:48.350 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-13 06:31:48.352 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-13 06:31:48.357 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-13 06:31:48.358 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 06:31:48.358 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 06:31:48.358 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 06:31:48.539  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-13 06:31:48.541  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-13 06:31:48.541 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-13 06:31:48.541 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 06:31:48.543  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-13 06:31:48.543  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-13 06:31:48.543 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:31:48.544 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:31:48.544 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:31:48.545 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:31:48.545 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:31:48.545 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:31:48.546 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:31:48.546 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:31:48.547 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:31:48.547 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-13 06:31:48.550 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 538556996655796121079551713408308382294188709306
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 13 04:59:47 UTC 2022
           Final Date: Fri Nov 12 04:59:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4]
        modulus: b059681abb9960e87b7ac0d0ea7320e1466a2422b5df045d829351136f888caa3aa8e9f587cc1bdf8eaace3ee4628f3c881c0a368e46ded52d842a1036b96de82aec602975672456378312a7b205da1bea46b9080b9958ffdac8c4cc408cc45fba1c36fbe0f4d2e9bfa026e33f6adaac9a121b4f67b404cb295eaf47b0491fead7217e549b64b0c433f64d89bddc0f67b0e4e4119fc1156f1e55ffa61dafdb6f9a6333c15398c9fcae7b3eb3360712a7fca2967b26cb7848e625c487fffdf40636b0e622d3db54ae5d27ff85910ee6f151d6880c0ab6fe3d9ba44be46fb2558c043f9cbb1762305084112be816e158a194ff2e263e0c483ecee33ce995c45816f8bd7ddb4fe4b28aa1060dd5044fbd0a4ed20cfeda894f65454f6969262e25a10f5d7d6a09230ef6cb97968d7bfc6377f74dfb883e8c75a389e816ae6a2af0704fc4490b38fad3569982fcc3631c3bc72dae11f03529e7d0c7bb5d44f359e414f59a6308719acb482c7597d35a812eceb476912846d8f51788fcba0cbbcf78b9
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba
                       54472996883570a7ccf70d01b01e432408ee6e79
                       2ba16417ccc21ec2f8c1c01bef8f1ec130333604
                       e32c6bde13a4755bfc2084689a64e26b57c2d44a
                       9e5af927637c4f60c7a827916acccbffb36df212
                       72ca61b7658ad8c141fa03986cd043d1938109c3
                       3e3871f2ecc7ac1c0f47304291a0f235d3b6b674
                       98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9
                       19ece431baf9a8420a5aa8b59057cb994072c54c
                       dfd1ffee770f4685dcbf6a824a0060adb77ddfa1
                       205a596cdc2523fe01e537e265345339fe68b427
                       f18d59916395511e960d37d11c373402e4f4c2e9
                       836f2354aeb918a8806e973aca841f7170947fc6
                       7452e4d59a4de98b15e170b0132cd294966b1fd5
                       4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c
                       fb4c1d05f1c845f0e9dd9795480f85317f5cc28e
                       c08b86ea95243198d484ceda85d3dfbf60e1755c
                       af2b74df09e9be36b481097f8ad7f0e3d9402345
                       53eb3f71762a0e4607ceec42265c34e8cc686f93
                       4fd4dbf9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:7b:c8:02:ed:66:1d:32:2e:78:2a:32:1f:e4:02:f8:b7:a4:91:2f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-13 06:40:11.679  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-13 06:40:11.681 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-13 06:40:11.683 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-13 06:40:11.684 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-13 06:40:11.685  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-13 06:40:11.685  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-13 06:40:11.686  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-13 06:40:11.686 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 06:40:11.686 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-13 06:40:11.687 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-13 06:40:11.693 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-13 06:40:11.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 06:40:11.