Results

By type

          2023-01-12 05:10:45,294 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-01-12 05:10:46,281 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-01-12 05:10:47.041  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jan 12, 2023 5:10:48 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jan 12, 2023 5:10:48 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jan 12, 2023 5:10:48 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jan 12, 2023 5:10:49 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-01-12 05:10:49.514 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-01-12 05:10:49.794  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-01-12 05:10:49.980  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-01-12 05:10:50.592 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-01-12 05:10:50.595 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2023-01-12 05:10:50.596 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-01-12 05:10:50.600 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-01-12 05:10:50.635 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2023-01-12 05:10:50.638 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2023-01-12 05:10:50.751 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-01-12 05:10:51.298 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jan 12, 2023 5:10:51 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-01-12 05:10:52.126  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.672 seconds (JVM running for 9.445)
Jan 12, 2023 5:11:14 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-01-12 05:11:25.475  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 05:11:25.481 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 05:11:25.519 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-12 05:11:25.522 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 05:11:25.539  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-12 05:11:25.542  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 05:11:25.542  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 05:11:25.544 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 05:11:25.544 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 05:11:25.548 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 05:11:25.560 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 05:11:25.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 05:11:25.621 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 05:11:25.626 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 05:11:25.627 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 05:11:25.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 05:11:26.194  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 05:11:26.197  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 05:11:26.197 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 05:11:26.199 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 05:11:26.207  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 05:11:26.214  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 05:11:26.214 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:11:26.215 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:11:26.215 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:11:26.230 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:11:26.230 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:11:26.231 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:11:26.236 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:11:26.236 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:11:26.236 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:11:26.238 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 05:11:26.272 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 550416598802666770086659060677776857014142515167
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 05:08:38 UTC 2023
           Final Date: Tue Jan 11 05:08:37 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:83:57:36:62:61:a6:01:aa:1a:d6:d4:46:8d:9d:24:39:bf:12:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e27891613277ce558971fb9a67ea726f77e54ae
                       9e1f9e7f90315162a82f4a3377164b60d8a3e193
                       2fa63b0387c7917a26f92776600f0a24fad9c371
                       748123965f707025afb102e47cdf5edf4948c384
                       f073db3b232610dfa2414184a1a84faaaf6cbc9b
                       b983e0da92e79a31a92f1744609346e662cdcec2
                       a07fff377d0cf3c08979fbd787290eb1f0eb7666
                       17a572a9b6f6357bc0823e69d728d7f4c2024d70
                       1d09493d27e258f0cbf66819a77773a4ead15865
                       daa9376e4f729e62a4a0e4400bae4a03a2c023a5
                       4f0479d3e6cee3534e0f46743b3018e3b7e98cdc
                       2316efe884a34770b57fada04ea9b11fd2a635c4
                       b337b972ba485bcdf2e7f49dedd5e5297fbe8ce6
                       de6c25d7a51b7d26202a45c9d1207a50f7aab63f
                       2fd63ed5af7a611e7c65db945b5e5075f718f4c0
                       2a7f2295ac1a52b21da10830d73b495ddd71bc7e
                       f3b1f0c0db99baed8e8c285d2d459eafc1ccf636
                       73695b896d173d35fbf17ef412e7c2c36049380c
                       977613fa90969297086f04860c57cbee1cb7d5c8
                       7a3ca399
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:30:60:92:ed:98:3d:66:20:63:03:28:23:ba:cb:91:d9:2d:63:15],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 06:51:26.524  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 06:51:26.529 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 06:51:26.535 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-12 06:51:26.537 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 06:51:26.537  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-12 06:51:26.540  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 06:51:26.541  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 06:51:26.542 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 06:51:26.543 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 06:51:26.544 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 06:51:26.552 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 06:51:26.553 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 06:51:26.554 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 06:51:26.554 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 06:51:26.741  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 06:51:26.743  