Results

By type

          2022-12-10 03:03:31,826 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-12-10 03:03:33,251 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-12-10 03:03:34.046  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Dec 10, 2022 3:03:36 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Dec 10, 2022 3:03:36 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Dec 10, 2022 3:03:36 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Dec 10, 2022 3:03:36 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-12-10 03:03:36.847 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-12-10 03:03:37.143  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-12-10 03:03:37.304  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-12-10 03:03:38.049 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-12-10 03:03:38.057 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-12-10 03:03:38.059 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-12-10 03:03:38.063 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-12-10 03:03:38.105 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-12-10 03:03:38.109 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-12-10 03:03:38.241 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-12-10 03:03:38.993 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Dec 10, 2022 3:03:39 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-12-10 03:03:40.034  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.227 seconds (JVM running for 11.108)
Dec 10, 2022 3:03:59 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-12-10 03:04:10.488  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-10 03:04:10.499 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-10 03:04:10.546 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-10 03:04:10.550 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-10 03:04:10.569  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-10 03:04:10.571  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-10 03:04:10.572  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-10 03:04:10.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-10 03:04:10.574 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 03:04:10.578 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-10 03:04:10.589 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-10 03:04:10.592 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-10 03:04:10.654 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-10 03:04:10.659 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 03:04:10.660 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 03:04:10.663 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 03:04:11.555  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-10 03:04:11.558  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-10 03:04:11.559 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-10 03:04:11.560 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 03:04:11.569  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-10 03:04:11.570  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-10 03:04:11.571 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 03:04:11.571 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 03:04:11.571 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 03:04:11.586 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 03:04:11.587 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 03:04:11.587 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 03:04:11.593 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 03:04:11.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 03:04:11.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 03:04:11.595 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-10 03:04:11.636 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66749063822399398628369202901539483414278212412
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 10 03:00:34 UTC 2022
           Final Date: Thu Dec 09 03:00:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3
                       778dc1cba2f1bd78ff6fd4794aef111365437892
                       54a699fa9e25c656276abe72896d3fff33028104
                       30f2fc2d24c3b0f743af20fefa48baac616dc6cb
                       d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f
                       ccd75fd178ccd8895ed8bdfec05f7b4c983469aa
                       8446eb5670f70ba240e446cc5bf8488f344c3e61
                       862aa04d79a933cf1e9a29576c1919b6a36275b2
                       562de42b337d79e038bf14df7c3cc54416ac1582
                       d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e
                       5ff3f55aac7d1ed67685520267d34118f8be01af
                       0eae1df37fc5ae9d4a00b2db38cfe541a2f86592
                       9347a112fde4d15c2c709280140ab868a6752bab
                       c05f0a4fa113258b9a40a89f22267aee3590cd45
                       954bf2abc569dad4b2cd73dbcdaa67f387dfbea1
                       76c85ff7a53db89375ebb4a08e070b9d83ce33bf
                       a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f
                       07b9d74425c5267dfeca5f6d79a9586fdfa41f0f
                       e285136d5b05b39d9971cff4063035a0b5fdb803
