Results

By type

          2022-11-15 04:59:34,308 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-15 04:59:35,547 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-15 04:59:36.312  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 15, 2022 4:59:38 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 15, 2022 4:59:38 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 15, 2022 4:59:38 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 15, 2022 4:59:38 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-15 04:59:39.079 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-15 04:59:39.400  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-15 04:59:39.567  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-15 04:59:40.467 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-15 04:59:40.471 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-11-15 04:59:40.472 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-15 04:59:40.476 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-15 04:59:40.520 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-11-15 04:59:40.528 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-11-15 04:59:40.673 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-15 04:59:41.659 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 15, 2022 4:59:42 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-15 04:59:42.769  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.699 seconds (JVM running for 11.95)
Nov 15, 2022 5:00:01 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-15 05:00:22.693  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 05:00:22.705 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 05:00:22.750 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-15 05:00:22.754 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 05:00:22.770  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-15 05:00:22.773  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 05:00:22.774  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 05:00:22.775 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 05:00:22.775 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 05:00:22.779 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 05:00:22.787 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 05:00:22.790 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 05:00:22.858 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 05:00:22.864 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 05:00:22.865 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 05:00:22.868 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 05:00:23.509  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 05:00:23.511  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 05:00:23.511 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 05:00:23.514 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 05:00:23.535  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 05:00:23.539  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 05:00:23.540 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 05:00:23.541 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 05:00:23.542 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 05:00:23.569 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 05:00:23.569 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 05:00:23.570 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 05:00:23.576 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 05:00:23.577 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 05:00:23.577 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 05:00:23.579 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 05:00:23.621 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 447905603412452406015049344733110659143014204099
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 04:56:15 UTC 2022
           Final Date: Sun Nov 14 04:56:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4]
        modulus: b37ba55044791bf889b15fd98d37ac470ad4746ff7452e566b06ae1e5e63092503909fb657a7260d6e7cb04c73c284bb3ab9724a6df688a891cadbb08906220c93f0a8410489a28ffe85298752b40be6f234b198827f21aaf9b365587e23275ffd902f7b3250c6c357d9f3825e25f4b7bae00bc3cd12d1a7e94aed8821941274d2ca74c3125da409991a139fde0c1d3c41a8d72285c42de85ed645ae2510556376ac40cec714514c98e8ecde00dc67fc3dfafea6dc1f15bd77e56c1ac7db9a8e00b7abb96243cae023d835bf1ab28fdcca9a294fb719c9f3ae73094177381eca1a5ae4bed48200e8f8742f9f3548679f3a0967320033946ac628a17274df4f98e86d4ccafa741a37836068aa6213f810d5d381a1699aa6212d0f74c44c6bf58b0d63c0c4ccee7d24eeeca13547056af5cd1f9b6a7de1a813476794815b555617f60adee41390ad9585f27f0577a9107e38d604927a922a781be1f8744b3b0b09785f47548e1f5341d595dce2c4f566aee48fc220daa929f45b9209098cf4a021
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 71e8cf45241016b11c1a807bd5e871651a687a59
                       7959f3c8dc73ee5cf93630c62a9178d6caba2c76
                       81cf8b7f4a202cbe8f4791afe388461cdef64665
                       7b771ed77f336470f5edc5941a8f203a06161bce
                       8841d7630200ce83325cf4e5a1685dc60c944254
                       d7737cf9122ac15cefd633709e5c445c888a5c3b
                       a9d0bd949e115d215481c0e3e5578247453e6572
                       6586ea21fee55891a94f825846568a6e620cd1ce
                       9bf557e4cdd087c0d4482ec867db08ce2e7e8492