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 06:51:26.743 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 06:51:26.744 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 06:51:26.747  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 06:51:26.748  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 06:51:26.749 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:51:26.749 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:51:26.750 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:51:26.751 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:51:26.751 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:51:26.752 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:51:26.753 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:51:26.753 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:51:26.753 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:51:26.754 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 06:51:26.761 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 550416598802666770086659060677776857014142515167
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 05:08:38 UTC 2023
           Final Date: Tue Jan 11 05:08:37 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:83:57:36:62:61:a6:01:aa:1a:d6:d4:46:8d:9d:24:39:bf:12:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e27891613277ce558971fb9a67ea726f77e54ae
                       9e1f9e7f90315162a82f4a3377164b60d8a3e193
                       2fa63b0387c7917a26f92776600f0a24fad9c371
                       748123965f707025afb102e47cdf5edf4948c384
                       f073db3b232610dfa2414184a1a84faaaf6cbc9b
                       b983e0da92e79a31a92f1744609346e662cdcec2
                       a07fff377d0cf3c08979fbd787290eb1f0eb7666
                       17a572a9b6f6357bc0823e69d728d7f4c2024d70
                       1d09493d27e258f0cbf66819a77773a4ead15865
                       daa9376e4f729e62a4a0e4400bae4a03a2c023a5
                       4f0479d3e6cee3534e0f46743b3018e3b7e98cdc
                       2316efe884a34770b57fada04ea9b11fd2a635c4
                       b337b972ba485bcdf2e7f49dedd5e5297fbe8ce6
                       de6c25d7a51b7d26202a45c9d1207a50f7aab63f
                       2fd63ed5af7a611e7c65db945b5e5075f718f4c0
                       2a7f2295ac1a52b21da10830d73b495ddd71bc7e
                       f3b1f0c0db99baed8e8c285d2d459eafc1ccf636
                       73695b896d173d35fbf17ef412e7c2c36049380c
                       977613fa90969297086f04860c57cbee1cb7d5c8
                       7a3ca399
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1c:b1:bc:64:8f:46:07:bb:83:22:9c:40:84:53:78:95:1f:cb:64:34],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 06:58:36.940  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 06:58:36.943 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 06:58:36.946 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-12 06:58:36.947 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 06:58:36.948  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-12 06:58:36.949  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 06:58:36.950  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 06:58:36.950 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 06:58:36.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 06:58:36.953 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 06:58:36.958 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 06:58:36.960 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 06:58:36.960 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 06:58:36.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 06:58:37.097  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 06:58:37.098  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 06:58:37.099 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 06:58:37.099 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 06:58:37.101  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 06:58:37.102  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 06:58:37.102 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:58:37.103 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:58:37.103 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:58:37.105 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:58:37.105 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:58:37.105 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:58:37.106 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:58:37.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:58:37.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:58:37.109 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 06:58:37.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 550416598802666770086659060677776857014142515167
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 05:08:38 UTC 2023
           Final Date: Tue Jan 11 05:08:37 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:83:57:36:62:61:a6:01:aa:1a:d6:d4:46:8d:9d:24:39:bf:12:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e27891613277ce558971fb9a67ea726f77e54ae
                       9e1f9e7f90315162a82f4a3377164b60d8a3e193
                       2fa63b0387c7917a26f92776600f0a24fad9c371
                       748123965f707025afb102e47cdf5edf4948c384
                       f073db3b232610dfa2414184a1a84faaaf6cbc9b
                       b983e0da92e79a31a92f1744609346e662cdcec2
                       a07fff377d0cf3c08979fbd787290eb1f0eb7666
                       17a572a9b6f6357bc0823e69d728d7f4c2024d70
                       1d09493d27e258f0cbf66819a77773a4ead15865
                       daa9376e4f729e62a4a0e4400bae4a03a2c023a5
                       4f0479d3e6cee3534e0f46743b3018e3b7e98cdc
                       2316efe884a34770b57fada04ea9b11fd2a635c4
                       b337b972ba485bcdf2e7f49dedd5e5297fbe8ce6
                       de6c25d7a51b7d26202a45c9d1207a50f7aab63f
                       2fd63ed5af7a611e7c65db945b5e5075f718f4c0
                       2a7f2295ac1a52b21da10830d73b495ddd71bc7e
                       f3b1f0c0db99baed8e8c285d2d459eafc1ccf636
                       73695b896d173d35fbf17ef412e7c2c36049380c
                       977613fa90969297086f04860c57cbee1cb7d5c8
                       7a3ca399
