2022-06-13 11:52:17,387 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-13 11:52:18,377 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-13 11:52:19.095  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jun 13, 2022 11:52:20 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 13, 2022 11:52:20 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 13, 2022 11:52:20 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 13, 2022 11:52:20 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-13 11:52:21.406 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-13 11:52:21.670  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-06-13 11:52:21.824  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-13 11:52:22.538 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-13 11:52:22.541 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-13 11:52:22.542 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-13 11:52:22.546 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-13 11:52:22.585 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-06-13 11:52:22.588 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-13 11:52:22.700 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-06-13 11:52:23.296 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 13, 2022 11:52:24 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-13 11:52:24.292  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 7.669 seconds (JVM running for 9.327) Jun 13, 2022 11:52:54 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-13 11:53:27.695  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-13 11:53:27.703 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-13 11:53:27.739 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-13 11:53:27.743 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-13 11:53:27.765  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-13 11:53:27.768  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-13 11:53:27.769  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-13 11:53:27.770 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-13 11:53:27.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 11:53:27.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-13 11:53:27.780 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-13 11:53:27.784 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-13 11:53:27.823 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-13 11:53:27.828 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 11:53:27.828 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 11:53:27.831 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 11:53:29.700  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-13 11:53:29.703  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-13 11:53:29.703 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-13 11:53:29.705 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 11:53:29.716  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-13 11:53:29.717  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-13 11:53:29.718 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 11:53:29.719 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 11:53:29.719 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 11:53:29.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 11:53:29.731 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 11:53:29.731 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 11:53:29.737 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 11:53:29.738 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 11:53:29.738 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 11:53:29.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-13 11:53:29.768 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186786263748182100301188942711828821047014833484 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 13 11:47:18 UTC 2022 Final Date: Sat Jun 12 11:47:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:8f:2e:c2:d0:e5:00:00:6f:dc:16:92:21:85:3d:18:a5:f5:0f:59] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c69f4e71a9480c6e4af258bf31f2ac7b8d209b9d 51ec8743b73c320a16a0c79e2e00d541e5424e51 8ed2c29f0fcb241ac1b409a53f540593f6945e0c f4f324702df770e850a33bb17f4e06c221a1250d 7c60e2644d351bee92d659b7c3321ac86f623a16 8d62886e6e4dff5c4baba9c08d75b2473267fe28 147612a20a3b013c4403bce283dca7bbbf58bcb5 d827b975f8fb7f960c462d8660879bf3c553c4ae 5ea2690da8761db33ca100b11e9835cc60f81f4b 1b653769e513e7ea781ff389d19110db347ba145 b07d9f18cc40408815945bb86dae8327906dfb06 acf6fab6b60d9d8b58b86de6e91ce69a46658a2e 5ea8ba9a0e4551ea2b853bd3c2e1cc28e38b875b 8d0f3345cbf55f423e7d2bcffa7c5f7f9d5332cb 497d37460ca5660bf6eac9cd42e967cf11899409 68e02f06f274791c2c837366824a0665a7d1c0cc e51c761716a485918fb2d5869c9b1379fd4364ed 8d6cc0d49fa154663914ad5474e5efda29c7c0ee 390f241300aff58e62073bc470ae57f4d6d5e874 