                       e4ebbb5b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [63:3f:be:2e:e1:73:10:5d:d9:bd:73:70:ba:bc:62:9b:9b:c7:f4:60],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-10 09:10:55.472  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-10 09:10:55.476 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-10 09:10:55.479 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-10 09:10:55.481 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-10 09:10:55.482  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-10 09:10:55.483  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-10 09:10:55.483  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-10 09:10:55.484 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-10 09:10:55.484 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-10 09:10:55.485 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-10 09:10:55.490 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-10 09:10:55.491 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 09:10:55.492 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 09:10:55.492 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 09:10:55.692  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-10 09:10:55.693  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-10 09:10:55.694 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-10 09:10:55.694 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 09:10:55.697  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-10 09:10:55.698  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-10 09:10:55.698 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:10:55.699 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:10:55.699 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:10:55.700 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:10:55.701 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:10:55.701 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:10:55.702 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:10:55.703 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:10:55.703 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:10:55.704 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-10 09:10:55.709 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66749063822399398628369202901539483414278212412
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 10 03:00:34 UTC 2022
           Final Date: Thu Dec 09 03:00:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3
                       778dc1cba2f1bd78ff6fd4794aef111365437892
                       54a699fa9e25c656276abe72896d3fff33028104
                       30f2fc2d24c3b0f743af20fefa48baac616dc6cb
                       d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f
                       ccd75fd178ccd8895ed8bdfec05f7b4c983469aa
                       8446eb5670f70ba240e446cc5bf8488f344c3e61
                       862aa04d79a933cf1e9a29576c1919b6a36275b2
                       562de42b337d79e038bf14df7c3cc54416ac1582
                       d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e
                       5ff3f55aac7d1ed67685520267d34118f8be01af
                       0eae1df37fc5ae9d4a00b2db38cfe541a2f86592
                       9347a112fde4d15c2c709280140ab868a6752bab
                       c05f0a4fa113258b9a40a89f22267aee3590cd45
                       954bf2abc569dad4b2cd73dbcdaa67f387dfbea1
                       76c85ff7a53db89375ebb4a08e070b9d83ce33bf
                       a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f
                       07b9d74425c5267dfeca5f6d79a9586fdfa41f0f
                       e285136d5b05b39d9971cff4063035a0b5fdb803
                       e4ebbb5b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9b:32:b6:f2:61:61:3f:6c:52:b9:74:e0:ba:66:fc:c6:ce:b4:c9:ab],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-10 09:12:43.549  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-10 09:12:43.551 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-10 09:12:43.554 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-10 09:12:43.556 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-10 09:12:43.556  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-10 09:12:43.557  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-10 09:12:43.558  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-10 09:12:43.558 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-10 09:12:43.559 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-10 09:12:43.560 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-10 09:12:43.564 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-10 09:12:43.565 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 09:12:43.565 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 09:12:43.566 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 09:12:43.694  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-10 09:12:43.695  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-10 09:12:43.696 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-10 09:12:43.696 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 09:12:43.698  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-10 09:12:43.698  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-10 09:12:43.698 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:12:43.699 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:12:43.699 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:12:43.700 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:12:43.700 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:12:43.701 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:12:43.702 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:12:43.702 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:12:43.702 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:12:43.703 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-10 09:12:43.707 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66749063822399398628369202901539483414278212412
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 10 03:00:34 UTC 2022
           Final Date: Thu Dec 09 03:00:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3
                       778dc1cba2f1bd78ff6fd4794aef111365437892
                       54a699fa9e25c656276abe72896d3fff33028104
                       30f2fc2d24c3b0f743af20fefa48baac616dc6cb
                       d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f
                       ccd75fd178ccd8895ed8bdfec05f7b4c983469aa
                       8446eb5670f70ba240e446cc5bf8488f344c3e61
                       862aa04d79a933cf1e9a29576c1919b6a36275b2