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2f:c5:90:2f:3f:a7:47:53:84:65:b0:09:e2:ba:f8:9b:82:84:16:c0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 07:00:26.093  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 07:00:26.094 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 07:00:26.096 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-12 07:00:26.097 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 07:00:26.097  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-12 07:00:26.098  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 07:00:26.099  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 07:00:26.099 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 07:00:26.099 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 07:00:26.100 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 07:00:26.104 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 07:00:26.105 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 07:00:26.105 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 07:00:26.105 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 07:00:26.237  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 07:00:26.238  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 07:00:26.238 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 07:00:26.239 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 07:00:26.241  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 07:00:26.242  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 07:00:26.243 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:00:26.244 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:00:26.244 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:00:26.245 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:00:26.246 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:00:26.246 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:00:26.247 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:00:26.247 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:00:26.248 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:00:26.249 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 07:00:26.253 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 550416598802666770086659060677776857014142515167
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 05:08:38 UTC 2023
           Final Date: Tue Jan 11 05:08:37 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:83:57:36:62:61:a6:01:aa:1a:d6:d4:46:8d:9d:24:39:bf:12:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e27891613277ce558971fb9a67ea726f77e54ae
                       9e1f9e7f90315162a82f4a3377164b60d8a3e193
                       2fa63b0387c7917a26f92776600f0a24fad9c371
                       748123965f707025afb102e47cdf5edf4948c384
                       f073db3b232610dfa2414184a1a84faaaf6cbc9b
                       b983e0da92e79a31a92f1744609346e662cdcec2
                       a07fff377d0cf3c08979fbd787290eb1f0eb7666
                       17a572a9b6f6357bc0823e69d728d7f4c2024d70
                       1d09493d27e258f0cbf66819a77773a4ead15865
                       daa9376e4f729e62a4a0e4400bae4a03a2c023a5
                       4f0479d3e6cee3534e0f46743b3018e3b7e98cdc
                       2316efe884a34770b57fada04ea9b11fd2a635c4
                       b337b972ba485bcdf2e7f49dedd5e5297fbe8ce6
                       de6c25d7a51b7d26202a45c9d1207a50f7aab63f
                       2fd63ed5af7a611e7c65db945b5e5075f718f4c0
                       2a7f2295ac1a52b21da10830d73b495ddd71bc7e
                       f3b1f0c0db99baed8e8c285d2d459eafc1ccf636
                       73695b896d173d35fbf17ef412e7c2c36049380c
                       977613fa90969297086f04860c57cbee1cb7d5c8
                       7a3ca399
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [25:d8:b1:30:bb:34:4f:13:7c:3e:69:00:b1:4d:68:38:2f:45:52:aa],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 07:03:34.006  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 07:03:34.009 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 07:03:34.010 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-12 07:03:34.011 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 07:03:34.012  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-12 07:03:34.013  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 07:03:34.014  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 07:03:34.015 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 07:03:34.016 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 07:03:34.017 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 07:03:34.022 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 07:03:34.023 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 07:03:34.023 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 07:03:34.024 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 07:03:34.184  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 07:03:34.185  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 07:03:34.186 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 07:03:34.186 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 07:03:34.188  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 07:03:34.189  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 07:03:34.189 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:03:34.189 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:03:34.190 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:03:34.190 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:03:34.191 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:03:34.191 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:03:34.192 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:03:34.192 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:03:34.192 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:03:34.193 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 07:03:34.196 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 550416598802666770086659060677776857014142515167
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 05:08:38 UTC 2023
           Final Date: Tue Jan 11 05:08:37 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:83:57:36:62:61:a6:01:aa:1a:d6:d4:46:8d:9d:24:39:bf:12:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e27891613277ce558971fb9a67ea726f77e54ae
                       9e1f9e7f90315162a82f4a3377164b60d8a3e193
                       2fa63b0387c7917a26f92776600f0a24fad9c371
                       748123965f707025afb102e47cdf5edf4948c384
                       f073db3b232610dfa2414184a1a84faaaf6cbc9b
                       b983e0da92e79a31a92f1744609346e662cdcec2
                       a07fff377d0cf3c08979fbd787290eb1f0eb7666
                       17a572a9b6f6357bc0823e69d728d7f4c2024d70
                       1d09493d27e258f0cbf66819a77773a4ead15865