                       cb1fc5023556fd7fbbebdb45fd6cfd5373240fec
                       27485e4b16861a196c02d845f932d94cc5d42b86
                       c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583
                       806065b08876736bdb8756daa1525c6b1c9c6a32
                       bc67601846be5180ef18c89e3a56ffa8e89d4081
                       cd44aa75e771f5b5ab14de5d175a97e2bf0f760e
                       164dc892aba52aa7ae84da25037ee4be157f9fb0
                       e778dad90822932566df7b53cd35ef17241dd5a3
                       ffa1790af4d8dbf3731ff5b58a8601e496620617
                       3acc4d48459dff74456cd63075ea38a48fdc13f9
                       778b6440
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3f:b1:97:35:48:89:ed:02:1e:36:65:40:aa:71:c9:bf:6c:fa:d5:1b],[56:66:d1:a4]
        modulus: f4b0a0617f8a996f55b7690f5e7c613f3f8a6fbf387de3efa18bb66e01cab3ca8d805547376c1b0b49cecb634bcfd289dfa5c80b64dded20f5c1d846d48bc19f6f8ec7227aa3a40c7586968084d10bcd7510a8e32be653a3755bb76e8a9fb9a1711ec8fdbcb97595ccb616db4befc2a278506b4792a9171008e9ae69faaa0759c80e827245dc9ca62e036e69a1f9ae4d2a18269f7696e3e629c468e172d8fec004649ecdee3616c5528c2fd573cdd365a8554c1009276a40a697a3b9d4fd0e5be291a0dbc727fe75d77b1d8c5f13973ab84004b57b6cdab5946a758f319988020099807f7e2f53b24ace146764d78147154ec1009f14d609d179fec474ef345b
public exponent: 10001

] 
2022-11-15 06:19:59.247  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 06:19:59.251 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 06:19:59.255 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-15 06:19:59.257 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 06:19:59.258  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-15 06:19:59.260  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 06:19:59.260  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 06:19:59.261 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 06:19:59.262 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 06:19:59.263 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 06:19:59.269 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 06:19:59.272 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 06:19:59.273 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 06:19:59.274 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 06:19:59.500  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 06:19:59.501  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 06:19:59.502 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 06:19:59.503 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 06:19:59.508  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 06:19:59.509  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 06:19:59.510 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:19:59.511 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:19:59.511 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:19:59.513 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:19:59.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:19:59.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:19:59.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:19:59.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:19:59.517 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:19:59.519 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 06:19:59.527 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 447905603412452406015049344733110659143014204099
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 04:56:15 UTC 2022
           Final Date: Sun Nov 14 04:56:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 71e8cf45241016b11c1a807bd5e871651a687a59
                       7959f3c8dc73ee5cf93630c62a9178d6caba2c76
                       81cf8b7f4a202cbe8f4791afe388461cdef64665
                       7b771ed77f336470f5edc5941a8f203a06161bce
                       8841d7630200ce83325cf4e5a1685dc60c944254
                       d7737cf9122ac15cefd633709e5c445c888a5c3b
                       a9d0bd949e115d215481c0e3e5578247453e6572
                       6586ea21fee55891a94f825846568a6e620cd1ce
                       9bf557e4cdd087c0d4482ec867db08ce2e7e8492
                       cb1fc5023556fd7fbbebdb45fd6cfd5373240fec
                       27485e4b16861a196c02d845f932d94cc5d42b86
                       c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583
                       806065b08876736bdb8756daa1525c6b1c9c6a32
                       bc67601846be5180ef18c89e3a56ffa8e89d4081
                       cd44aa75e771f5b5ab14de5d175a97e2bf0f760e
                       164dc892aba52aa7ae84da25037ee4be157f9fb0
                       e778dad90822932566df7b53cd35ef17241dd5a3
                       ffa1790af4d8dbf3731ff5b58a8601e496620617
                       3acc4d48459dff74456cd63075ea38a48fdc13f9
                       778b6440
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [70:49:05:82:80:f3:52:07:8b:91:dd:42:e8:ae:94:0d:69:74:9c:a5],[56:66:d1:a4]
        modulus: d07046a60a4f263f14c3fdd92efa91983ee8ae94c0cf26eb852d28c00cf11e4e147c45a024ff3edfbbafa1e32175180bb4837ace8ad75c272b88bd84ad423bdf3f31cab1d91e50c7eff21f246b818609e06926420a582e37d0d38ebbdec5ddd6244836da28b4ba651110d525bf370fb26620c84a808e4dd298d22a7cea934655ae0545b6ac85c67b0a30250d3dd882bd0c53b358da36f3572ec7da70f9ead418fa3e04d1bf950d7c98a35a4dc4e542c11eb51dab79e481efa60cd5ad7bc6ff504e50f4e4a43237653435b71526979022c653e75337b147ab90b9bf8ab3198dd68d3352edcdd8e9cd501a524b5dbd04b558e7c6c46392d1dd9104ab803768c43f