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 06:40:11.697 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 06:40:11.929  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-13 06:40:11.930  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-13 06:40:11.930 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-13 06:40:11.931 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 06:40:11.932  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-13 06:40:11.932  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-13 06:40:11.932 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:40:11.933 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:40:11.933 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:40:11.934 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:40:11.934 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:40:11.934 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:40:11.935 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:40:11.935 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:40:11.935 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:40:11.935 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-13 06:40:11.938 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 538556996655796121079551713408308382294188709306
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 13 04:59:47 UTC 2022
           Final Date: Fri Nov 12 04:59:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4]
        modulus: b059681abb9960e87b7ac0d0ea7320e1466a2422b5df045d829351136f888caa3aa8e9f587cc1bdf8eaace3ee4628f3c881c0a368e46ded52d842a1036b96de82aec602975672456378312a7b205da1bea46b9080b9958ffdac8c4cc408cc45fba1c36fbe0f4d2e9bfa026e33f6adaac9a121b4f67b404cb295eaf47b0491fead7217e549b64b0c433f64d89bddc0f67b0e4e4119fc1156f1e55ffa61dafdb6f9a6333c15398c9fcae7b3eb3360712a7fca2967b26cb7848e625c487fffdf40636b0e622d3db54ae5d27ff85910ee6f151d6880c0ab6fe3d9ba44be46fb2558c043f9cbb1762305084112be816e158a194ff2e263e0c483ecee33ce995c45816f8bd7ddb4fe4b28aa1060dd5044fbd0a4ed20cfeda894f65454f6969262e25a10f5d7d6a09230ef6cb97968d7bfc6377f74dfb883e8c75a389e816ae6a2af0704fc4490b38fad3569982fcc3631c3bc72dae11f03529e7d0c7bb5d44f359e414f59a6308719acb482c7597d35a812eceb476912846d8f51788fcba0cbbcf78b9
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba
                       54472996883570a7ccf70d01b01e432408ee6e79
                       2ba16417ccc21ec2f8c1c01bef8f1ec130333604
                       e32c6bde13a4755bfc2084689a64e26b57c2d44a
                       9e5af927637c4f60c7a827916acccbffb36df212
                       72ca61b7658ad8c141fa03986cd043d1938109c3
                       3e3871f2ecc7ac1c0f47304291a0f235d3b6b674
                       98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9
                       19ece431baf9a8420a5aa8b59057cb994072c54c
                       dfd1ffee770f4685dcbf6a824a0060adb77ddfa1
                       205a596cdc2523fe01e537e265345339fe68b427
                       f18d59916395511e960d37d11c373402e4f4c2e9
                       836f2354aeb918a8806e973aca841f7170947fc6
                       7452e4d59a4de98b15e170b0132cd294966b1fd5
                       4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c
                       fb4c1d05f1c845f0e9dd9795480f85317f5cc28e
                       c08b86ea95243198d484ceda85d3dfbf60e1755c
                       af2b74df09e9be36b481097f8ad7f0e3d9402345
                       53eb3f71762a0e4607ceec42265c34e8cc686f93
                       4fd4dbf9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [74:42:7a:f3:71:1d:1b:5c:ea:5b:9a:89:52:5d:d5:af:26:f0:86:5f],[56:66:d1:a4]
        modulus: e578b09f4463759036e34b5fedc87af31c81d18e45ed1dac8285fcdec24e1624ae64306e75357f3d6f2ee73ce5b770db03973a053cef3fe64a9b2ee0969085412f5ffbdd3665d874a9dcc35a069313836dfa6288a6e92d0ba4a303f12b03c048e98a5e8a0b96907cc3d68f0be7a87e5bf84a1cd3be80a3305b92bc54905ca66be93ce93159a5ddd657c188952f0e0b5cb3e85c5ea15e9611198d45b8a3fc08d2e8752906b793aba6045626e2a1a4181d1e8f8183ec143821a417960ad09f871e658bd2d4445695a4a709039f0c2ed2016ae78a690fb11b210f58eddcb45b13f5a22c0cdea171dd16fefd7ae40abd3ad703b8d5a973210488ee0a0427b8b21373
public exponent: 10001

] 
2022-11-13 06:45:56.323  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-13 06:45:56.325 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-13 06:45:56.327 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-13 06:45:56.328 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-13 06:45:56.331  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-13 06:45:56.333  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-13 06:45:56.333  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-13 06:45:56.333 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 06:45:56.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-13 06:45:56.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-13 06:45:56.339 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-13 06:45:56.340 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 06:45:56.341 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 06:45:56.341 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 06:45:56.578  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-13 06:45:56.579  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-13 06:45:56.580 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-13 06:45:56.580 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 06:45:56.582  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-13 06:45:56.583  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-13 06:45:56.584 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:45:56.585 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:45:56.585 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:45:56.598 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:45:56.602 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:45:56.602 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:45:56.603 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:45:56.604 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:45:56.604 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:45:56.604 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-13 06:45:56.607 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 538556996655796121079551713408308382294188709306