                       daa9376e4f729e62a4a0e4400bae4a03a2c023a5
                       4f0479d3e6cee3534e0f46743b3018e3b7e98cdc
                       2316efe884a34770b57fada04ea9b11fd2a635c4
                       b337b972ba485bcdf2e7f49dedd5e5297fbe8ce6
                       de6c25d7a51b7d26202a45c9d1207a50f7aab63f
                       2fd63ed5af7a611e7c65db945b5e5075f718f4c0
                       2a7f2295ac1a52b21da10830d73b495ddd71bc7e
                       f3b1f0c0db99baed8e8c285d2d459eafc1ccf636
                       73695b896d173d35fbf17ef412e7c2c36049380c
                       977613fa90969297086f04860c57cbee1cb7d5c8
                       7a3ca399
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c6:44:4c:bd:dc:de:f1:0e:a9:7a:5d:a0:b8:41:64:11:71:78:4c:d6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 07:06:46.799  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 07:06:46.801 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 07:06:46.802 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-12 07:06:46.802 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 07:06:46.803  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-12 07:06:46.804  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 07:06:46.804  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 07:06:46.804 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 07:06:46.805 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 07:06:46.805 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 07:06:46.809 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 07:06:46.810 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 07:06:46.810 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 07:06:46.810 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 07:06:46.955  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 07:06:46.956  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 07:06:46.956 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 07:06:46.957 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 07:06:46.958  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 07:06:46.959  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 07:06:46.959 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:06:46.960 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:06:46.960 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:06:46.961 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:06:46.962 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:06:46.962 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:06:46.963 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:06:46.963 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:06:46.964 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:06:46.965 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 07:06:46.969 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 550416598802666770086659060677776857014142515167
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 05:08:38 UTC 2023
           Final Date: Tue Jan 11 05:08:37 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:83:57:36:62:61:a6:01:aa:1a:d6:d4:46:8d:9d:24:39:bf:12:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e27891613277ce558971fb9a67ea726f77e54ae
                       9e1f9e7f90315162a82f4a3377164b60d8a3e193
                       2fa63b0387c7917a26f92776600f0a24fad9c371
                       748123965f707025afb102e47cdf5edf4948c384
                       f073db3b232610dfa2414184a1a84faaaf6cbc9b
                       b983e0da92e79a31a92f1744609346e662cdcec2
                       a07fff377d0cf3c08979fbd787290eb1f0eb7666
                       17a572a9b6f6357bc0823e69d728d7f4c2024d70
                       1d09493d27e258f0cbf66819a77773a4ead15865
                       daa9376e4f729e62a4a0e4400bae4a03a2c023a5
                       4f0479d3e6cee3534e0f46743b3018e3b7e98cdc
                       2316efe884a34770b57fada04ea9b11fd2a635c4
                       b337b972ba485bcdf2e7f49dedd5e5297fbe8ce6
                       de6c25d7a51b7d26202a45c9d1207a50f7aab63f
                       2fd63ed5af7a611e7c65db945b5e5075f718f4c0
                       2a7f2295ac1a52b21da10830d73b495ddd71bc7e
                       f3b1f0c0db99baed8e8c285d2d459eafc1ccf636
                       73695b896d173d35fbf17ef412e7c2c36049380c
                       977613fa90969297086f04860c57cbee1cb7d5c8
                       7a3ca399
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:22:ad:18:eb:e8:1d:dc:c7:72:5b:b7:bc:9e:90:cf:b8:44:b9:5a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 07:15:25.932  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 07:15:25.936 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 07:15:25.940 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-12 07:15:25.941 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 07:15:25.941  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-12 07:15:25.942  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 07:15:25.943  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 07:15:25.943 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 07:15:25.944 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 07:15:25.944 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 07:15:25.949 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 07:15:25.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 07:15:25.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 07:15:25.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 07:15:26.079  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 07:15:26.080  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 07:15:26.080 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 07:15:26.080 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 07:15:26.082  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 07:15:26.082  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 07:15:26.082 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:15:26.083 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:15:26.084 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:15:26.085 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:15:26.085 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:15:26.085 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:15:26.086 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:15:26.086 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:15:26.087 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:15:26.088 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 07:15:26.091 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 550416598802666770086659060677776857014142515167