2c11088b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [94:7c:f5:22:94:50:04:1b:11:9c:1a:45:6d:37:d9:dd:5e:7a:d6:eb] modulus: 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 public exponent: 10001 ] 2022-06-13 13:13:11.360  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-13 13:13:11.363 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-13 13:13:11.367 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-13 13:13:11.369 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-13 13:13:11.370  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-13 13:13:11.371  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-13 13:13:11.371  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-13 13:13:11.372 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-13 13:13:11.373 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-13 13:13:11.373 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-13 13:13:11.380 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-13 13:13:11.382 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 13:13:11.383 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 13:13:11.383 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 13:13:11.804  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-13 13:13:11.805  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-13 13:13:11.805 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-13 13:13:11.806 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 13:13:11.809  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-13 13:13:11.810  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-13 13:13:11.810 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:13:11.811 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:13:11.811 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:13:11.813 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:13:11.813 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:13:11.814 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:13:11.815 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:13:11.815 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:13:11.816 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:13:11.817 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-13 13:13:11.823 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186786263748182100301188942711828821047014833484 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 13 11:47:18 UTC 2022 Final Date: Sat Jun 12 11:47:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:8f:2e:c2:d0:e5:00:00:6f:dc:16:92:21:85:3d:18:a5:f5:0f:59] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c69f4e71a9480c6e4af258bf31f2ac7b8d209b9d 51ec8743b73c320a16a0c79e2e00d541e5424e51 8ed2c29f0fcb241ac1b409a53f540593f6945e0c f4f324702df770e850a33bb17f4e06c221a1250d 7c60e2644d351bee92d659b7c3321ac86f623a16 8d62886e6e4dff5c4baba9c08d75b2473267fe28 147612a20a3b013c4403bce283dca7bbbf58bcb5 d827b975f8fb7f960c462d8660879bf3c553c4ae 5ea2690da8761db33ca100b11e9835cc60f81f4b 1b653769e513e7ea781ff389d19110db347ba145 b07d9f18cc40408815945bb86dae8327906dfb06 acf6fab6b60d9d8b58b86de6e91ce69a46658a2e 5ea8ba9a0e4551ea2b853bd3c2e1cc28e38b875b 8d0f3345cbf55f423e7d2bcffa7c5f7f9d5332cb 497d37460ca5660bf6eac9cd42e967cf11899409 68e02f06f274791c2c837366824a0665a7d1c0cc e51c761716a485918fb2d5869c9b1379fd4364ed 8d6cc0d49fa154663914ad5474e5efda29c7c0ee 390f241300aff58e62073bc470ae57f4d6d5e874 2c11088b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [20:2a:11:c0:f8:1e:c4:e8:c6:25:24:d3:8a:4c:7e:6f:e8:22:40:f7] modulus: c3902043ee8db8fdb00d3b0ca16d07b6946ae71193e1d4dda51c054841fe872da8f82da641607ad01b3d13b31da733fbf819fa7d7da528f962f34af92313af15b5afe593c8b30dabf301ba2492c258fe47f2b3b52e02436776750ea26e48463c4140e59729200db1cbc756ea1c0c21d181da3a18b405b3c385d28c2c95dad6e5784597d9c8dc92cee754665d1c67b21522924fcc6a58d4466baa12d61aaa8a69486b5a69c1eb1708480faa592ec660f642cd9fc4e36db94ab0b2920f28e48ffb478d7435d03f133cb87bbba05a9270d5f7b4ac30f09b32d408040d8bcae358efde48e580d9cadaa37dc46e645b6571476b058919e21dbcabec8bcdf358490775 public exponent: 10001 ] 2022-06-13 13:16:12.030  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-13 13:16:12.033 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-13 13:16:12.036 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-13 13:16:12.037 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-13 13:16:12.038  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-13 13:16:12.038  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-13 13:16:12.039  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-13 13:16:12.039 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-13 13:16:12.040 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-13 13:16:12.041 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-13 13:16:12.049 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-13 13:16:12.050 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 13:16:12.050 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 13:16:12.