                       562de42b337d79e038bf14df7c3cc54416ac1582
                       d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e
                       5ff3f55aac7d1ed67685520267d34118f8be01af
                       0eae1df37fc5ae9d4a00b2db38cfe541a2f86592
                       9347a112fde4d15c2c709280140ab868a6752bab
                       c05f0a4fa113258b9a40a89f22267aee3590cd45
                       954bf2abc569dad4b2cd73dbcdaa67f387dfbea1
                       76c85ff7a53db89375ebb4a08e070b9d83ce33bf
                       a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f
                       07b9d74425c5267dfeca5f6d79a9586fdfa41f0f
                       e285136d5b05b39d9971cff4063035a0b5fdb803
                       e4ebbb5b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fa:f0:40:b3:57:8b:5e:74:1a:73:76:3f:8a:b8:cd:e4:8b:0f:8f:9a],[56:66:d1:a4]
        modulus: dc647b4c9241a35c7f1efe3d5a653fccc3bf66b5b2becb27c45de94a767f4913bb0781e19e4756813f63ca34ff4bec9230d779803a9ecd50b5a3524d4fe985b23d854077cb61fcfe1741814a6537a8a95ab3971cc2ba24d5337009d54a57a52984b230ed1625e7c61a29bfcf0d2c627de3dadfb6d1af3b4ceff5a99cef1fc04d9a79f6699fe8d958d8f996621a516940aa5af0ae6b2d3af1504fe6090d29aa13571e88087535384ae4a6180b5053030b714760d2b0896dc45dbd0a45e0056ca6f1daeccdd5a71e57bd1c3e60621c147c9bb276a13eb22a5e27f3c0a7c3b41023fe08f47c0a5909f3132e2bd101bf231746caaa1b150c3998f4dd906153d3286d
public exponent: 10001

] 
2022-12-10 09:14:31.763  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-10 09:14:31.764 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-10 09:14:31.766 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-10 09:14:31.767 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-10 09:14:31.768  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-10 09:14:31.769  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-10 09:14:31.769  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-10 09:14:31.770 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-10 09:14:31.770 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-10 09:14:31.771 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-10 09:14:31.776 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-10 09:14:31.777 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 09:14:31.778 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 09:14:31.778 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 09:14:31.950  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-10 09:14:31.951  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-10 09:14:31.951 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-10 09:14:31.951 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 09:14:31.955  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-10 09:14:31.956  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-10 09:14:31.956 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:14:31.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:14:31.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:14:31.958 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:14:31.959 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:14:31.959 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:14:31.960 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:14:31.961 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:14:31.961 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:14:31.962 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-10 09:14:31.967 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66749063822399398628369202901539483414278212412
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 10 03:00:34 UTC 2022
           Final Date: Thu Dec 09 03:00:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4]
        modulus: d132b01ee07bf550bc25b20b13ff66c826f5c5a255e5c23d90666f436d959e7f0888443b35c7488d2421aae7de5f7d215cacfc99b0ae3ab1d61426c89c55f39e2e645fa9b6390f4c0c1049a6e69f0a7a988d8d4329df37d05180b2b5c270d42b8660ae6a1c33cdc94f73df170da55edebbaa7f2f93bcd52d6b94eaba415376d97b8a65cb2af92f0f5b937a19541a4a339718d05fc07a2bc08564cbf76d344e8ac87b9f1d2408646a11127ed38e97f5a0e68f0ee259182ca609e55d2bda921547a653c9698d20557f068cff7b990a08205cebd05d1d382b224a20989368c6b08e698201ba8049450eac6af7edfaee2c5df6d2e2a7541b352b606ec00ee4d44553b3f89025a16f5a4e04ca8af8b9307ed1a9add8f355d1bf303e59ce0f0471265e21c1ea4a96ecf65933adfeddbfd90018716f56734b8c435594b38083d1d644cb533f74bc9d43db1b9536542d3bd6b0ed2f584ff2c005d9cd80dd067ab9f84666ff0ef7c706841bd09aef6a6f6e912f7ea0b3a369f71f0203d7e8eb4b9cf3e553
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3
                       778dc1cba2f1bd78ff6fd4794aef111365437892
                       54a699fa9e25c656276abe72896d3fff33028104
                       30f2fc2d24c3b0f743af20fefa48baac616dc6cb
                       d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f
                       ccd75fd178ccd8895ed8bdfec05f7b4c983469aa
                       8446eb5670f70ba240e446cc5bf8488f344c3e61
                       862aa04d79a933cf1e9a29576c1919b6a36275b2
                       562de42b337d79e038bf14df7c3cc54416ac1582
                       d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e
                       5ff3f55aac7d1ed67685520267d34118f8be01af
                       0eae1df37fc5ae9d4a00b2db38cfe541a2f86592
                       9347a112fde4d15c2c709280140ab868a6752bab
                       c05f0a4fa113258b9a40a89f22267aee3590cd45
                       954bf2abc569dad4b2cd73dbcdaa67f387dfbea1
                       76c85ff7a53db89375ebb4a08e070b9d83ce33bf
                       a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f
                       07b9d74425c5267dfeca5f6d79a9586fdfa41f0f
                       e285136d5b05b39d9971cff4063035a0b5fdb803
