2022-05-27 09:45:19,455 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-27 09:45:20,295 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-27 09:45:21.024  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default May 27, 2022 9:45:22 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 27, 2022 9:45:22 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 27, 2022 9:45:22 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 27, 2022 9:45:22 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-27 09:45:23.434 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-27 09:45:23.715  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-05-27 09:45:23.873  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-27 09:45:24.636 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-27 09:45:24.639 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-05-27 09:45:24.641 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-27 09:45:24.647 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-27 09:45:24.697 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-27 09:45:24.702 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-05-27 09:45:24.872 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-05-27 09:45:25.544 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 27, 2022 9:45:26 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-27 09:45:26.361  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 7.627 seconds (JVM running for 9.369) May 27, 2022 9:45:50 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-27 09:46:03.054  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-27 09:46:03.063 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-27 09:46:03.106 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-27 09:46:03.110 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-27 09:46:03.127  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-27 09:46:03.129  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-27 09:46:03.130  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-27 09:46:03.131 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-27 09:46:03.132 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 09:46:03.135 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-27 09:46:03.141 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-27 09:46:03.144 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-27 09:46:03.187 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-27 09:46:03.194 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 09:46:03.195 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 09:46:03.199 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 09:46:03.960  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-27 09:46:03.963  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-27 09:46:03.963 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-27 09:46:03.965 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 09:46:03.976  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-27 09:46:03.977  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-27 09:46:03.978 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 09:46:03.978 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 09:46:03.979 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 09:46:03.993 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 09:46:03.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 09:46:03.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 09:46:04.000 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 09:46:04.001 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 09:46:04.001 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 09:46:04.003 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-27 09:46:04.033 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 510849681982371889938408333538309556451425826738 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 27 09:42:23 UTC 2022 Final Date: Wed May 26 09:42:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:32:68:bd:f5:18:42:03:d6:5f:d1:6c:a8:93:6f:dd:0e:97:bd:a5] modulus: aa6330b4cdcf3a0c5579696448a9caf1b9181c12aad6c56409c78b870344bc81cb6b93c9ba580a6422a9efaba472829c01914b61f0e3b5978562d60b9f29765a234f2eb804cce6e8bbdd8322bcd083a5403db0031dfae9e2f5834de81b338a518a480687fc83104aa38d2343e891a7702d1a3cb9f7c5d9f54bcaa1e6fcefd33e20d26798e7c97e21f0fbde19f2481f301b8077a65cf8bab7f0d4ab2df801dd79ac3221e2e7b2dc4b0a8de67c2cfc4ea261a2f88c9dfbe7793c150c28fcf5787da5c44b6604eb47ec568b2d5e28f27a9f96ea5ee50f4ab0d95c56150d87d8a6cb7649e7f2d4ec0183a43c9bff6877e2027dc73b4aa43c797e46b70237042232a83422e2b64020ad724cf1613e1f28438efadb2005411afd10fafb5c60a09f91ce036d18d92ded0d0721d0baf225f574343ad18122166c4a225aed81ce4a3caa2dd22de52f15df965da3507155a9f51114a90c4a553fdff2ec864c6352a5903686f9ee58af3571222b76c842a855a6e627fda1105447355f51c275482c7cfcd005 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 617e1ec2e688e3e073cce811ad427a23599ce36b be542236d76c75101fe0a69e6fe3313b44cd387a 90678a36aa6644b094b5e394963e2dd8d8bd241c cb37e157d6a5f56b506e91f8af392e4bbb521e26 5f3cfabe29ea6395b5045e53f61dc5b68342d513 69e071b2c13b83b6b11614c836cbcd7721eaf6fe 4715cadc30cbd2a2cd928aee46b87ff7991120c2 1b38536e7710c1f7e776dc1a818d93cc8603e338 b583f8ef2f1a852b3493407fb082ed20279174de fab406d14b4823af1f74d403f9b6ae60daefad41 8f10884b436e43ab9e373706f6fc5b86256438c9 8ac797c3210c7fc76cb76491a7b32772acf65208 0bd2e28946a4473ef78cbcb18055433886ec2b61 9831bbbfd9c4d940cce19b38814deac789726bd8 e0857adf0fe97070ef2de133f01870f26a2c5603 2f10a5e59376a92237b5eebf3e5fa455b970e659 20fe607ca877815b98b4cd3e61d09e4be0aa8979 12cff3df2bb07c0c9c128a4164aa5c92f8373b0a e7f52961127fe05cd7ae922849b9e1629b9cb392 d5a43dbc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d0:eb:61:e0:34:cb:d4:00:72:30:64:8b:aa:b0:19:b9:c8:ce:f5:71] modulus: d4ab8a803c3ff2c4bd8ae4a0ffc0ea162edc8c14bc97c119e23b2aac80d92c773cec778f6e061b1577c2bfd437df4e2dc161cc67869fb65e32db92edcc864370afb4430ff9c4402e5e4bcab765fa31b665833134b98eba0361db44a527e984afacaab4e4f78a3b3058e1c9faaed359c77d9f1c6c5395c2c319efd076fc4fb1dd4670d5b608f09db0640f81b661bb6223f5eb6be558f9feac5ec0521f93543365262f946c6e8ce68dc65a33ee4395d3eafd0ea32b51a97391a78aea9bda64e753ae2b48d3ce1a70aae5fa8eab118066c638bc48e6f32da43a3782bde0391fc3fb1ddedec0991f5958db8e75d492dee3ca93324559c2e8a345b0cd199e2482dc6d