public exponent: 10001

] 
2022-11-15 06:21:47.210  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 06:21:47.212 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 06:21:47.214 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-15 06:21:47.216 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 06:21:47.217  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-15 06:21:47.218  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 06:21:47.218  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 06:21:47.219 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 06:21:47.219 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 06:21:47.220 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 06:21:47.225 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 06:21:47.226 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 06:21:47.226 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 06:21:47.226 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 06:21:47.394  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 06:21:47.395  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 06:21:47.395 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 06:21:47.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 06:21:47.399  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 06:21:47.400  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 06:21:47.400 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:21:47.401 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:21:47.401 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:21:47.402 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:21:47.402 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:21:47.403 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:21:47.403 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:21:47.404 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:21:47.404 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:21:47.406 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 06:21:47.409 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 447905603412452406015049344733110659143014204099
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 04:56:15 UTC 2022
           Final Date: Sun Nov 14 04:56:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 71e8cf45241016b11c1a807bd5e871651a687a59
                       7959f3c8dc73ee5cf93630c62a9178d6caba2c76
                       81cf8b7f4a202cbe8f4791afe388461cdef64665
                       7b771ed77f336470f5edc5941a8f203a06161bce
                       8841d7630200ce83325cf4e5a1685dc60c944254
                       d7737cf9122ac15cefd633709e5c445c888a5c3b
                       a9d0bd949e115d215481c0e3e5578247453e6572
                       6586ea21fee55891a94f825846568a6e620cd1ce
                       9bf557e4cdd087c0d4482ec867db08ce2e7e8492
                       cb1fc5023556fd7fbbebdb45fd6cfd5373240fec
                       27485e4b16861a196c02d845f932d94cc5d42b86
                       c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583
                       806065b08876736bdb8756daa1525c6b1c9c6a32
                       bc67601846be5180ef18c89e3a56ffa8e89d4081
                       cd44aa75e771f5b5ab14de5d175a97e2bf0f760e
                       164dc892aba52aa7ae84da25037ee4be157f9fb0
                       e778dad90822932566df7b53cd35ef17241dd5a3
                       ffa1790af4d8dbf3731ff5b58a8601e496620617
                       3acc4d48459dff74456cd63075ea38a48fdc13f9
                       778b6440
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c9:eb:bb:cf:06:93:86:29:28:02:bd:41:0e:c2:04:e4:ff:a4:7d:d2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-15 06:23:25.569  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 06:23:25.577 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 06:23:25.578 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-15 06:23:25.579 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 06:23:25.579  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-15 06:23:25.580  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 06:23:25.580  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 06:23:25.581 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 06:23:25.581 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 06:23:25.581 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 06:23:25.585 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 06:23:25.586 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 06:23:25.586 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 06:23:25.586 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 06:23:25.744  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 06:23:25.745  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 06:23:25.745 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 06:23:25.746 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 06:23:25.753  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 06:23:25.761  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 06:23:25.761 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:23:25.762 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:23:25.762 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:23:25.763 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:23:25.763 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:23:25.764 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:23:25.764 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:23:25.764 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:23:25.765 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:23:25.765 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 06:23:25.785 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 447905603412452406015049344733110659143014204099