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 13:16:12.344  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-13 13:16:12.345  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-13 13:16:12.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-13 13:16:12.347 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 13:16:12.350  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-13 13:16:12.350  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-13 13:16:12.351 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:16:12.352 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:16:12.353 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:16:12.357 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:16:12.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:16:12.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:16:12.361 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:16:12.362 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:16:12.363 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:16:12.364 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-13 13:16:12.369 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186786263748182100301188942711828821047014833484 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 13 11:47:18 UTC 2022 Final Date: Sat Jun 12 11:47:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:8f:2e:c2:d0:e5:00:00:6f:dc:16:92:21:85:3d:18:a5:f5:0f:59] modulus: c9beaeca4b647a142d8f6dea46bd25996054a0c6ea9132aa342a07df9d73cbf613a8cc35100ff73bbe518afdc2725de6d7bd55d02e4e0f1025fb0a15da6029f70d2d9fe3d1f3e3528b48bc36a4c830bfe9fceda9845497c9eed25e9e56d2bda359ebbb3cddd1b2b40651670963d63a69497a473cbd485ce9df91b6e0541f68904b897be0d7ff0047da75ab22096aa935f156e3a35d57e32f8a83d3144cfe8a6da3771a26e4fa061dcff1dd44d626b03c81aebe50a430aa8cc600e9c5ac74a2c5317fc8b500103f2b50fcd1d0b4a41f4a38615ca82bb099c489ec6e430c4e4097a3ae0b6b601c497613e5ac60142302e6d92dedea629545a99fc7c8a08323c5acebd5922abd3a2993137d8a6c08645d07d78ade4d1779f9193dfbf374b49ed7779552a4f4c4554230608f3b10c9320085bcd3b6b00cef8030ca7e280d74245055aca99b4adbb0c15b2a55c87e5b68e0ade787cd8be4edf85797b7812965566759945a896b99fd3463b15fd50b6a5f426417a74976e331acc407e76a8d69b89b7d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c69f4e71a9480c6e4af258bf31f2ac7b8d209b9d 51ec8743b73c320a16a0c79e2e00d541e5424e51 8ed2c29f0fcb241ac1b409a53f540593f6945e0c f4f324702df770e850a33bb17f4e06c221a1250d 7c60e2644d351bee92d659b7c3321ac86f623a16 8d62886e6e4dff5c4baba9c08d75b2473267fe28 147612a20a3b013c4403bce283dca7bbbf58bcb5 d827b975f8fb7f960c462d8660879bf3c553c4ae 5ea2690da8761db33ca100b11e9835cc60f81f4b 1b653769e513e7ea781ff389d19110db347ba145 b07d9f18cc40408815945bb86dae8327906dfb06 acf6fab6b60d9d8b58b86de6e91ce69a46658a2e 5ea8ba9a0e4551ea2b853bd3c2e1cc28e38b875b 8d0f3345cbf55f423e7d2bcffa7c5f7f9d5332cb 497d37460ca5660bf6eac9cd42e967cf11899409 68e02f06f274791c2c837366824a0665a7d1c0cc e51c761716a485918fb2d5869c9b1379fd4364ed 8d6cc0d49fa154663914ad5474e5efda29c7c0ee 390f241300aff58e62073bc470ae57f4d6d5e874 2c11088b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:14:ae:65:f2:fb:62:b6:b3:14:f2:46:89:ae:a2:7c:df:3c:d5:28] modulus: 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 public exponent: 10001 ] 2022-06-13 13:17:28.777  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-13 13:17:28.779 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-13 13:17:28.781 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-13 13:17:28.782 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-13 13:17:28.783  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-13 13:17:28.783  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-13 13:17:28.784  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-13 13:17:28.784 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-13 13:17:28.785 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-13 13:17:28.785 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-13 13:17:28.790 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-13 13:17:28.791 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 13:17:28.791 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 13:17:28.792 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 13:17:29.130  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-13 13:17:29.131  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-13 13:17:29.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-13 13:17:29.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 13:17:29.134  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-13 13:17:29.135  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-13 13:17:29.135 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:17:29.135 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:17:29.