public exponent: 10001 ] 2022-05-27 12:19:27.330  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-27 12:19:27.334 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-27 12:19:27.337 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-27 12:19:27.338 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-27 12:19:27.339  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-27 12:19:27.340  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-27 12:19:27.340  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-27 12:19:27.341 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-27 12:19:27.341 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-27 12:19:27.342 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-27 12:19:27.352 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-27 12:19:27.354 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:19:27.354 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:19:27.354 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:19:27.615  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-27 12:19:27.617  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-27 12:19:27.618 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-27 12:19:27.618 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:19:27.621  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-27 12:19:27.621  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-27 12:19:27.622 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:19:27.622 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:19:27.622 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:19:27.623 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:19:27.624 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:19:27.624 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:19:27.631 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:19:27.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:19:27.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:19:27.636 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-27 12:19:27.642 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 510849681982371889938408333538309556451425826738 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 27 09:42:23 UTC 2022 Final Date: Wed May 26 09:42:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:32:68:bd:f5:18:42:03:d6:5f:d1:6c:a8:93:6f:dd:0e:97:bd:a5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 617e1ec2e688e3e073cce811ad427a23599ce36b be542236d76c75101fe0a69e6fe3313b44cd387a 90678a36aa6644b094b5e394963e2dd8d8bd241c cb37e157d6a5f56b506e91f8af392e4bbb521e26 5f3cfabe29ea6395b5045e53f61dc5b68342d513 69e071b2c13b83b6b11614c836cbcd7721eaf6fe 4715cadc30cbd2a2cd928aee46b87ff7991120c2 1b38536e7710c1f7e776dc1a818d93cc8603e338 b583f8ef2f1a852b3493407fb082ed20279174de fab406d14b4823af1f74d403f9b6ae60daefad41 8f10884b436e43ab9e373706f6fc5b86256438c9 8ac797c3210c7fc76cb76491a7b32772acf65208 0bd2e28946a4473ef78cbcb18055433886ec2b61 9831bbbfd9c4d940cce19b38814deac789726bd8 e0857adf0fe97070ef2de133f01870f26a2c5603 2f10a5e59376a92237b5eebf3e5fa455b970e659 20fe607ca877815b98b4cd3e61d09e4be0aa8979 12cff3df2bb07c0c9c128a4164aa5c92f8373b0a e7f52961127fe05cd7ae922849b9e1629b9cb392 d5a43dbc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [15:48:76:5b:95:7e:3a:f6:24:74:82:b4:7a:0b:d1:9a:1a:46:2d:d1] modulus: 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 public exponent: 10001 ] 2022-05-27 12:21:30.688  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-27 12:21:30.690 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-27 12:21:30.691 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-27 12:21:30.692 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-27 12:21:30.692  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-27 12:21:30.693  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-27 12:21:30.694  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-27 12:21:30.694 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-27 12:21:30.695 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-27 12:21:30.695 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-27 12:21:30.702 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-27 12:21:30.702 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:21:30.702 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:21:30.703 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:21:30.920  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-27 12:21:30.921  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-27 12:21:30.921 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-27 12:21:30.922 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:21:30.924  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-27 12:21:30.925  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-27 12:21:30.925 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:21:30.926 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:21:30.926 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:21:30.927 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:21:30.927 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:21:30.928 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:21:30.928 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:21:30.929 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:21:30.929 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:21:30.930 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-27 12:21:30.934 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 510849681982371889938408333538309556451425826738 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 27 09:42:23 UTC 2022 Final Date: Wed May 26 09:42:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:32:68:bd:f5:18:42:03:d6:5f:d1:6c:a8:93:6f:dd:0e:97:bd:a5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 617e1ec2e688e3e073cce811ad427a23599ce36b