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 04:56:15 UTC 2022
           Final Date: Sun Nov 14 04:56:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 71e8cf45241016b11c1a807bd5e871651a687a59
                       7959f3c8dc73ee5cf93630c62a9178d6caba2c76
                       81cf8b7f4a202cbe8f4791afe388461cdef64665
                       7b771ed77f336470f5edc5941a8f203a06161bce
                       8841d7630200ce83325cf4e5a1685dc60c944254
                       d7737cf9122ac15cefd633709e5c445c888a5c3b
                       a9d0bd949e115d215481c0e3e5578247453e6572
                       6586ea21fee55891a94f825846568a6e620cd1ce
                       9bf557e4cdd087c0d4482ec867db08ce2e7e8492
                       cb1fc5023556fd7fbbebdb45fd6cfd5373240fec
                       27485e4b16861a196c02d845f932d94cc5d42b86
                       c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583
                       806065b08876736bdb8756daa1525c6b1c9c6a32
                       bc67601846be5180ef18c89e3a56ffa8e89d4081
                       cd44aa75e771f5b5ab14de5d175a97e2bf0f760e
                       164dc892aba52aa7ae84da25037ee4be157f9fb0
                       e778dad90822932566df7b53cd35ef17241dd5a3
                       ffa1790af4d8dbf3731ff5b58a8601e496620617
                       3acc4d48459dff74456cd63075ea38a48fdc13f9
                       778b6440
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2f:5f:8f:8e:f6:61:7a:27:a8:90:b0:06:53:ea:fe:0d:20:41:54:8d],[56:66:d1:a4]
        modulus: a2b6aa65c10930eb1d76689f430949c9f625f9117e5db22b5f3bd032e9c73016ddcf57eb5fa330a80e5be671a6238871037201581fae2196dc91d3743a455c9c05c64643c94530ed2e15e45d5b4859108cd740fc30e7a560404595e58c958e72f7e1524d945ab02ee33f8d7a7f23d937abbf759c977a8ede6c96f98673287456473a2b3fdb99fbaaf956105720eb834bd4d6948383c0760302dd3b838ca8e65d342fbf846484f9640195b64e412ef6c26cf6cabde432c7076466e4009d136b816d9bc5775726f2aea04629d3a5c92313e9d58c2dd812ef426d60a7cc026e3afe98bd8b6313ebe9191b48c534811c756df5d37f6bf484fbba20e0a696815a87c3
public exponent: 10001

] 
2022-11-15 06:26:27.211  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 06:26:27.213 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 06:26:27.215 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-15 06:26:27.216 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 06:26:27.217  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-15 06:26:27.217  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 06:26:27.218  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 06:26:27.218 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 06:26:27.219 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 06:26:27.219 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 06:26:27.223 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 06:26:27.224 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 06:26:27.224 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 06:26:27.224 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 06:26:27.372  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 06:26:27.373  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 06:26:27.373 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 06:26:27.373 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 06:26:27.375  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 06:26:27.375  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 06:26:27.376 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:26:27.376 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:26:27.376 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:26:27.377 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:26:27.378 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:26:27.378 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:26:27.379 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:26:27.379 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:26:27.379 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:26:27.380 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 06:26:27.383 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 447905603412452406015049344733110659143014204099
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 04:56:15 UTC 2022
           Final Date: Sun Nov 14 04:56:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 71e8cf45241016b11c1a807bd5e871651a687a59
                       7959f3c8dc73ee5cf93630c62a9178d6caba2c76
                       81cf8b7f4a202cbe8f4791afe388461cdef64665
                       7b771ed77f336470f5edc5941a8f203a06161bce
                       8841d7630200ce83325cf4e5a1685dc60c944254
                       d7737cf9122ac15cefd633709e5c445c888a5c3b