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:17:29.137 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:17:29.137 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:17:29.137 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:17:29.138 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:17:29.138 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:17:29.139 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:17:29.140 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-13 13:17:29.144 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186786263748182100301188942711828821047014833484 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 13 11:47:18 UTC 2022 Final Date: Sat Jun 12 11:47:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:8f:2e:c2:d0:e5:00:00:6f:dc:16:92:21:85:3d:18:a5:f5:0f:59] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c69f4e71a9480c6e4af258bf31f2ac7b8d209b9d 51ec8743b73c320a16a0c79e2e00d541e5424e51 8ed2c29f0fcb241ac1b409a53f540593f6945e0c f4f324702df770e850a33bb17f4e06c221a1250d 7c60e2644d351bee92d659b7c3321ac86f623a16 8d62886e6e4dff5c4baba9c08d75b2473267fe28 147612a20a3b013c4403bce283dca7bbbf58bcb5 d827b975f8fb7f960c462d8660879bf3c553c4ae 5ea2690da8761db33ca100b11e9835cc60f81f4b 1b653769e513e7ea781ff389d19110db347ba145 b07d9f18cc40408815945bb86dae8327906dfb06 acf6fab6b60d9d8b58b86de6e91ce69a46658a2e 5ea8ba9a0e4551ea2b853bd3c2e1cc28e38b875b 8d0f3345cbf55f423e7d2bcffa7c5f7f9d5332cb 497d37460ca5660bf6eac9cd42e967cf11899409 68e02f06f274791c2c837366824a0665a7d1c0cc e51c761716a485918fb2d5869c9b1379fd4364ed 8d6cc0d49fa154663914ad5474e5efda29c7c0ee 390f241300aff58e62073bc470ae57f4d6d5e874 2c11088b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [68:35:94:f2:2c:a3:ef:42:4a:17:e8:52:2e:37:f7:d4:de:99:d8:de] modulus: be328fa80680355714304f35531048068f0e2e65ee5944ac0b45e3cbc0cafeebef1c816079f2107769f60fdc17b31d891c537c7c5a96c1b127250a8bf54bc8b9e1252917fbe5db147df60b2c2b4331e483761a5039c4511ec55a537b94fc2562d9e43c5a5e4139097a899f310413215cf873fcfe45daea32944263571aa636b57816fd6e21b48e805ee320f7ee8eb209830fc843dcb51a7f3c2c6db70ab2e6464145845f9aba21c78088f92907f77f241980a0fecec57bfd29495fcb1bdff3c478a6e34922b80cd92d71d32f05287270ca6f5ff57c03376439d5a71d0b5cfe1a9b5dbfb9adbe744f0bbf2f8b71984eaa7d3d0fc354f9ebe115c1e760778f911b public exponent: 10001 ] 2022-06-13 13:18:49.194  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-13 13:18:49.197 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-13 13:18:49.200 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-13 13:18:49.201 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-13 13:18:49.201  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-13 13:18:49.202  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-13 13:18:49.203  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-13 13:18:49.203 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-13 13:18:49.204 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-13 13:18:49.204 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-13 13:18:49.210 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-13 13:18:49.212 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 13:18:49.212 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 13:18:49.213 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 13:18:49.560  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-13 13:18:49.561  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-13 13:18:49.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-13 13:18:49.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 13:18:49.573  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-13 13:18:49.574  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-13 13:18:49.574 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:18:49.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:18:49.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:18:49.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:18:49.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:18:49.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:18:49.579 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:18:49.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:18:49.