be542236d76c75101fe0a69e6fe3313b44cd387a 90678a36aa6644b094b5e394963e2dd8d8bd241c cb37e157d6a5f56b506e91f8af392e4bbb521e26 5f3cfabe29ea6395b5045e53f61dc5b68342d513 69e071b2c13b83b6b11614c836cbcd7721eaf6fe 4715cadc30cbd2a2cd928aee46b87ff7991120c2 1b38536e7710c1f7e776dc1a818d93cc8603e338 b583f8ef2f1a852b3493407fb082ed20279174de fab406d14b4823af1f74d403f9b6ae60daefad41 8f10884b436e43ab9e373706f6fc5b86256438c9 8ac797c3210c7fc76cb76491a7b32772acf65208 0bd2e28946a4473ef78cbcb18055433886ec2b61 9831bbbfd9c4d940cce19b38814deac789726bd8 e0857adf0fe97070ef2de133f01870f26a2c5603 2f10a5e59376a92237b5eebf3e5fa455b970e659 20fe607ca877815b98b4cd3e61d09e4be0aa8979 12cff3df2bb07c0c9c128a4164aa5c92f8373b0a e7f52961127fe05cd7ae922849b9e1629b9cb392 d5a43dbc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9b:1c:65:a1:38:d6:a6:61:2a:7d:08:51:be:53:e2:3a:ce:56:9e:e8] modulus: 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 public exponent: 10001 ] 2022-05-27 12:22:47.256  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-27 12:22:47.257 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-27 12:22:47.259 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-27 12:22:47.260 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-27 12:22:47.260  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-27 12:22:47.261  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-27 12:22:47.261  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-27 12:22:47.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-27 12:22:47.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-27 12:22:47.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-27 12:22:47.267 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-27 12:22:47.267 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:22:47.268 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:22:47.268 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:22:47.500  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-27 12:22:47.501  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-27 12:22:47.502 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-27 12:22:47.502 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:22:47.504  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-27 12:22:47.504  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-27 12:22:47.505 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:22:47.505 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:22:47.505 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:22:47.506 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:22:47.506 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:22:47.507 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:22:47.508 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:22:47.508 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:22:47.508 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:22:47.509 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-27 12:22:47.513 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 510849681982371889938408333538309556451425826738 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 27 09:42:23 UTC 2022 Final Date: Wed May 26 09:42:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:32:68:bd:f5:18:42:03:d6:5f:d1:6c:a8:93:6f:dd:0e:97:bd:a5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 617e1ec2e688e3e073cce811ad427a23599ce36b be542236d76c75101fe0a69e6fe3313b44cd387a 90678a36aa6644b094b5e394963e2dd8d8bd241c cb37e157d6a5f56b506e91f8af392e4bbb521e26 5f3cfabe29ea6395b5045e53f61dc5b68342d513 69e071b2c13b83b6b11614c836cbcd7721eaf6fe 4715cadc30cbd2a2cd928aee46b87ff7991120c2 1b38536e7710c1f7e776dc1a818d93cc8603e338 b583f8ef2f1a852b3493407fb082ed20279174de fab406d14b4823af1f74d403f9b6ae60daefad41 8f10884b436e43ab9e373706f6fc5b86256438c9 8ac797c3210c7fc76cb76491a7b32772acf65208 0bd2e28946a4473ef78cbcb18055433886ec2b61 9831bbbfd9c4d940cce19b38814deac789726bd8 e0857adf0fe97070ef2de133f01870f26a2c5603 2f10a5e59376a92237b5eebf3e5fa455b970e659 20fe607ca877815b98b4cd3e61d09e4be0aa8979 12cff3df2bb07c0c9c128a4164aa5c92f8373b0a e7f52961127fe05cd7ae922849b9e1629b9cb392 d5a43dbc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [12:2f:ee:e0:38:d7:06:f3:89:95:6a:10:d3:42:c1:08:db:03:b9:2a] modulus: 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 public exponent: 10001 ] 2022-05-27 12:24:57.624  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-27 12:24:57.628 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-27 12:24:57.630 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-27 12:24:57.631 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-27 12:24:57.632  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-27 12:24:57.633  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-27 12:24:57.634  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-27 12:24:57.634 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-27 12:24:57.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-27 12:24:57.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-27 12:24:57.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-27 12:24:57.642 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:24:57.643 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:24:57.643 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:24:57.938  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-27 12:24:57.938  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-27 12:24:57.939 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-27 12:24:57.939 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:24:57.941  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-27 12:24:57.941  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-27 12:24:57.942 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:24:57.942 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:24:57.942 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:24:57.943 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:24:57.943 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:24:57.944 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:24:57.945 