                       a9d0bd949e115d215481c0e3e5578247453e6572
                       6586ea21fee55891a94f825846568a6e620cd1ce
                       9bf557e4cdd087c0d4482ec867db08ce2e7e8492
                       cb1fc5023556fd7fbbebdb45fd6cfd5373240fec
                       27485e4b16861a196c02d845f932d94cc5d42b86
                       c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583
                       806065b08876736bdb8756daa1525c6b1c9c6a32
                       bc67601846be5180ef18c89e3a56ffa8e89d4081
                       cd44aa75e771f5b5ab14de5d175a97e2bf0f760e
                       164dc892aba52aa7ae84da25037ee4be157f9fb0
                       e778dad90822932566df7b53cd35ef17241dd5a3
                       ffa1790af4d8dbf3731ff5b58a8601e496620617
                       3acc4d48459dff74456cd63075ea38a48fdc13f9
                       778b6440
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:4c:a2:33:8a:bf:1e:6d:b7:2a:7a:83:df:d2:19:a3:6e:ab:b2:33],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-15 06:32:55.282  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 06:32:55.284 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 06:32:55.287 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-15 06:32:55.287 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 06:32:55.288  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-15 06:32:55.289  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 06:32:55.289  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 06:32:55.290 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 06:32:55.290 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 06:32:55.290 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 06:32:55.295 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 06:32:55.296 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 06:32:55.297 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 06:32:55.297 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 06:32:55.479  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 06:32:55.494  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 06:32:55.495 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 06:32:55.495 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 06:32:55.497  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 06:32:55.497  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 06:32:55.498 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:32:55.499 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:32:55.499 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:32:55.500 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:32:55.501 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:32:55.501 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:32:55.502 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:32:55.502 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:32:55.503 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:32:55.504 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 06:32:55.507 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 447905603412452406015049344733110659143014204099
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 04:56:15 UTC 2022
           Final Date: Sun Nov 14 04:56:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 71e8cf45241016b11c1a807bd5e871651a687a59
                       7959f3c8dc73ee5cf93630c62a9178d6caba2c76
                       81cf8b7f4a202cbe8f4791afe388461cdef64665
                       7b771ed77f336470f5edc5941a8f203a06161bce
                       8841d7630200ce83325cf4e5a1685dc60c944254
                       d7737cf9122ac15cefd633709e5c445c888a5c3b
                       a9d0bd949e115d215481c0e3e5578247453e6572
                       6586ea21fee55891a94f825846568a6e620cd1ce
                       9bf557e4cdd087c0d4482ec867db08ce2e7e8492
                       cb1fc5023556fd7fbbebdb45fd6cfd5373240fec
                       27485e4b16861a196c02d845f932d94cc5d42b86
                       c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583
                       806065b08876736bdb8756daa1525c6b1c9c6a32
                       bc67601846be5180ef18c89e3a56ffa8e89d4081
                       cd44aa75e771f5b5ab14de5d175a97e2bf0f760e
                       164dc892aba52aa7ae84da25037ee4be157f9fb0
                       e778dad90822932566df7b53cd35ef17241dd5a3
                       ffa1790af4d8dbf3731ff5b58a8601e496620617
                       3acc4d48459dff74456cd63075ea38a48fdc13f9
                       778b6440
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [db:58:da:e1:2a:bc:e4:c2:d5:cb:c1:9d:2d:35:50:ff:9a:c0:49:7c],[56:66:d1:a4]
        modulus: deb5196cbea2b501e1176cc66770b96f11dffd300c1a8748054d1e24dfe85d69b5068140692d946171ba3b69502bb5f3c6dc266ba5a96428ace950da87230cfc3994c10f2b7475474cc0c7d12807991d2d481cf6aca5dcb5c710d0b797a7628e1bb032597f6b4119bac59c6cf607d02d2c7377ce3e2bca4b9a95b145a586c621145137a8ff8a103d04754854a793056f153c2cdd0acca192541033ea9ac1c8af2dd32bbe33dbc49b5fc8d78212c4cd6f9c0e41463fe59c4887c00eee2882601c2b52e16b7fb67bed1dad76b2de1dce76a1487487d4c1b076b8a6bc3d3dbcc7bac5f02e416f485bb007e4099f5ba6fad1a8f52d14931a01291821a33942f7b577
public exponent: 10001

] 