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 05:08:38 UTC 2023
           Final Date: Tue Jan 11 05:08:37 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:83:57:36:62:61:a6:01:aa:1a:d6:d4:46:8d:9d:24:39:bf:12:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e27891613277ce558971fb9a67ea726f77e54ae
                       9e1f9e7f90315162a82f4a3377164b60d8a3e193
                       2fa63b0387c7917a26f92776600f0a24fad9c371
                       748123965f707025afb102e47cdf5edf4948c384
                       f073db3b232610dfa2414184a1a84faaaf6cbc9b
                       b983e0da92e79a31a92f1744609346e662cdcec2
                       a07fff377d0cf3c08979fbd787290eb1f0eb7666
                       17a572a9b6f6357bc0823e69d728d7f4c2024d70
                       1d09493d27e258f0cbf66819a77773a4ead15865
                       daa9376e4f729e62a4a0e4400bae4a03a2c023a5
                       4f0479d3e6cee3534e0f46743b3018e3b7e98cdc
                       2316efe884a34770b57fada04ea9b11fd2a635c4
                       b337b972ba485bcdf2e7f49dedd5e5297fbe8ce6
                       de6c25d7a51b7d26202a45c9d1207a50f7aab63f
                       2fd63ed5af7a611e7c65db945b5e5075f718f4c0
                       2a7f2295ac1a52b21da10830d73b495ddd71bc7e
                       f3b1f0c0db99baed8e8c285d2d459eafc1ccf636
                       73695b896d173d35fbf17ef412e7c2c36049380c
                       977613fa90969297086f04860c57cbee1cb7d5c8
                       7a3ca399
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:7e:8b:88:e9:eb:a5:f3:03:81:a1:0e:bc:13:d6:b6:d0:6e:54:3b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 07:22:10.389  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 07:22:10.390 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 07:22:10.392 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-12 07:22:10.392 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 07:22:10.392  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-12 07:22:10.393  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 07:22:10.393  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 07:22:10.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 07:22:10.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 07:22:10.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 07:22:10.398 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 07:22:10.398 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 07:22:10.398 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 07:22:10.399 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 07:22:10.581  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 07:22:10.582  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 07:22:10.582 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 07:22:10.582 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 07:22:10.583  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 07:22:10.584  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 07:22:10.584 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:22:10.585 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:22:10.585 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:22:10.586 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:22:10.586 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:22:10.586 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:22:10.587 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:22:10.587 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:22:10.587 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:22:10.588 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 07:22:10.590 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 550416598802666770086659060677776857014142515167
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 05:08:38 UTC 2023
           Final Date: Tue Jan 11 05:08:37 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:83:57:36:62:61:a6:01:aa:1a:d6:d4:46:8d:9d:24:39:bf:12:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e27891613277ce558971fb9a67ea726f77e54ae
                       9e1f9e7f90315162a82f4a3377164b60d8a3e193
                       2fa63b0387c7917a26f92776600f0a24fad9c371
                       748123965f707025afb102e47cdf5edf4948c384
                       f073db3b232610dfa2414184a1a84faaaf6cbc9b
                       b983e0da92e79a31a92f1744609346e662cdcec2
                       a07fff377d0cf3c08979fbd787290eb1f0eb7666
                       17a572a9b6f6357bc0823e69d728d7f4c2024d70
                       1d09493d27e258f0cbf66819a77773a4ead15865
                       daa9376e4f729e62a4a0e4400bae4a03a2c023a5
                       4f0479d3e6cee3534e0f46743b3018e3b7e98cdc
                       2316efe884a34770b57fada04ea9b11fd2a635c4
                       b337b972ba485bcdf2e7f49dedd5e5297fbe8ce6
                       de6c25d7a51b7d26202a45c9d1207a50f7aab63f
                       2fd63ed5af7a611e7c65db945b5e5075f718f4c0
                       2a7f2295ac1a52b21da10830d73b495ddd71bc7e
                       f3b1f0c0db99baed8e8c285d2d459eafc1ccf636
                       73695b896d173d35fbf17ef412e7c2c36049380c
                       977613fa90969297086f04860c57cbee1cb7d5c8
                       7a3ca399
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:e4:66:5d:b1:f9:34:66:b1:5b:33:bf:ba:13:c2:7f:4b:09:de:af],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 07:29:36.518  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 07:29:36.519 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 07:29:36.521 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-12 07:29:36.521 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 07:29:36.522  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-12 07:29:36.522  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 07:29:36.522  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 07:29:36.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 07:29:36.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 07:29:36.