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:24:57.945 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:24:57.945 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:24:57.946 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-27 12:24:57.949 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 510849681982371889938408333538309556451425826738 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 27 09:42:23 UTC 2022 Final Date: Wed May 26 09:42:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:32:68:bd:f5:18:42:03:d6:5f:d1:6c:a8:93:6f:dd:0e:97:bd:a5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 617e1ec2e688e3e073cce811ad427a23599ce36b be542236d76c75101fe0a69e6fe3313b44cd387a 90678a36aa6644b094b5e394963e2dd8d8bd241c cb37e157d6a5f56b506e91f8af392e4bbb521e26 5f3cfabe29ea6395b5045e53f61dc5b68342d513 69e071b2c13b83b6b11614c836cbcd7721eaf6fe 4715cadc30cbd2a2cd928aee46b87ff7991120c2 1b38536e7710c1f7e776dc1a818d93cc8603e338 b583f8ef2f1a852b3493407fb082ed20279174de fab406d14b4823af1f74d403f9b6ae60daefad41 8f10884b436e43ab9e373706f6fc5b86256438c9 8ac797c3210c7fc76cb76491a7b32772acf65208 0bd2e28946a4473ef78cbcb18055433886ec2b61 9831bbbfd9c4d940cce19b38814deac789726bd8 e0857adf0fe97070ef2de133f01870f26a2c5603 2f10a5e59376a92237b5eebf3e5fa455b970e659 20fe607ca877815b98b4cd3e61d09e4be0aa8979 12cff3df2bb07c0c9c128a4164aa5c92f8373b0a e7f52961127fe05cd7ae922849b9e1629b9cb392 d5a43dbc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:1a:2c:30:c0:c7:07:47:70:82:dd:d3:9e:2b:8e:a7:27:cb:1d:90] modulus: c3bc73d212249588fd2e6678fc4c537c17ca89ea618c2bc91580bb6cd7fdc08c235dbfcc99693ef20873562bcfd42d21e5b5777f36c6b69324891719a85551331b27ecfd9dc90e0b32f98622e6afa50d88a0f432e3eb35b23f529bfbc304dd18e9a62156a283daad17195b9fe9a9d229077a0e24760dbd280d508c4ed6d072ad1187759ce325c960d87eb2d1a48f2bd0d463dba06b8da912f5cd65e10cd6228dcc26e21b8f153352ac639a5c0d63442b87f918f3d9ca6444a84546937501ba64796c393bcdb06139e9f23e86a6ba0f7791f574743dcdf10ebf46b2b770c4153e540b8e7471e5ac26f0f5d0d4c3de9c517f31b598f9f4e8ececa3bdacd8a09171 public exponent: 10001 ] 2022-05-27 12:28:52.945  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-27 12:28:52.946 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-27 12:28:52.948 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-27 12:28:52.949 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-27 12:28:52.949  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-27 12:28:52.950  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-27 12:28:52.950  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-27 12:28:52.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-27 12:28:52.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-27 12:28:52.952 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-27 12:28:52.958 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-27 12:28:52.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:28:52.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:28:52.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:28:53.189  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-27 12:28:53.189  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-27 12:28:53.190 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-27 12:28:53.190 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:28:53.192  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-27 12:28:53.192  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-27 12:28:53.193 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:28:53.193 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:28:53.193 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:28:53.194 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:28:53.195 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:28:53.195 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:28:53.196 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:28:53.196 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:28:53.196 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:28:53.199 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-27 12:28:53.203 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 510849681982371889938408333538309556451425826738 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 27 09:42:23 UTC 2022 Final Date: Wed May 26 09:42:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:32:68:bd:f5:18:42:03:d6:5f:d1:6c:a8:93:6f:dd:0e:97:bd:a5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 617e1ec2e688e3e073cce811ad427a23599ce36b be542236d76c75101fe0a69e6fe3313b44cd387a 90678a36aa6644b094b5e394963e2dd8d8bd241c cb37e157d6a5f56b506e91f8af392e4bbb521e26 5f3cfabe29ea6395b5045e53f61dc5b68342d513 69e071b2c13b83b6b11614c836cbcd7721eaf6fe 4715cadc30cbd2a2cd928aee46b87ff7991120c2 1b38536e7710c1f7e776dc1a818d93cc8603e338 b583f8ef2f1a852b3493407fb082ed20279174de fab406d14b4823af1f74d403f9b6ae60daefad41 8f10884b436e43ab9e373706f6fc5b86256438c9 8ac797c3210c7fc76cb76491a7b32772acf65208 0bd2e28946a4473ef78cbcb18055433886ec2b61 9831bbbfd9c4d940cce19b38814deac789726bd8 e0857adf0fe97070ef2de133f01870f26a2c5603 2f10a5e59376a92237b5eebf3e5fa455b970e659 20fe607ca877815b98b4cd3e61d09e4be0aa8979 12cff3df2bb07c0c9c128a4164aa5c92f8373b0a e7f52961127fe05cd7ae922849b9e1629b9cb392 d5a43dbc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [47:b4:3a:79:ef:ad:29:47:a3:da:d0:37:d3:79:ea:93:15:94:f8:1c] modulus: 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 public exponent: 10001 ] 2022-05-27 12:34:42.358  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-27 12:34:42.361 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-27 12:34:42.364 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-27 12:34:42.365 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-27 12:34:42.366  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-27 12:34:42.366  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-27 12:34:42.367  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-27 12:34:42.367 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-27 12:34:42.368 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-27 