                       e4ebbb5b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [05:b6:00:cd:aa:63:ce:44:4e:e4:91:63:ca:31:68:07:84:a3:ea:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-10 09:17:17.197  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-10 09:17:17.198 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-10 09:17:17.200 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-10 09:17:17.201 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-10 09:17:17.201  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-10 09:17:17.202  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-10 09:17:17.202  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-10 09:17:17.203 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-10 09:17:17.203 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-10 09:17:17.203 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-10 09:17:17.207 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-10 09:17:17.208 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 09:17:17.208 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 09:17:17.209 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 09:17:17.354  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-10 09:17:17.355  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-10 09:17:17.356 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-10 09:17:17.356 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 09:17:17.358  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-10 09:17:17.359  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-10 09:17:17.359 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:17:17.359 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:17:17.360 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:17:17.360 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:17:17.361 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:17:17.361 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:17:17.362 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:17:17.362 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:17:17.362 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:17:17.363 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-10 09:17:17.366 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66749063822399398628369202901539483414278212412
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 10 03:00:34 UTC 2022
           Final Date: Thu Dec 09 03:00:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3
                       778dc1cba2f1bd78ff6fd4794aef111365437892
                       54a699fa9e25c656276abe72896d3fff33028104
                       30f2fc2d24c3b0f743af20fefa48baac616dc6cb
                       d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f
                       ccd75fd178ccd8895ed8bdfec05f7b4c983469aa
                       8446eb5670f70ba240e446cc5bf8488f344c3e61
                       862aa04d79a933cf1e9a29576c1919b6a36275b2
                       562de42b337d79e038bf14df7c3cc54416ac1582
                       d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e
                       5ff3f55aac7d1ed67685520267d34118f8be01af
                       0eae1df37fc5ae9d4a00b2db38cfe541a2f86592
                       9347a112fde4d15c2c709280140ab868a6752bab
                       c05f0a4fa113258b9a40a89f22267aee3590cd45
                       954bf2abc569dad4b2cd73dbcdaa67f387dfbea1
                       76c85ff7a53db89375ebb4a08e070b9d83ce33bf
                       a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f
                       07b9d74425c5267dfeca5f6d79a9586fdfa41f0f
                       e285136d5b05b39d9971cff4063035a0b5fdb803
                       e4ebbb5b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [06:0c:e0:ff:b3:15:6f:fd:e7:48:ef:e5:c3:f0:b4:41:4c:35:90:32],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-10 09:24:23.993  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-10 09:24:23.997 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-10 09:24:23.999 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-10 09:24:24.000 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-10 09:24:24.001  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-10 09:24:24.002  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-10 09:24:24.003  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-10 09:24:24.003 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-10 09:24:24.005 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-10 09:24:24.006 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-10 09:24:24.013 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-10 09:24:24.014 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 09:24:24.016 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 09:24:24.016 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 09:24:24.215  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-10 09:24:24.216  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-10 09:24:24.217 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-10 09:24:24.217 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 09:24:24.218  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-10 09:24:24.219  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-10 09:24:24.219 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:24:24.219 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:24:24.220 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:24:24.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:24:24.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:24:24.223 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:24:24.224 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:24:24.227 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:24:24.227 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:24:24.228 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-10 09:24:24.233 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66749063822399398628369202901539483414278212412
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 10 03:00:34 UTC 2022
           Final Date: Thu Dec 09 03:00:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4]