2022-11-15 06:39:03.768  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 06:39:03.771 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 06:39:03.774 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-15 06:39:03.775 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 06:39:03.776  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-15 06:39:03.776  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 06:39:03.777  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 06:39:03.777 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 06:39:03.777 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 06:39:03.778 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 06:39:03.782 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 06:39:03.783 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 06:39:03.783 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 06:39:03.784 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 06:39:03.970  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 06:39:03.971  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 06:39:03.971 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 06:39:03.972 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 06:39:03.973  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 06:39:03.974  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 06:39:03.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:39:03.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:39:03.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:39:03.976 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:39:03.976 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:39:03.977 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:39:03.978 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:39:03.978 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:39:03.978 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:39:03.979 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 06:39:03.983 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 447905603412452406015049344733110659143014204099
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 04:56:15 UTC 2022
           Final Date: Sun Nov 14 04:56:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 71e8cf45241016b11c1a807bd5e871651a687a59
                       7959f3c8dc73ee5cf93630c62a9178d6caba2c76
                       81cf8b7f4a202cbe8f4791afe388461cdef64665
                       7b771ed77f336470f5edc5941a8f203a06161bce
                       8841d7630200ce83325cf4e5a1685dc60c944254
                       d7737cf9122ac15cefd633709e5c445c888a5c3b
                       a9d0bd949e115d215481c0e3e5578247453e6572
                       6586ea21fee55891a94f825846568a6e620cd1ce
                       9bf557e4cdd087c0d4482ec867db08ce2e7e8492
                       cb1fc5023556fd7fbbebdb45fd6cfd5373240fec
                       27485e4b16861a196c02d845f932d94cc5d42b86
                       c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583
                       806065b08876736bdb8756daa1525c6b1c9c6a32
                       bc67601846be5180ef18c89e3a56ffa8e89d4081
                       cd44aa75e771f5b5ab14de5d175a97e2bf0f760e
                       164dc892aba52aa7ae84da25037ee4be157f9fb0
                       e778dad90822932566df7b53cd35ef17241dd5a3
                       ffa1790af4d8dbf3731ff5b58a8601e496620617
                       3acc4d48459dff74456cd63075ea38a48fdc13f9
                       778b6440
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a1:95:7a:ef:43:07:bf:41:7e:0a:89:0d:9c:c6:bc:80:60:98:2b:d4],[56:66:d1:a4]
        modulus: daf85b43a49ecacee413fc08f505c07d2115ddc77403cf6dd72caf788ea9744fd1d096e030dadcbf9023ecd8f0bb8b20599a03ae689b59b634215665acd1e5320ed23226eebbd2e4708bbbba9c6f26da3ff6ef23348d4d1e1229f2a858c692eca50d35e6e4697e56f1c9e91daf3810aa4ee00cf75335755ff0874da8dcae7b71f31970403ee1e48563fdd04eab06542dbfe4cad380455fe74623c1d8550c5006221e4d13675165bfe6607fa6110739084463a214536a3864c6ca62a9ff53b59281bff87cee6b5cc503455bc05780a6c2f0e96a8c32a524297a91334058b7b1fe2909ba13cd696d201686d2b7e4ca4f04ac1db2c0eb0180ec29b94b055fdd6a45
public exponent: 10001

] 
2022-11-15 06:39:24.654  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 06:39:24.655 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 06:39:24.657 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-15 06:39:24.658 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 06:39:24.658  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-15 06:39:24.658  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 06:39:24.659  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 06:39:24.659 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 06:39:24.659 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 06:39:24.660 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 06:39:24.663 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 06:39:24.664 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 06:39:24.664 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 06:39:24.665 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 06:39:24.795  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 06:39:24.796  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 06:39:24.796 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 06:39:24.797 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 06:39:24.798  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 