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 13 04:59:47 UTC 2022
           Final Date: Fri Nov 12 04:59:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4]
        modulus: b059681abb9960e87b7ac0d0ea7320e1466a2422b5df045d829351136f888caa3aa8e9f587cc1bdf8eaace3ee4628f3c881c0a368e46ded52d842a1036b96de82aec602975672456378312a7b205da1bea46b9080b9958ffdac8c4cc408cc45fba1c36fbe0f4d2e9bfa026e33f6adaac9a121b4f67b404cb295eaf47b0491fead7217e549b64b0c433f64d89bddc0f67b0e4e4119fc1156f1e55ffa61dafdb6f9a6333c15398c9fcae7b3eb3360712a7fca2967b26cb7848e625c487fffdf40636b0e622d3db54ae5d27ff85910ee6f151d6880c0ab6fe3d9ba44be46fb2558c043f9cbb1762305084112be816e158a194ff2e263e0c483ecee33ce995c45816f8bd7ddb4fe4b28aa1060dd5044fbd0a4ed20cfeda894f65454f6969262e25a10f5d7d6a09230ef6cb97968d7bfc6377f74dfb883e8c75a389e816ae6a2af0704fc4490b38fad3569982fcc3631c3bc72dae11f03529e7d0c7bb5d44f359e414f59a6308719acb482c7597d35a812eceb476912846d8f51788fcba0cbbcf78b9
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba
                       54472996883570a7ccf70d01b01e432408ee6e79
                       2ba16417ccc21ec2f8c1c01bef8f1ec130333604
                       e32c6bde13a4755bfc2084689a64e26b57c2d44a
                       9e5af927637c4f60c7a827916acccbffb36df212
                       72ca61b7658ad8c141fa03986cd043d1938109c3
                       3e3871f2ecc7ac1c0f47304291a0f235d3b6b674
                       98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9
                       19ece431baf9a8420a5aa8b59057cb994072c54c
                       dfd1ffee770f4685dcbf6a824a0060adb77ddfa1
                       205a596cdc2523fe01e537e265345339fe68b427
                       f18d59916395511e960d37d11c373402e4f4c2e9
                       836f2354aeb918a8806e973aca841f7170947fc6
                       7452e4d59a4de98b15e170b0132cd294966b1fd5
                       4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c
                       fb4c1d05f1c845f0e9dd9795480f85317f5cc28e
                       c08b86ea95243198d484ceda85d3dfbf60e1755c
                       af2b74df09e9be36b481097f8ad7f0e3d9402345
                       53eb3f71762a0e4607ceec42265c34e8cc686f93
                       4fd4dbf9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [92:be:8c:45:f5:07:7a:fa:ec:0c:8f:1e:e9:2b:a5:87:a7:dd:e5:19],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-13 06:46:15.569  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-13 06:46:15.570 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-13 06:46:15.571 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-13 06:46:15.572 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-13 06:46:15.572  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-13 06:46:15.573  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-13 06:46:15.573  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-13 06:46:15.573 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 06:46:15.573 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-13 06:46:15.573 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-13 06:46:15.575 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-13 06:46:15.576 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 06:46:15.576 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 06:46:15.576 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 06:46:15.761  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-13 06:46:15.762  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-13 06:46:15.762 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-13 06:46:15.763 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 06:46:15.764  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-13 06:46:15.764  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-13 06:46:15.765 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:46:15.765 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:46:15.765 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:46:15.765 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:46:15.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:46:15.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:46:15.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 06:46:15.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 06:46:15.767 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 06:46:15.767 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-13 06:46:15.770 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 538556996655796121079551713408308382294188709306