        modulus: d132b01ee07bf550bc25b20b13ff66c826f5c5a255e5c23d90666f436d959e7f0888443b35c7488d2421aae7de5f7d215cacfc99b0ae3ab1d61426c89c55f39e2e645fa9b6390f4c0c1049a6e69f0a7a988d8d4329df37d05180b2b5c270d42b8660ae6a1c33cdc94f73df170da55edebbaa7f2f93bcd52d6b94eaba415376d97b8a65cb2af92f0f5b937a19541a4a339718d05fc07a2bc08564cbf76d344e8ac87b9f1d2408646a11127ed38e97f5a0e68f0ee259182ca609e55d2bda921547a653c9698d20557f068cff7b990a08205cebd05d1d382b224a20989368c6b08e698201ba8049450eac6af7edfaee2c5df6d2e2a7541b352b606ec00ee4d44553b3f89025a16f5a4e04ca8af8b9307ed1a9add8f355d1bf303e59ce0f0471265e21c1ea4a96ecf65933adfeddbfd90018716f56734b8c435594b38083d1d644cb533f74bc9d43db1b9536542d3bd6b0ed2f584ff2c005d9cd80dd067ab9f84666ff0ef7c706841bd09aef6a6f6e912f7ea0b3a369f71f0203d7e8eb4b9cf3e553
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3
                       778dc1cba2f1bd78ff6fd4794aef111365437892
                       54a699fa9e25c656276abe72896d3fff33028104
                       30f2fc2d24c3b0f743af20fefa48baac616dc6cb
                       d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f
                       ccd75fd178ccd8895ed8bdfec05f7b4c983469aa
                       8446eb5670f70ba240e446cc5bf8488f344c3e61
                       862aa04d79a933cf1e9a29576c1919b6a36275b2
                       562de42b337d79e038bf14df7c3cc54416ac1582
                       d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e
                       5ff3f55aac7d1ed67685520267d34118f8be01af
                       0eae1df37fc5ae9d4a00b2db38cfe541a2f86592
                       9347a112fde4d15c2c709280140ab868a6752bab
                       c05f0a4fa113258b9a40a89f22267aee3590cd45
                       954bf2abc569dad4b2cd73dbcdaa67f387dfbea1
                       76c85ff7a53db89375ebb4a08e070b9d83ce33bf
                       a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f
                       07b9d74425c5267dfeca5f6d79a9586fdfa41f0f
                       e285136d5b05b39d9971cff4063035a0b5fdb803
                       e4ebbb5b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b9:ab:95:47:15:18:85:5a:ad:72:28:84:bc:37:4c:da:1a:92:29:1f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-10 09:30:39.064  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-10 09:30:39.067 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-10 09:30:39.071 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-10 09:30:39.072 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-10 09:30:39.076  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-10 09:30:39.077  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-10 09:30:39.078  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-10 09:30:39.078 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-10 09:30:39.079 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-10 09:30:39.080 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-10 09:30:39.084 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-10 09:30:39.085 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 09:30:39.085 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 09:30:39.085 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 09:30:39.309  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-10 09:30:39.310  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-10 09:30:39.310 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-10 09:30:39.311 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 09:30:39.333  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-10 09:30:39.334  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-10 09:30:39.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:30:39.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:30:39.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:30:39.336 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:30:39.336 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:30:39.337 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:30:39.337 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:30:39.337 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:30:39.338 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:30:39.338 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-10 09:30:39.353 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66749063822399398628369202901539483414278212412
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 10 03:00:34 UTC 2022
           Final Date: Thu Dec 09 03:00:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3
                       778dc1cba2f1bd78ff6fd4794aef111365437892
                       54a699fa9e25c656276abe72896d3fff33028104
                       30f2fc2d24c3b0f743af20fefa48baac616dc6cb
                       d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f
                       ccd75fd178ccd8895ed8bdfec05f7b4c983469aa
                       8446eb5670f70ba240e446cc5bf8488f344c3e61
                       862aa04d79a933cf1e9a29576c1919b6a36275b2
                       562de42b337d79e038bf14df7c3cc54416ac1582
                       d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e
                       5ff3f55aac7d1ed67685520267d34118f8be01af
                       0eae1df37fc5ae9d4a00b2db38cfe541a2f86592
                       9347a112fde4d15c2c709280140ab868a6752bab
                       c05f0a4fa113258b9a40a89f22267aee3590cd45
                       954bf2abc569dad4b2cd73dbcdaa67f387dfbea1
                       76c85ff7a53db89375ebb4a08e070b9d83ce33bf
                       a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f
                       07b9d74425c5267dfeca5f6d79a9586fdfa41f0f
                       e285136d5b05b39d9971cff4063035a0b5fdb803