12:34:42.368 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-27 12:34:42.374 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-27 12:34:42.375 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:34:42.376 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:34:42.376 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:34:42.708  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-27 12:34:42.709  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-27 12:34:42.709 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-27 12:34:42.710 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:34:42.711  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-27 12:34:42.712  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-27 12:34:42.712 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:34:42.713 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:34:42.713 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:34:42.714 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:34:42.715 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:34:42.715 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:34:42.716 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:34:42.716 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:34:42.717 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:34:42.718 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-27 12:34:42.722 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 510849681982371889938408333538309556451425826738 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 27 09:42:23 UTC 2022 Final Date: Wed May 26 09:42:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:32:68:bd:f5:18:42:03:d6:5f:d1:6c:a8:93:6f:dd:0e:97:bd:a5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 617e1ec2e688e3e073cce811ad427a23599ce36b be542236d76c75101fe0a69e6fe3313b44cd387a 90678a36aa6644b094b5e394963e2dd8d8bd241c cb37e157d6a5f56b506e91f8af392e4bbb521e26 5f3cfabe29ea6395b5045e53f61dc5b68342d513 69e071b2c13b83b6b11614c836cbcd7721eaf6fe 4715cadc30cbd2a2cd928aee46b87ff7991120c2 1b38536e7710c1f7e776dc1a818d93cc8603e338 b583f8ef2f1a852b3493407fb082ed20279174de fab406d14b4823af1f74d403f9b6ae60daefad41 8f10884b436e43ab9e373706f6fc5b86256438c9 8ac797c3210c7fc76cb76491a7b32772acf65208 0bd2e28946a4473ef78cbcb18055433886ec2b61 9831bbbfd9c4d940cce19b38814deac789726bd8 e0857adf0fe97070ef2de133f01870f26a2c5603 2f10a5e59376a92237b5eebf3e5fa455b970e659 20fe607ca877815b98b4cd3e61d09e4be0aa8979 12cff3df2bb07c0c9c128a4164aa5c92f8373b0a e7f52961127fe05cd7ae922849b9e1629b9cb392 d5a43dbc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:79:f0:4e:08:c9:38:c7:7e:9d:73:3e:3a:00:7b:eb:51:5d:57:f0] modulus: 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 public exponent: 10001 ] 2022-05-27 12:39:44.961  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-27 12:39:44.965 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-27 12:39:44.967 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-27 12:39:44.968 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-27 12:39:44.968  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-27 12:39:44.969  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-27 12:39:44.969  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-27 12:39:44.969 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-27 12:39:44.970 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-27 12:39:44.970 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-27 12:39:44.975 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-27 12:39:44.976 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:39:44.976 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:39:44.976 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:39:45.185  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-27 12:39:45.186  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-27 12:39:45.186 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-27 12:39:45.186 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:39:45.188  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-27 12:39:45.188  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-27 12:39:45.188 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:39:45.189 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:39:45.189 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:39:45.190 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:39:45.190 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:39:45.190 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:39:45.191 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:39:45.191 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:39:45.191 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:39:45.192 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-27 12:39:45.195 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 510849681982371889938408333538309556451425826738 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 27 09:42:23 UTC 2022 Final Date: Wed May 26 09:42:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:32:68:bd:f5:18:42:03:d6:5f:d1:6c:a8:93:6f:dd:0e:97:bd:a5] modulus: aa6330b4cdcf3a0c5579696448a9caf1b9181c12aad6c56409c78b870344bc81cb6b93c9ba580a6422a9efaba472829c01914b61f0e3b5978562d60b9f29765a234f2eb804cce6e8bbdd8322bcd083a5403db0031dfae9e2f5834de81b338a518a480687fc83104aa38d2343e891a7702d1a3cb9f7c5d9f54bcaa1e6fcefd33e20d26798e7c97e21f0fbde19f2481f301b8077a65cf8bab7f0d4ab2df801dd79ac3221e2e7b2dc4b0a8de67c2cfc4ea261a2f88c9dfbe7793c150c28fcf5787da5c44b6604eb47ec568b2d5e28f27a9f96ea5ee50f4ab0d95c56150d87d8a6cb7649e7f2d4ec0183a43c9bff6877e2027dc73b4aa43c797e46b70237042232a83422e2b64020ad724cf1613e1f28438efadb2005411afd10fafb5c60a09f91ce036d18d92ded0d0721d0baf225f574343ad18122166c4a225aed81ce4a3caa2dd22de52f15df965da3507155a9f51114a90c4a553fdff2ec864c6352a5903686f9ee58af3571222b76c842a855a6e627fda1105447355f51c275482c7cfcd005 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 617e1ec2e688e3e073cce811ad427a23599ce36b be542236d76c75101fe0a69e6fe3313b44cd387a 90678a36aa6644b094b5e394963e2dd8d8bd241c cb37e157d6a5f56b506e91f8af392e4bbb521e26 