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 07:29:36.527 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 07:29:36.527 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 07:29:36.527 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 07:29:36.527 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 07:29:36.661  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 07:29:36.661  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 07:29:36.661 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 07:29:36.662 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 07:29:36.663  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 07:29:36.663  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 07:29:36.663 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:29:36.664 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:29:36.664 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:29:36.664 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:29:36.665 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:29:36.665 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:29:36.666 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:29:36.666 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:29:36.667 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:29:36.667 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 07:29:36.671 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 550416598802666770086659060677776857014142515167
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 05:08:38 UTC 2023
           Final Date: Tue Jan 11 05:08:37 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:83:57:36:62:61:a6:01:aa:1a:d6:d4:46:8d:9d:24:39:bf:12:bf],[56:66:d1:a4]
        modulus: a558679984ee3d16c3f6b8c73141443563637da9e7610d963a07ccf1f17c73a6e3684a33b87e534baf4396679bc142b97c78c38377f4d23af5902e199acc4556d1a119338ab2d7fe5f0ef62531353ffdb4c389e70285589fd5f880472fdedc9137a115be4ecdbf1aa48ecf390385e62b78678c50677ec376a223bf81d5b99cb3b4d39612eacd53f0cc2fc0d7803044854652f5d20696b37fb662779c0a78be65f1ca6622794312832bec846acf16cad41cf286010f5d50ef90342998ee155047d6677898bbc7c1ef0df73fe65444d9ce527fe60a49e27f36a172becba3c183b0621d3834b3b81006a2d4aa5d4ec8d841ccf2f318cf2f7a451af028e1a88fc73987d1f92265806f690ff004d77c3bef9852d4a8d53abc3719ac90627660e389ec89cc30bd4af03c3e500af2d62f19dd7c662e76e223a617c7af7bb3d9ac178e5dc2541f74621a0d4df435a169d757f61bbe7341dd4fd4e36f5739da764e80db7be8c57785babca19e23a3f219b00563649bc79c6309dfea551a5e5ce20021c111
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e27891613277ce558971fb9a67ea726f77e54ae
                       9e1f9e7f90315162a82f4a3377164b60d8a3e193
                       2fa63b0387c7917a26f92776600f0a24fad9c371
                       748123965f707025afb102e47cdf5edf4948c384
                       f073db3b232610dfa2414184a1a84faaaf6cbc9b
                       b983e0da92e79a31a92f1744609346e662cdcec2
                       a07fff377d0cf3c08979fbd787290eb1f0eb7666
                       17a572a9b6f6357bc0823e69d728d7f4c2024d70
                       1d09493d27e258f0cbf66819a77773a4ead15865
                       daa9376e4f729e62a4a0e4400bae4a03a2c023a5
                       4f0479d3e6cee3534e0f46743b3018e3b7e98cdc
                       2316efe884a34770b57fada04ea9b11fd2a635c4
                       b337b972ba485bcdf2e7f49dedd5e5297fbe8ce6
                       de6c25d7a51b7d26202a45c9d1207a50f7aab63f
                       2fd63ed5af7a611e7c65db945b5e5075f718f4c0
                       2a7f2295ac1a52b21da10830d73b495ddd71bc7e
                       f3b1f0c0db99baed8e8c285d2d459eafc1ccf636
                       73695b896d173d35fbf17ef412e7c2c36049380c
                       977613fa90969297086f04860c57cbee1cb7d5c8
                       7a3ca399
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1f:35:d8:f2:ca:d7:ec:09:02:5b:71:45:ac:5f:b1:bc:d4:a1:b6:1c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 07:37:54.019  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 07:37:54.021 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 07:37:54.024 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-12 07:37:54.025 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 07:37:54.025  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-12 07:37:54.026  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 07:37:54.027  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 07:37:54.027 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 07:37:54.027 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 07:37:54.028 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 07:37:54.033 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 07:37:54.036 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 07:37:54.036 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 07:37:54.037 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 07:37:54.176  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 07:37:54.177  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 07:37:54.178 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 07:37:54.178 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 07:37:54.180  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 07:37:54.180  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 07:37:54.181 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:37:54.181 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:37:54.181 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:37:54.183 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:37:54.183 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:37:54.183 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:37:54.185 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:37:54.185 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:37:54.185 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:37:54.186 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 07:37:54.191 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 550416598802666770086659060677776857014142515167
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 05:08:38 UTC 2023
           Final Date: Tue Jan 11 05:08:37 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:83:57:36:62:61:a6:01:aa:1a:d6:d4:46:8d:9d:24:39:bf:12:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e27891613277ce558971fb9a67ea726f77e54ae
                       9e1f9e7f90315162a82f4a3377164b60d8a3e193
                       2fa63b0387c7917a26f92776600f0a24fad9c371
                       748123965f707025afb102e47cdf5edf4948c384
                       f073db3b232610dfa2414184a1a84faaaf6cbc9b
                       b983e0da92e79a31a92f1744609346e662cdcec2
                       a07fff377d0cf3c08979fbd787290eb1f0eb7666
                       17a572a9b6f6357bc0823e69d728d7f4c2024d70
                       1d09493d27e258f0cbf66819a77773a4ead15865
                       daa9376e4f729e62a4a0e4400bae4a03a2c023a5
                       4f0479d3e6cee3534e0f46743b3018e3b7e98cdc