06:39:24.799  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 06:39:24.799 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:39:24.799 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:39:24.800 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:39:24.800 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:39:24.801 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:39:24.801 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:39:24.802 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 06:39:24.802 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 06:39:24.802 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 06:39:24.803 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 06:39:24.806 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 447905603412452406015049344733110659143014204099
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 04:56:15 UTC 2022
           Final Date: Sun Nov 14 04:56:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 71e8cf45241016b11c1a807bd5e871651a687a59
                       7959f3c8dc73ee5cf93630c62a9178d6caba2c76
                       81cf8b7f4a202cbe8f4791afe388461cdef64665
                       7b771ed77f336470f5edc5941a8f203a06161bce
                       8841d7630200ce83325cf4e5a1685dc60c944254
                       d7737cf9122ac15cefd633709e5c445c888a5c3b
                       a9d0bd949e115d215481c0e3e5578247453e6572
                       6586ea21fee55891a94f825846568a6e620cd1ce
                       9bf557e4cdd087c0d4482ec867db08ce2e7e8492
                       cb1fc5023556fd7fbbebdb45fd6cfd5373240fec
                       27485e4b16861a196c02d845f932d94cc5d42b86
                       c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583
                       806065b08876736bdb8756daa1525c6b1c9c6a32
                       bc67601846be5180ef18c89e3a56ffa8e89d4081
                       cd44aa75e771f5b5ab14de5d175a97e2bf0f760e
                       164dc892aba52aa7ae84da25037ee4be157f9fb0
                       e778dad90822932566df7b53cd35ef17241dd5a3
                       ffa1790af4d8dbf3731ff5b58a8601e496620617
                       3acc4d48459dff74456cd63075ea38a48fdc13f9
                       778b6440
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:de:3f:03:37:98:2b:c3:eb:df:bd:51:57:57:23:5a:de:83:d7:25],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-15 07:03:32.153  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 07:03:32.156 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 07:03:32.159 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-15 07:03:32.160 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 07:03:32.160  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-15 07:03:32.161  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 07:03:32.161  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 07:03:32.161 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 07:03:32.162 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 07:03:32.162 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 07:03:32.166 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 07:03:32.167 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 07:03:32.167 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 07:03:32.167 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 07:03:32.338  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 07:03:32.339  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 07:03:32.339 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 07:03:32.340 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 07:03:32.342  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 07:03:32.342  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 07:03:32.342 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 07:03:32.343 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 07:03:32.343 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 07:03:32.344 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 07:03:32.344 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 07:03:32.344 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 07:03:32.345 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 07:03:32.345 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 07:03:32.345 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 07:03:32.346 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 07:03:32.350 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 447905603412452406015049344733110659143014204099
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 04:56:15 UTC 2022
           Final Date: Sun Nov 14 04:56:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 71e8cf45241016b11c1a807bd5e871651a687a59
                       7959f3c8dc73ee5cf93630c62a9178d6caba2c76
                       81cf8b7f4a202cbe8f4791afe388461cdef64665
                       7b771ed77f336470f5edc5941a8f203a06161bce
                       8841d7630200ce83325cf4e5a1685dc60c944254
                       d7737cf9122ac15cefd633709e5c445c888a5c3b
                       a9d0bd949e115d215481c0e3e5578247453e6572
                       6586ea21fee55891a94f825846568a6e620cd1ce
                       9bf557e4cdd087c0d4482ec867db08ce2e7e8492
                       cb1fc5023556fd7fbbebdb45fd6cfd5373240fec