                       e4ebbb5b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1a:4b:de:b8:6c:49:9a:a3:d3:93:e5:df:84:83:a1:be:47:86:ec:6c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-10 09:30:56.333  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-10 09:30:56.334 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-10 09:30:56.336 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-10 09:30:56.342 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-10 09:30:56.343  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-10 09:30:56.344  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-10 09:30:56.344  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-10 09:30:56.345 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-10 09:30:56.346 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-10 09:30:56.346 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-10 09:30:56.352 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-10 09:30:56.353 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 09:30:56.353 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 09:30:56.354 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 09:30:56.493  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-10 09:30:56.494  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-10 09:30:56.494 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-10 09:30:56.494 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 09:30:56.496  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-10 09:30:56.496  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-10 09:30:56.497 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:30:56.498 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:30:56.498 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:30:56.499 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:30:56.499 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:30:56.500 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:30:56.500 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:30:56.501 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:30:56.501 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:30:56.502 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-10 09:30:56.506 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66749063822399398628369202901539483414278212412
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 10 03:00:34 UTC 2022
           Final Date: Thu Dec 09 03:00:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3
                       778dc1cba2f1bd78ff6fd4794aef111365437892
                       54a699fa9e25c656276abe72896d3fff33028104
                       30f2fc2d24c3b0f743af20fefa48baac616dc6cb
                       d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f
                       ccd75fd178ccd8895ed8bdfec05f7b4c983469aa
                       8446eb5670f70ba240e446cc5bf8488f344c3e61
                       862aa04d79a933cf1e9a29576c1919b6a36275b2
                       562de42b337d79e038bf14df7c3cc54416ac1582
                       d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e
                       5ff3f55aac7d1ed67685520267d34118f8be01af
                       0eae1df37fc5ae9d4a00b2db38cfe541a2f86592
                       9347a112fde4d15c2c709280140ab868a6752bab
                       c05f0a4fa113258b9a40a89f22267aee3590cd45
                       954bf2abc569dad4b2cd73dbcdaa67f387dfbea1
                       76c85ff7a53db89375ebb4a08e070b9d83ce33bf
                       a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f
                       07b9d74425c5267dfeca5f6d79a9586fdfa41f0f
                       e285136d5b05b39d9971cff4063035a0b5fdb803
                       e4ebbb5b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [52:46:cb:84:af:b8:6e:98:bf:4d:1c:a2:08:c8:ea:b2:af:6c:72:9c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-10 09:54:00.917  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-10 09:54:00.920 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-10 09:54:00.924 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-10 09:54:00.925 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-10 09:54:00.925  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-10 09:54:00.926  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-10 09:54:00.926  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-10 09:54:00.927 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-10 09:54:00.927 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-10 09:54:00.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-10 09:54:00.932 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-10 09:54:00.934 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 09:54:00.934 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 09:54:00.935 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 09:54:01.118  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-10 09:54:01.119  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-10 09:54:01.120 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-10 09:54:01.120 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 09:54:01.122  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-10 09:54:01.122  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-10 09:54:01.123 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:54:01.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:54:01.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:54:01.125 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:54:01.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:54:01.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:54:01.127 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:54:01.127 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:54:01.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:54:01.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-10 09:54:01.132 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66749063822399398628369202901539483414278212412
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 10 03:00:34 UTC 2022
           Final Date: Thu Dec 09 03:00:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4]