                       2316efe884a34770b57fada04ea9b11fd2a635c4
                       b337b972ba485bcdf2e7f49dedd5e5297fbe8ce6
                       de6c25d7a51b7d26202a45c9d1207a50f7aab63f
                       2fd63ed5af7a611e7c65db945b5e5075f718f4c0
                       2a7f2295ac1a52b21da10830d73b495ddd71bc7e
                       f3b1f0c0db99baed8e8c285d2d459eafc1ccf636
                       73695b896d173d35fbf17ef412e7c2c36049380c
                       977613fa90969297086f04860c57cbee1cb7d5c8
                       7a3ca399
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [39:44:8d:58:56:27:05:bd:08:e6:b5:e8:61:9c:b3:75:2a:31:b1:d7],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 07:38:09.390  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 07:38:09.391 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 07:38:09.392 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-12 07:38:09.393 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 07:38:09.393  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-12 07:38:09.393  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 07:38:09.394  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 07:38:09.394 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 07:38:09.394 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 07:38:09.394 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 07:38:09.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 07:38:09.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 07:38:09.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 07:38:09.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 07:38:09.499  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 07:38:09.500  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 07:38:09.500 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 07:38:09.500 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 07:38:09.501  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 07:38:09.501  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 07:38:09.502 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:38:09.502 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:38:09.502 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:38:09.503 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:38:09.503 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:38:09.503 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:38:09.503 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 07:38:09.504 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 07:38:09.504 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 07:38:09.504 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 07:38:09.507 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 550416598802666770086659060677776857014142515167
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 05:08:38 UTC 2023
           Final Date: Tue Jan 11 05:08:37 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:83:57:36:62:61:a6:01:aa:1a:d6:d4:46:8d:9d:24:39:bf:12:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e27891613277ce558971fb9a67ea726f77e54ae
                       9e1f9e7f90315162a82f4a3377164b60d8a3e193
                       2fa63b0387c7917a26f92776600f0a24fad9c371
                       748123965f707025afb102e47cdf5edf4948c384
                       f073db3b232610dfa2414184a1a84faaaf6cbc9b
                       b983e0da92e79a31a92f1744609346e662cdcec2
                       a07fff377d0cf3c08979fbd787290eb1f0eb7666
                       17a572a9b6f6357bc0823e69d728d7f4c2024d70
                       1d09493d27e258f0cbf66819a77773a4ead15865
                       daa9376e4f729e62a4a0e4400bae4a03a2c023a5
                       4f0479d3e6cee3534e0f46743b3018e3b7e98cdc
                       2316efe884a34770b57fada04ea9b11fd2a635c4
                       b337b972ba485bcdf2e7f49dedd5e5297fbe8ce6
                       de6c25d7a51b7d26202a45c9d1207a50f7aab63f
                       2fd63ed5af7a611e7c65db945b5e5075f718f4c0
                       2a7f2295ac1a52b21da10830d73b495ddd71bc7e
                       f3b1f0c0db99baed8e8c285d2d459eafc1ccf636
                       73695b896d173d35fbf17ef412e7c2c36049380c
                       977613fa90969297086f04860c57cbee1cb7d5c8
                       7a3ca399
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d6:a7:2a:84:1c:79:ed:ba:bb:41:76:c9:fe:82:6e:30:7d:70:83:81],[56:66:d1:a4]
        modulus: cacac036daba9c92d75a717e1ea851c552e1d6c75bbcd37a60cdb515586fa4ef222870ba4f28eb889c9027748b284949ccaf7af4d8395df8ac6ae12c891cdb580d55237f2f9bd0d33aa835c813190b0dfc27190d996b84c8a91d274043485f307c3d0fe886f728159ed67faa5269c4c60a01102db85ccbb08ab662c57bd70f302c07cfb158351e2fdb191208c3b001ccdf547ec57f4eb5e08fe88f09ea5db73099a4398428bb063fb7d8493b4ec287489aa67d3e3b057222e2ffa69db518bbd2f87dc1f0d346a4528c6a472e167a1e2254926445a0bd3550748011f9d188398933f02355497267827890cd25a6afd87014dad8a529a8b2cff2af811736bb3d59
public exponent: 10001

] 
2023-01-12 08:05:12.823  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 08:05:12.828 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 08:05:12.831 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-12 08:05:12.832 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 08:05:12.833  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-12 08:05:12.833  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 08:05:12.834  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 08:05:12.834 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 08:05:12.835 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 08:05:12.835 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 08:05:12.840 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 08:05:12.841 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 08:05:12.841 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 08:05:12.842 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 08:05:12.978  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 08:05:12.979  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 08:05:12.979 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 08:05:12.980 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 08:05:12.981  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 08:05:12.981  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 08:05:12.982 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 08:05:12.982 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 08:05:12.983 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 08:05:12.983 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 08:05:12.984 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 08:05:12.984 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 08:05:12.985 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 08:05:12.985 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 08:05:12.986 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 08:05:12.986 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 08:05:12.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 550416598802666770086659060677776857014142515167