                       27485e4b16861a196c02d845f932d94cc5d42b86
                       c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583
                       806065b08876736bdb8756daa1525c6b1c9c6a32
                       bc67601846be5180ef18c89e3a56ffa8e89d4081
                       cd44aa75e771f5b5ab14de5d175a97e2bf0f760e
                       164dc892aba52aa7ae84da25037ee4be157f9fb0
                       e778dad90822932566df7b53cd35ef17241dd5a3
                       ffa1790af4d8dbf3731ff5b58a8601e496620617
                       3acc4d48459dff74456cd63075ea38a48fdc13f9
                       778b6440
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5e:2c:4c:bd:0d:8b:c3:ab:cc:49:be:23:12:f0:8d:42:0c:d3:cd:94],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-15 07:03:39.013  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 07:03:39.016 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 07:03:39.018 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-15 07:03:39.018 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 07:03:39.018  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-15 07:03:39.019  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 07:03:39.019  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 07:03:39.020 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 07:03:39.020 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 07:03:39.021 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 07:03:39.024 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 07:03:39.024 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 07:03:39.025 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 07:03:39.030 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 07:03:39.194  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 07:03:39.195  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 07:03:39.195 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 07:03:39.195 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 07:03:39.201  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 07:03:39.202  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 07:03:39.203 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 07:03:39.203 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 07:03:39.203 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 07:03:39.204 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 07:03:39.204 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 07:03:39.204 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 07:03:39.207 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 07:03:39.207 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 07:03:39.207 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 07:03:39.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 07:03:39.212 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 447905603412452406015049344733110659143014204099
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 04:56:15 UTC 2022
           Final Date: Sun Nov 14 04:56:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cf:b5:3c:1b:2e:52:a6:41:98:0c:99:09:fe:a7:bb:43:1c:91:3b:78],[56:66:d1:a4]
        modulus: b37ba55044791bf889b15fd98d37ac470ad4746ff7452e566b06ae1e5e63092503909fb657a7260d6e7cb04c73c284bb3ab9724a6df688a891cadbb08906220c93f0a8410489a28ffe85298752b40be6f234b198827f21aaf9b365587e23275ffd902f7b3250c6c357d9f3825e25f4b7bae00bc3cd12d1a7e94aed8821941274d2ca74c3125da409991a139fde0c1d3c41a8d72285c42de85ed645ae2510556376ac40cec714514c98e8ecde00dc67fc3dfafea6dc1f15bd77e56c1ac7db9a8e00b7abb96243cae023d835bf1ab28fdcca9a294fb719c9f3ae73094177381eca1a5ae4bed48200e8f8742f9f3548679f3a0967320033946ac628a17274df4f98e86d4ccafa741a37836068aa6213f810d5d381a1699aa6212d0f74c44c6bf58b0d63c0c4ccee7d24eeeca13547056af5cd1f9b6a7de1a813476794815b555617f60adee41390ad9585f27f0577a9107e38d604927a922a781be1f8744b3b0b09785f47548e1f5341d595dce2c4f566aee48fc220daa929f45b9209098cf4a021
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 71e8cf45241016b11c1a807bd5e871651a687a59
                       7959f3c8dc73ee5cf93630c62a9178d6caba2c76
                       81cf8b7f4a202cbe8f4791afe388461cdef64665
                       7b771ed77f336470f5edc5941a8f203a06161bce
                       8841d7630200ce83325cf4e5a1685dc60c944254
                       d7737cf9122ac15cefd633709e5c445c888a5c3b
                       a9d0bd949e115d215481c0e3e5578247453e6572
                       6586ea21fee55891a94f825846568a6e620cd1ce
                       9bf557e4cdd087c0d4482ec867db08ce2e7e8492
                       cb1fc5023556fd7fbbebdb45fd6cfd5373240fec
                       27485e4b16861a196c02d845f932d94cc5d42b86
                       c4cb4f29ea2b38d4f763bbcbf0f51ee76d81c583
                       806065b08876736bdb8756daa1525c6b1c9c6a32
                       bc67601846be5180ef18c89e3a56ffa8e89d4081
                       cd44aa75e771f5b5ab14de5d175a97e2bf0f760e
                       164dc892aba52aa7ae84da25037ee4be157f9fb0
                       e778dad90822932566df7b53cd35ef17241dd5a3
                       ffa1790af4d8dbf3731ff5b58a8601e496620617
                       3acc4d48459dff74456cd63075ea38a48fdc13f9
                       778b6440
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [53:48:28:cd:fd:4a:f0:14:dd:e7:dc:10:c9:47:cc:55:b0:d8:d2:d4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]