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:18:49.582 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-13 13:18:49.587 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186786263748182100301188942711828821047014833484 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 13 11:47:18 UTC 2022 Final Date: Sat Jun 12 11:47:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:8f:2e:c2:d0:e5:00:00:6f:dc:16:92:21:85:3d:18:a5:f5:0f:59] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c69f4e71a9480c6e4af258bf31f2ac7b8d209b9d 51ec8743b73c320a16a0c79e2e00d541e5424e51 8ed2c29f0fcb241ac1b409a53f540593f6945e0c f4f324702df770e850a33bb17f4e06c221a1250d 7c60e2644d351bee92d659b7c3321ac86f623a16 8d62886e6e4dff5c4baba9c08d75b2473267fe28 147612a20a3b013c4403bce283dca7bbbf58bcb5 d827b975f8fb7f960c462d8660879bf3c553c4ae 5ea2690da8761db33ca100b11e9835cc60f81f4b 1b653769e513e7ea781ff389d19110db347ba145 b07d9f18cc40408815945bb86dae8327906dfb06 acf6fab6b60d9d8b58b86de6e91ce69a46658a2e 5ea8ba9a0e4551ea2b853bd3c2e1cc28e38b875b 8d0f3345cbf55f423e7d2bcffa7c5f7f9d5332cb 497d37460ca5660bf6eac9cd42e967cf11899409 68e02f06f274791c2c837366824a0665a7d1c0cc e51c761716a485918fb2d5869c9b1379fd4364ed 8d6cc0d49fa154663914ad5474e5efda29c7c0ee 390f241300aff58e62073bc470ae57f4d6d5e874 2c11088b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:2d:83:6a:73:61:d1:65:6b:44:18:26:53:3f:25:39:29:d3:6c:d7] modulus: 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 public exponent: 10001 ] 2022-06-13 13:20:55.325  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-13 13:20:55.327 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-13 13:20:55.329 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-13 13:20:55.329 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-13 13:20:55.330  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-13 13:20:55.331  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-13 13:20:55.331  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-13 13:20:55.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-13 13:20:55.332 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-13 13:20:55.332 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-13 13:20:55.341 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-13 13:20:55.343 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 13:20:55.343 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 13:20:55.344 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 13:20:55.645  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-13 13:20:55.645  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-13 13:20:55.646 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-13 13:20:55.646 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 13:20:55.648  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-13 13:20:55.649  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-13 13:20:55.650 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:20:55.650 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:20:55.651 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:20:55.652 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:20:55.653 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:20:55.653 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:20:55.654 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:20:55.655 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:20:55.655 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:20:55.657 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-13 13:20:55.669 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186786263748182100301188942711828821047014833484 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 13 11:47:18 UTC 2022 Final Date: Sat Jun 12 11:47:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:8f:2e:c2:d0:e5:00:00:6f:dc:16:92:21:85:3d:18:a5:f5:0f:59] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c69f4e71a9480c6e4af258bf31f2ac7b8d209b9d 51ec8743b73c320a16a0c79e2e00d541e5424e51 8ed2c29f0fcb241ac1b409a53f540593f6945e0c f4f324702df770e850a33bb17f4e06c221a1250d 7c60e2644d351bee92d659b7c3321ac86f623a16 8d62886e6e4dff5c4baba9c08d75b2473267fe28 147612a20a3b013c4403bce283dca7bbbf58bcb5 d827b975f8fb7f960c462d8660879bf3c553c4ae 5ea2690da8761db33ca100b11e9835cc60f81f4b 1b653769e513e7ea781ff389d19110db347ba145 b07d9f18cc40408815945bb86dae8327906dfb06 acf6fab6b60d9d8b58b86de6e91ce69a46658a2e 5ea8ba9a0e4551ea2b853bd3c2e1cc28e38b875b 8d0f3345cbf55f423e7d2bcffa7c5f7f9d5332cb 497d37460ca5660bf6eac9cd42e967cf11899409 68e02f06f274791c2c837366824a0665a7d1c0cc e51c761716a485918fb2d5869c9b1379fd4364ed 8d6cc0d49fa154663914ad5474e5efda29c7c0ee 390f241300aff58e62073bc470ae57f4d6d5e874 2c11088b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a0:5b:4f:3c:55:52:ab:77:95:17:af:92:2e:bc:f9:46:49:e2:32:83] modulus: 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 public exponent: 10001 ] 2022-06-13 13:24:58.642  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-13 13:24:58.645 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-13 13:24:58.648 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-13 13:24:58.649 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-13 13:24:58.650  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-13 13:24:58.650  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-13 13:24:58.651  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-13 13:24:58.651 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-13 