5f3cfabe29ea6395b5045e53f61dc5b68342d513 69e071b2c13b83b6b11614c836cbcd7721eaf6fe 4715cadc30cbd2a2cd928aee46b87ff7991120c2 1b38536e7710c1f7e776dc1a818d93cc8603e338 b583f8ef2f1a852b3493407fb082ed20279174de fab406d14b4823af1f74d403f9b6ae60daefad41 8f10884b436e43ab9e373706f6fc5b86256438c9 8ac797c3210c7fc76cb76491a7b32772acf65208 0bd2e28946a4473ef78cbcb18055433886ec2b61 9831bbbfd9c4d940cce19b38814deac789726bd8 e0857adf0fe97070ef2de133f01870f26a2c5603 2f10a5e59376a92237b5eebf3e5fa455b970e659 20fe607ca877815b98b4cd3e61d09e4be0aa8979 12cff3df2bb07c0c9c128a4164aa5c92f8373b0a e7f52961127fe05cd7ae922849b9e1629b9cb392 d5a43dbc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c5:a7:2c:dd:ee:83:74:50:cb:a5:d3:48:b1:ff:2f:d6:01:c5:67:22] modulus: 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 public exponent: 10001 ] 2022-05-27 12:39:58.730  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-27 12:39:58.731 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-27 12:39:58.733 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-27 12:39:58.733 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-27 12:39:58.734  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-27 12:39:58.734  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-27 12:39:58.735  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-27 12:39:58.735 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-27 12:39:58.735 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-27 12:39:58.736 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-27 12:39:58.740 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-27 12:39:58.741 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:39:58.741 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:39:58.742 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:39:58.892  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-27 12:39:58.892  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-27 12:39:58.893 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-27 12:39:58.893 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:39:58.894  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-27 12:39:58.895  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-27 12:39:58.895 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:39:58.895 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:39:58.896 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:39:58.896 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:39:58.897 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:39:58.897 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:39:58.897 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:39:58.898 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:39:58.898 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:39:58.899 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-27 12:39:58.902 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 510849681982371889938408333538309556451425826738 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 27 09:42:23 UTC 2022 Final Date: Wed May 26 09:42:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:32:68:bd:f5:18:42:03:d6:5f:d1:6c:a8:93:6f:dd:0e:97:bd:a5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 617e1ec2e688e3e073cce811ad427a23599ce36b be542236d76c75101fe0a69e6fe3313b44cd387a 90678a36aa6644b094b5e394963e2dd8d8bd241c cb37e157d6a5f56b506e91f8af392e4bbb521e26 5f3cfabe29ea6395b5045e53f61dc5b68342d513 69e071b2c13b83b6b11614c836cbcd7721eaf6fe 4715cadc30cbd2a2cd928aee46b87ff7991120c2 1b38536e7710c1f7e776dc1a818d93cc8603e338 b583f8ef2f1a852b3493407fb082ed20279174de fab406d14b4823af1f74d403f9b6ae60daefad41 8f10884b436e43ab9e373706f6fc5b86256438c9 8ac797c3210c7fc76cb76491a7b32772acf65208 0bd2e28946a4473ef78cbcb18055433886ec2b61 9831bbbfd9c4d940cce19b38814deac789726bd8 e0857adf0fe97070ef2de133f01870f26a2c5603 2f10a5e59376a92237b5eebf3e5fa455b970e659 20fe607ca877815b98b4cd3e61d09e4be0aa8979 12cff3df2bb07c0c9c128a4164aa5c92f8373b0a e7f52961127fe05cd7ae922849b9e1629b9cb392 d5a43dbc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0c:20:1b:e9:94:b5:2d:7a:e4:ba:16:ad:f5:89:3b:40:de:d9:c5:a0] modulus: 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 public exponent: 10001 ] 2022-05-27 12:43:54.102  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-27 12:43:54.113 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-27 12:43:54.116 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-27 12:43:54.117 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-27 12:43:54.117  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-27 12:43:54.121  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-27 12:43:54.121  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-27 12:43:54.121 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-27 12:43:54.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-27 12:43:54.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-27 12:43:54.136 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-27 12:43:54.138 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:43:54.139 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:43:54.139 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:43:54.351  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-27 12:43:54.351  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-27 12:43:54.352 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-27 12:43:54.352 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:43:54.354  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-27 12:43:54.355  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-27 12:43:54.355 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:43:54.355 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:43:54.356 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:43:54.357 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:43:54.357 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:43:54.357 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:43:54.358 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:43:54.358 