        modulus: d132b01ee07bf550bc25b20b13ff66c826f5c5a255e5c23d90666f436d959e7f0888443b35c7488d2421aae7de5f7d215cacfc99b0ae3ab1d61426c89c55f39e2e645fa9b6390f4c0c1049a6e69f0a7a988d8d4329df37d05180b2b5c270d42b8660ae6a1c33cdc94f73df170da55edebbaa7f2f93bcd52d6b94eaba415376d97b8a65cb2af92f0f5b937a19541a4a339718d05fc07a2bc08564cbf76d344e8ac87b9f1d2408646a11127ed38e97f5a0e68f0ee259182ca609e55d2bda921547a653c9698d20557f068cff7b990a08205cebd05d1d382b224a20989368c6b08e698201ba8049450eac6af7edfaee2c5df6d2e2a7541b352b606ec00ee4d44553b3f89025a16f5a4e04ca8af8b9307ed1a9add8f355d1bf303e59ce0f0471265e21c1ea4a96ecf65933adfeddbfd90018716f56734b8c435594b38083d1d644cb533f74bc9d43db1b9536542d3bd6b0ed2f584ff2c005d9cd80dd067ab9f84666ff0ef7c706841bd09aef6a6f6e912f7ea0b3a369f71f0203d7e8eb4b9cf3e553
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3
                       778dc1cba2f1bd78ff6fd4794aef111365437892
                       54a699fa9e25c656276abe72896d3fff33028104
                       30f2fc2d24c3b0f743af20fefa48baac616dc6cb
                       d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f
                       ccd75fd178ccd8895ed8bdfec05f7b4c983469aa
                       8446eb5670f70ba240e446cc5bf8488f344c3e61
                       862aa04d79a933cf1e9a29576c1919b6a36275b2
                       562de42b337d79e038bf14df7c3cc54416ac1582
                       d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e
                       5ff3f55aac7d1ed67685520267d34118f8be01af
                       0eae1df37fc5ae9d4a00b2db38cfe541a2f86592
                       9347a112fde4d15c2c709280140ab868a6752bab
                       c05f0a4fa113258b9a40a89f22267aee3590cd45
                       954bf2abc569dad4b2cd73dbcdaa67f387dfbea1
                       76c85ff7a53db89375ebb4a08e070b9d83ce33bf
                       a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f
                       07b9d74425c5267dfeca5f6d79a9586fdfa41f0f
                       e285136d5b05b39d9971cff4063035a0b5fdb803
                       e4ebbb5b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:17:48:fb:f7:2c:7f:a8:27:63:f0:3b:59:b7:3d:c8:e3:b6:22:56],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-10 09:54:06.081  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-10 09:54:06.082 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-10 09:54:06.084 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-10 09:54:06.084 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-10 09:54:06.085  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-10 09:54:06.085  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-10 09:54:06.086  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-10 09:54:06.086 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-10 09:54:06.086 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-10 09:54:06.087 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-10 09:54:06.090 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-10 09:54:06.091 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 09:54:06.091 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-10 09:54:06.091 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 09:54:06.199  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-10 09:54:06.200  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-10 09:54:06.200 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-10 09:54:06.201 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-10 09:54:06.203  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-10 09:54:06.203  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-10 09:54:06.204 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:54:06.204 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:54:06.204 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:54:06.205 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:54:06.206 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:54:06.206 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:54:06.207 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-10 09:54:06.207 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-10 09:54:06.207 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-10 09:54:06.208 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-10 09:54:06.211 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66749063822399398628369202901539483414278212412
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 10 03:00:34 UTC 2022
           Final Date: Thu Dec 09 03:00:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:b7:83:f9:49:52:da:20:15:d8:f6:b4:36:06:12:a2:bc:9b:bc:2d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 014c7c8371d9a2ff0b95d9749b955cfc9b866fc3
                       778dc1cba2f1bd78ff6fd4794aef111365437892
                       54a699fa9e25c656276abe72896d3fff33028104
                       30f2fc2d24c3b0f743af20fefa48baac616dc6cb
                       d5a3c7cd2a5fbfd676ac35fac85660ba84a2bc6f
                       ccd75fd178ccd8895ed8bdfec05f7b4c983469aa
                       8446eb5670f70ba240e446cc5bf8488f344c3e61
                       862aa04d79a933cf1e9a29576c1919b6a36275b2
                       562de42b337d79e038bf14df7c3cc54416ac1582
                       d40d08c7ba2ba0fa3bfd9ffe34c2ddb7dddc110e
                       5ff3f55aac7d1ed67685520267d34118f8be01af
                       0eae1df37fc5ae9d4a00b2db38cfe541a2f86592
                       9347a112fde4d15c2c709280140ab868a6752bab
                       c05f0a4fa113258b9a40a89f22267aee3590cd45
                       954bf2abc569dad4b2cd73dbcdaa67f387dfbea1
                       76c85ff7a53db89375ebb4a08e070b9d83ce33bf
                       a61d6a7214fc5da1c9a6121002dbd2a41ed1dc9f
                       07b9d74425c5267dfeca5f6d79a9586fdfa41f0f
                       e285136d5b05b39d9971cff4063035a0b5fdb803
                       e4ebbb5b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5a:99:6d:9b:8f:9a:d6:d9:b8:31:02:c6:41:5a:69:25:09:b1:69:7e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]