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 05:08:38 UTC 2023
           Final Date: Tue Jan 11 05:08:37 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:83:57:36:62:61:a6:01:aa:1a:d6:d4:46:8d:9d:24:39:bf:12:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e27891613277ce558971fb9a67ea726f77e54ae
                       9e1f9e7f90315162a82f4a3377164b60d8a3e193
                       2fa63b0387c7917a26f92776600f0a24fad9c371
                       748123965f707025afb102e47cdf5edf4948c384
                       f073db3b232610dfa2414184a1a84faaaf6cbc9b
                       b983e0da92e79a31a92f1744609346e662cdcec2
                       a07fff377d0cf3c08979fbd787290eb1f0eb7666
                       17a572a9b6f6357bc0823e69d728d7f4c2024d70
                       1d09493d27e258f0cbf66819a77773a4ead15865
                       daa9376e4f729e62a4a0e4400bae4a03a2c023a5
                       4f0479d3e6cee3534e0f46743b3018e3b7e98cdc
                       2316efe884a34770b57fada04ea9b11fd2a635c4
                       b337b972ba485bcdf2e7f49dedd5e5297fbe8ce6
                       de6c25d7a51b7d26202a45c9d1207a50f7aab63f
                       2fd63ed5af7a611e7c65db945b5e5075f718f4c0
                       2a7f2295ac1a52b21da10830d73b495ddd71bc7e
                       f3b1f0c0db99baed8e8c285d2d459eafc1ccf636
                       73695b896d173d35fbf17ef412e7c2c36049380c
                       977613fa90969297086f04860c57cbee1cb7d5c8
                       7a3ca399
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [04:6c:1a:ab:49:3d:c1:b7:ba:5e:b7:76:a6:b1:92:69:73:89:bd:cd],[56:66:d1:a4]
        modulus: d276e462e4c8e6c80ce20e9ea16ce7b82f640610f46b140ecc7ed0e5d5404c45a6c3d3b95738b9c14a56c220e74e95e1873f12eb032fe9f5ecf3ede8e0369317b35383882e37e9334f1c3f5302ecaa817b5e307c911a6e0da779ee1b6ee1d2c1806600e9e0db56a0d4e51207e76343f04a67ed699749a585a783a22822771597bdfde06cbce59a70600a472323e4f7f96993e9e08c48b263361f11ff8bb1e85bf74d5ab72efca3256eb9da0e45d36ec53d1b280c8228320efb248f41117988766777d3e34e852a323060beeff809929397ae4bed86bebce57cbd19e9e95b63dffdbb211f017ecf328125baab2af106d0507afeefce4e62b91f55f5b33290615f
public exponent: 10001

] 
2023-01-12 08:05:20.590  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 08:05:20.591 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 08:05:20.592 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-12 08:05:20.593 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 08:05:20.593  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-12 08:05:20.593  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 08:05:20.594  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 08:05:20.594 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 08:05:20.594 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 08:05:20.594 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 08:05:20.597 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 08:05:20.598 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 08:05:20.598 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 08:05:20.598 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 08:05:20.697  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 08:05:20.697  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 08:05:20.698 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 08:05:20.698 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 08:05:20.707  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 08:05:20.717  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 08:05:20.718 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 08:05:20.718 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 08:05:20.718 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 08:05:20.719 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 08:05:20.719 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 08:05:20.719 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 08:05:20.720 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 08:05:20.720 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 08:05:20.720 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 08:05:20.721 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 08:05:20.723 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 550416598802666770086659060677776857014142515167
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 05:08:38 UTC 2023
           Final Date: Tue Jan 11 05:08:37 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:83:57:36:62:61:a6:01:aa:1a:d6:d4:46:8d:9d:24:39:bf:12:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e27891613277ce558971fb9a67ea726f77e54ae
                       9e1f9e7f90315162a82f4a3377164b60d8a3e193
                       2fa63b0387c7917a26f92776600f0a24fad9c371
                       748123965f707025afb102e47cdf5edf4948c384
                       f073db3b232610dfa2414184a1a84faaaf6cbc9b
                       b983e0da92e79a31a92f1744609346e662cdcec2
                       a07fff377d0cf3c08979fbd787290eb1f0eb7666
                       17a572a9b6f6357bc0823e69d728d7f4c2024d70
                       1d09493d27e258f0cbf66819a77773a4ead15865
                       daa9376e4f729e62a4a0e4400bae4a03a2c023a5
                       4f0479d3e6cee3534e0f46743b3018e3b7e98cdc
                       2316efe884a34770b57fada04ea9b11fd2a635c4
                       b337b972ba485bcdf2e7f49dedd5e5297fbe8ce6
                       de6c25d7a51b7d26202a45c9d1207a50f7aab63f
                       2fd63ed5af7a611e7c65db945b5e5075f718f4c0
                       2a7f2295ac1a52b21da10830d73b495ddd71bc7e
                       f3b1f0c0db99baed8e8c285d2d459eafc1ccf636
                       73695b896d173d35fbf17ef412e7c2c36049380c
                       977613fa90969297086f04860c57cbee1cb7d5c8
                       7a3ca399
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:2e:53:85:31:2a:80:21:7e:4e:f9:f5:30:0d:ee:28:15:a5:95:99],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]