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:43:54.359 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:43:54.360 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-27 12:43:54.364 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 510849681982371889938408333538309556451425826738 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 27 09:42:23 UTC 2022 Final Date: Wed May 26 09:42:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:32:68:bd:f5:18:42:03:d6:5f:d1:6c:a8:93:6f:dd:0e:97:bd:a5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 617e1ec2e688e3e073cce811ad427a23599ce36b be542236d76c75101fe0a69e6fe3313b44cd387a 90678a36aa6644b094b5e394963e2dd8d8bd241c cb37e157d6a5f56b506e91f8af392e4bbb521e26 5f3cfabe29ea6395b5045e53f61dc5b68342d513 69e071b2c13b83b6b11614c836cbcd7721eaf6fe 4715cadc30cbd2a2cd928aee46b87ff7991120c2 1b38536e7710c1f7e776dc1a818d93cc8603e338 b583f8ef2f1a852b3493407fb082ed20279174de fab406d14b4823af1f74d403f9b6ae60daefad41 8f10884b436e43ab9e373706f6fc5b86256438c9 8ac797c3210c7fc76cb76491a7b32772acf65208 0bd2e28946a4473ef78cbcb18055433886ec2b61 9831bbbfd9c4d940cce19b38814deac789726bd8 e0857adf0fe97070ef2de133f01870f26a2c5603 2f10a5e59376a92237b5eebf3e5fa455b970e659 20fe607ca877815b98b4cd3e61d09e4be0aa8979 12cff3df2bb07c0c9c128a4164aa5c92f8373b0a e7f52961127fe05cd7ae922849b9e1629b9cb392 d5a43dbc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b2:fe:cd:f3:17:04:b2:d9:3a:f4:6a:70:4c:82:2e:38:21:27:bf:be] modulus: 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 public exponent: 10001 ] 2022-05-27 12:46:03.566  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-27 12:46:03.567 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-27 12:46:03.569 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-27 12:46:03.570 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-27 12:46:03.570  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-27 12:46:03.571  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-27 12:46:03.571  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-27 12:46:03.572 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-27 12:46:03.572 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-27 12:46:03.573 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-27 12:46:03.579 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-27 12:46:03.580 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:46:03.580 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:46:03.581 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:46:03.758  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-27 12:46:03.759  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-27 12:46:03.759 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-27 12:46:03.759 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:46:03.761  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-27 12:46:03.761  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-27 12:46:03.761 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:46:03.762 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:46:03.762 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:46:03.762 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:46:03.763 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:46:03.763 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:46:03.763 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:46:03.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:46:03.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:46:03.765 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-27 12:46:03.768 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 510849681982371889938408333538309556451425826738 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 27 09:42:23 UTC 2022 Final Date: Wed May 26 09:42:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:32:68:bd:f5:18:42:03:d6:5f:d1:6c:a8:93:6f:dd:0e:97:bd:a5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 617e1ec2e688e3e073cce811ad427a23599ce36b be542236d76c75101fe0a69e6fe3313b44cd387a 90678a36aa6644b094b5e394963e2dd8d8bd241c cb37e157d6a5f56b506e91f8af392e4bbb521e26 5f3cfabe29ea6395b5045e53f61dc5b68342d513 69e071b2c13b83b6b11614c836cbcd7721eaf6fe 4715cadc30cbd2a2cd928aee46b87ff7991120c2 1b38536e7710c1f7e776dc1a818d93cc8603e338 b583f8ef2f1a852b3493407fb082ed20279174de fab406d14b4823af1f74d403f9b6ae60daefad41 8f10884b436e43ab9e373706f6fc5b86256438c9 8ac797c3210c7fc76cb76491a7b32772acf65208 0bd2e28946a4473ef78cbcb18055433886ec2b61 9831bbbfd9c4d940cce19b38814deac789726bd8 e0857adf0fe97070ef2de133f01870f26a2c5603 2f10a5e59376a92237b5eebf3e5fa455b970e659 20fe607ca877815b98b4cd3e61d09e4be0aa8979 12cff3df2bb07c0c9c128a4164aa5c92f8373b0a e7f52961127fe05cd7ae922849b9e1629b9cb392 d5a43dbc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3d:7c:5b:a4:b7:bf:21:f5:95:31:bc:1c:a7:e7:d3:53:57:e7:21:8b] modulus: a621e8083c943f5b8bc188f226f1766aace9b2ca12e51a397728a10dad833f8f6f355e40bf03aa3b634d0f8a6c2c50efc262078d103bd30b62e469fc80c31b77978111c2c0544b9e66ff764b6f82f366a4be7189938ab7852f2647f1b3f164ea89bee87323c21c5c2a6a09f1f961167609e0c777115c2ce3f10cce6d0bdb5b273bc94bbe5b944be6917ef718daa928a130b3909e3a69ab73a3cd9c85c752aa80df30a81050cda60df08f8c428df4a7199c161ec9b9ba11221731525c6f633fe22b545536095fb4896932c16c4c829a0df8bc1b5b800e9fcede043dd26a4726ec54e4e76e52ed92342f186080492a8cd363a6fe05c2d35c4b6851fcce0d934de3 public exponent: 10001 ] 2022-05-27 12:46:21.074  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-27 12:46:21.075 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-27 12:46:21.077 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-27 12:46:21.077 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-27 12:46:21.078  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-27 12:46:21.079  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-27 12:46:21.079  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-27 12:46:21.080 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-27 12:46:21.080 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-27 12:46:21.081 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-27 12:46:21.091 