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 13 04:59:47 UTC 2022
           Final Date: Fri Nov 12 04:59:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba
                       54472996883570a7ccf70d01b01e432408ee6e79
                       2ba16417ccc21ec2f8c1c01bef8f1ec130333604
                       e32c6bde13a4755bfc2084689a64e26b57c2d44a
                       9e5af927637c4f60c7a827916acccbffb36df212
                       72ca61b7658ad8c141fa03986cd043d1938109c3
                       3e3871f2ecc7ac1c0f47304291a0f235d3b6b674
                       98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9
                       19ece431baf9a8420a5aa8b59057cb994072c54c
                       dfd1ffee770f4685dcbf6a824a0060adb77ddfa1
                       205a596cdc2523fe01e537e265345339fe68b427
                       f18d59916395511e960d37d11c373402e4f4c2e9
                       836f2354aeb918a8806e973aca841f7170947fc6
                       7452e4d59a4de98b15e170b0132cd294966b1fd5
                       4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c
                       fb4c1d05f1c845f0e9dd9795480f85317f5cc28e
                       c08b86ea95243198d484ceda85d3dfbf60e1755c
                       af2b74df09e9be36b481097f8ad7f0e3d9402345
                       53eb3f71762a0e4607ceec42265c34e8cc686f93
                       4fd4dbf9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [65:98:db:82:bd:b9:91:cc:80:93:25:ba:34:a4:9e:ea:fb:eb:04:7d],[56:66:d1:a4]
        modulus: ce47b76f311b5c900f3b35076cd6f0d05a58bdccb09ebb161b224e959586e9c40dda7fc9d9bde724996f40dd176d2b3f7914a81af4289804cbb2108a9f0137183da9a49e3eb065139c181821d1589ad2fc440c665fbfc20cb084f283452de10978e85cec70c1a4872966121de5117dc95fce715b33b0447f67f0f23041ee8402899c8dc541e9d961f8039a1dfea00273b34bd8ab6000a7665371573207ec65afca943cbe285dad7d07f6d0d7e8d88160d3da56bb6e2295baa4e43769c59319e6507685ac322f858c48449b064767c096c58ebf88eb1f7d8f161043f7de0d77d230212019483ab173c1f510be70460fee3ec22770076eb417eee5a04b73a474e7
public exponent: 10001

] 
2022-11-13 07:10:25.045  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-13 07:10:25.047 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-13 07:10:25.049 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-13 07:10:25.051 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-13 07:10:25.051  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-13 07:10:25.051  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-13 07:10:25.052  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-13 07:10:25.052 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 07:10:25.052 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-13 07:10:25.053 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-13 07:10:25.057 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-13 07:10:25.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 07:10:25.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 07:10:25.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 07:10:25.267  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-13 07:10:25.268  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-13 07:10:25.268 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-13 07:10:25.268 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 07:10:25.269  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-13 07:10:25.270  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-13 07:10:25.271 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 07:10:25.271 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 07:10:25.272 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 07:10:25.272 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 07:10:25.272 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 07:10:25.272 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 07:10:25.273 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 07:10:25.273 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 07:10:25.273 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 07:10:25.274 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-13 07:10:25.277 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 538556996655796121079551713408308382294188709306
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 13 04:59:47 UTC 2022
           Final Date: Fri Nov 12 04:59:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba
                       54472996883570a7ccf70d01b01e432408ee6e79
                       2ba16417ccc21ec2f8c1c01bef8f1ec130333604
                       e32c6bde13a4755bfc2084689a64e26b57c2d44a
                       9e5af927637c4f60c7a827916acccbffb36df212
                       72ca61b7658ad8c141fa03986cd043d1938109c3
                       3e3871f2ecc7ac1c0f47304291a0f235d3b6b674
                       98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9
                       19ece431baf9a8420a5aa8b59057cb994072c54c
                       dfd1ffee770f4685dcbf6a824a0060adb77ddfa1
                       205a596cdc2523fe01e537e265345339fe68b427
                       f18d59916395511e960d37d11c373402e4f4c2e9
                       836f2354aeb918a8806e973aca841f7170947fc6