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-27 12:46:21.091 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:46:21.092 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:46:21.092 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:46:21.309  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-27 12:46:21.310  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-27 12:46:21.310 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-27 12:46:21.310 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:46:21.312  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-27 12:46:21.312  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-27 12:46:21.312 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:46:21.313 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:46:21.313 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:46:21.314 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:46:21.314 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:46:21.314 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:46:21.315 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:46:21.315 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:46:21.316 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:46:21.316 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-27 12:46:21.319 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 510849681982371889938408333538309556451425826738 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 27 09:42:23 UTC 2022 Final Date: Wed May 26 09:42:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:32:68:bd:f5:18:42:03:d6:5f:d1:6c:a8:93:6f:dd:0e:97:bd:a5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 617e1ec2e688e3e073cce811ad427a23599ce36b be542236d76c75101fe0a69e6fe3313b44cd387a 90678a36aa6644b094b5e394963e2dd8d8bd241c cb37e157d6a5f56b506e91f8af392e4bbb521e26 5f3cfabe29ea6395b5045e53f61dc5b68342d513 69e071b2c13b83b6b11614c836cbcd7721eaf6fe 4715cadc30cbd2a2cd928aee46b87ff7991120c2 1b38536e7710c1f7e776dc1a818d93cc8603e338 b583f8ef2f1a852b3493407fb082ed20279174de fab406d14b4823af1f74d403f9b6ae60daefad41 8f10884b436e43ab9e373706f6fc5b86256438c9 8ac797c3210c7fc76cb76491a7b32772acf65208 0bd2e28946a4473ef78cbcb18055433886ec2b61 9831bbbfd9c4d940cce19b38814deac789726bd8 e0857adf0fe97070ef2de133f01870f26a2c5603 2f10a5e59376a92237b5eebf3e5fa455b970e659 20fe607ca877815b98b4cd3e61d09e4be0aa8979 12cff3df2bb07c0c9c128a4164aa5c92f8373b0a e7f52961127fe05cd7ae922849b9e1629b9cb392 d5a43dbc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:3d:2b:85:fd:bc:37:95:ce:68:68:f5:7b:dc:bd:26:d2:a5:ab:67] modulus: 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 public exponent: 10001 ] 2022-05-27 12:48:54.865  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-27 12:48:54.866 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-27 12:48:54.868 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-27 12:48:54.868 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-27 12:48:54.869  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-27 12:48:54.869  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-27 12:48:54.870  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-27 12:48:54.870 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-27 12:48:54.870 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-27 12:48:54.871 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-27 12:48:54.875 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-27 12:48:54.876 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:48:54.876 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-27 12:48:54.876 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:48:55.016  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-27 12:48:55.017  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-27 12:48:55.018 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-27 12:48:55.018 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-27 12:48:55.020  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-27 12:48:55.020  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-27 12:48:55.021 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:48:55.021 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:48:55.022 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:48:55.022 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:48:55.022 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:48:55.023 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:48:55.023 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-27 12:48:55.023 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-27 12:48:55.024 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-27 12:48:55.024 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-27 12:48:55.027 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 510849681982371889938408333538309556451425826738 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 27 09:42:23 UTC 2022 Final Date: Wed May 26 09:42:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:32:68:bd:f5:18:42:03:d6:5f:d1:6c:a8:93:6f:dd:0e:97:bd:a5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 617e1ec2e688e3e073cce811ad427a23599ce36b be542236d76c75101fe0a69e6fe3313b44cd387a 90678a36aa6644b094b5e394963e2dd8d8bd241c cb37e157d6a5f56b506e91f8af392e4bbb521e26 5f3cfabe29ea6395b5045e53f61dc5b68342d513 69e071b2c13b83b6b11614c836cbcd7721eaf6fe 4715cadc30cbd2a2cd928aee46b87ff7991120c2 1b38536e7710c1f7e776dc1a818d93cc8603e338 b583f8ef2f1a852b3493407fb082ed20279174de fab406d14b4823af1f74d403f9b6ae60daefad41 8f10884b436e43ab9e373706f6fc5b86256438c9 8ac797c3210c7fc76cb76491a7b32772acf65208 0bd2e28946a4473ef78cbcb18055433886ec2b61 9831bbbfd9c4d940cce19b38814deac789726bd8 e0857adf0fe97070ef2de133f01870f26a2c5603 2f10a5e59376a92237b5eebf3e5fa455b970e659 20fe607ca877815b98b4cd3e61d09e4be0aa8979 12cff3df2bb07c0c9c128a4164aa5c92f8373b0a e7f52961127fe05cd7ae922849b9e1629b9cb392 d5a43dbc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1e:9f:c1:96:10:83:a7:e5:14:24:49:d0:4c:98:b5:e9:b2:d9:31:fb] modulus: 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 public exponent: 10001 ]