                       7452e4d59a4de98b15e170b0132cd294966b1fd5
                       4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c
                       fb4c1d05f1c845f0e9dd9795480f85317f5cc28e
                       c08b86ea95243198d484ceda85d3dfbf60e1755c
                       af2b74df09e9be36b481097f8ad7f0e3d9402345
                       53eb3f71762a0e4607ceec42265c34e8cc686f93
                       4fd4dbf9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c7:f4:80:74:e6:16:d4:a0:9d:f6:f4:29:20:3b:70:5b:95:ad:d4:0e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-13 07:10:31.795  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-13 07:10:31.796 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-13 07:10:31.798 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-13 07:10:31.798 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-13 07:10:31.798  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-13 07:10:31.799  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-13 07:10:31.799  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-13 07:10:31.799 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 07:10:31.800 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-13 07:10:31.800 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-13 07:10:31.803 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-13 07:10:31.804 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 07:10:31.805 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 07:10:31.805 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 07:10:31.962  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-13 07:10:31.962  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-13 07:10:31.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-13 07:10:31.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 07:10:31.964  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-13 07:10:31.964  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-13 07:10:31.964 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 07:10:31.965 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 07:10:31.965 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 07:10:31.965 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 07:10:31.965 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 07:10:31.965 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 07:10:31.966 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 07:10:31.966 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 07:10:31.966 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 07:10:31.966 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-13 07:10:31.968 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 538556996655796121079551713408308382294188709306
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 13 04:59:47 UTC 2022
           Final Date: Fri Nov 12 04:59:46 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:64:01:db:25:7b:5a:b0:f5:03:13:b2:27:df:74:da:93:22:ab:a0],[56:66:d1:a4]
        modulus: b059681abb9960e87b7ac0d0ea7320e1466a2422b5df045d829351136f888caa3aa8e9f587cc1bdf8eaace3ee4628f3c881c0a368e46ded52d842a1036b96de82aec602975672456378312a7b205da1bea46b9080b9958ffdac8c4cc408cc45fba1c36fbe0f4d2e9bfa026e33f6adaac9a121b4f67b404cb295eaf47b0491fead7217e549b64b0c433f64d89bddc0f67b0e4e4119fc1156f1e55ffa61dafdb6f9a6333c15398c9fcae7b3eb3360712a7fca2967b26cb7848e625c487fffdf40636b0e622d3db54ae5d27ff85910ee6f151d6880c0ab6fe3d9ba44be46fb2558c043f9cbb1762305084112be816e158a194ff2e263e0c483ecee33ce995c45816f8bd7ddb4fe4b28aa1060dd5044fbd0a4ed20cfeda894f65454f6969262e25a10f5d7d6a09230ef6cb97968d7bfc6377f74dfb883e8c75a389e816ae6a2af0704fc4490b38fad3569982fcc3631c3bc72dae11f03529e7d0c7bb5d44f359e414f59a6308719acb482c7597d35a812eceb476912846d8f51788fcba0cbbcf78b9
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 586f38bc8c13d8055ffc328e76f6e2b81923b4ba
                       54472996883570a7ccf70d01b01e432408ee6e79
                       2ba16417ccc21ec2f8c1c01bef8f1ec130333604
                       e32c6bde13a4755bfc2084689a64e26b57c2d44a
                       9e5af927637c4f60c7a827916acccbffb36df212
                       72ca61b7658ad8c141fa03986cd043d1938109c3
                       3e3871f2ecc7ac1c0f47304291a0f235d3b6b674
                       98fc7f791bf26c7ab5677b16fdf145a1eaeec2f9
                       19ece431baf9a8420a5aa8b59057cb994072c54c
                       dfd1ffee770f4685dcbf6a824a0060adb77ddfa1
                       205a596cdc2523fe01e537e265345339fe68b427
                       f18d59916395511e960d37d11c373402e4f4c2e9
                       836f2354aeb918a8806e973aca841f7170947fc6
                       7452e4d59a4de98b15e170b0132cd294966b1fd5
                       4fffc272cf6d5e768d6bd521f8e4ba17e6071c2c
                       fb4c1d05f1c845f0e9dd9795480f85317f5cc28e
                       c08b86ea95243198d484ceda85d3dfbf60e1755c
                       af2b74df09e9be36b481097f8ad7f0e3d9402345
                       53eb3f71762a0e4607ceec42265c34e8cc686f93
                       4fd4dbf9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [59:5e:b8:20:24:4a:8e:48:44:ac:2d:fb:3c:53:2c:49:8a:34:bd:50],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]