13:24:58.652 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-13 13:24:58.652 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-13 13:24:58.658 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-13 13:24:58.659 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 13:24:58.659 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 13:24:58.660 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 13:24:59.079  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-13 13:24:59.080  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-13 13:24:59.080 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-13 13:24:59.081 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 13:24:59.082  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-13 13:24:59.083  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-13 13:24:59.083 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:24:59.084 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:24:59.084 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:24:59.085 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:24:59.086 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:24:59.086 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:24:59.087 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:24:59.088 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:24:59.088 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:24:59.089 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-13 13:24:59.093 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186786263748182100301188942711828821047014833484 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 13 11:47:18 UTC 2022 Final Date: Sat Jun 12 11:47:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:8f:2e:c2:d0:e5:00:00:6f:dc:16:92:21:85:3d:18:a5:f5:0f:59] modulus: c9beaeca4b647a142d8f6dea46bd25996054a0c6ea9132aa342a07df9d73cbf613a8cc35100ff73bbe518afdc2725de6d7bd55d02e4e0f1025fb0a15da6029f70d2d9fe3d1f3e3528b48bc36a4c830bfe9fceda9845497c9eed25e9e56d2bda359ebbb3cddd1b2b40651670963d63a69497a473cbd485ce9df91b6e0541f68904b897be0d7ff0047da75ab22096aa935f156e3a35d57e32f8a83d3144cfe8a6da3771a26e4fa061dcff1dd44d626b03c81aebe50a430aa8cc600e9c5ac74a2c5317fc8b500103f2b50fcd1d0b4a41f4a38615ca82bb099c489ec6e430c4e4097a3ae0b6b601c497613e5ac60142302e6d92dedea629545a99fc7c8a08323c5acebd5922abd3a2993137d8a6c08645d07d78ade4d1779f9193dfbf374b49ed7779552a4f4c4554230608f3b10c9320085bcd3b6b00cef8030ca7e280d74245055aca99b4adbb0c15b2a55c87e5b68e0ade787cd8be4edf85797b7812965566759945a896b99fd3463b15fd50b6a5f426417a74976e331acc407e76a8d69b89b7d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c69f4e71a9480c6e4af258bf31f2ac7b8d209b9d 51ec8743b73c320a16a0c79e2e00d541e5424e51 8ed2c29f0fcb241ac1b409a53f540593f6945e0c f4f324702df770e850a33bb17f4e06c221a1250d 7c60e2644d351bee92d659b7c3321ac86f623a16 8d62886e6e4dff5c4baba9c08d75b2473267fe28 147612a20a3b013c4403bce283dca7bbbf58bcb5 d827b975f8fb7f960c462d8660879bf3c553c4ae 5ea2690da8761db33ca100b11e9835cc60f81f4b 1b653769e513e7ea781ff389d19110db347ba145 b07d9f18cc40408815945bb86dae8327906dfb06 acf6fab6b60d9d8b58b86de6e91ce69a46658a2e 5ea8ba9a0e4551ea2b853bd3c2e1cc28e38b875b 8d0f3345cbf55f423e7d2bcffa7c5f7f9d5332cb 497d37460ca5660bf6eac9cd42e967cf11899409 68e02f06f274791c2c837366824a0665a7d1c0cc e51c761716a485918fb2d5869c9b1379fd4364ed 8d6cc0d49fa154663914ad5474e5efda29c7c0ee 390f241300aff58e62073bc470ae57f4d6d5e874 2c11088b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d3:f1:03:a4:b2:bc:5b:aa:7b:35:84:bd:08:f0:6d:07:4d:78:8d:4a] modulus: 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 public exponent: 10001 ] 2022-06-13 13:26:11.976  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-13 13:26:11.978 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-13 13:26:11.979 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-13 13:26:11.980 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-13 13:26:11.981  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-13 13:26:11.981  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-13 13:26:11.982  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-13 13:26:11.982 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-13 13:26:11.983 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-13 13:26:11.983 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-13 13:26:11.988 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-13 13:26:11.989 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 13:26:11.989 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 13:26:11.989 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 13:26:12.215  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-13 13:26:12.216  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-13 13:26:12.217 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-13 13:26:12.217 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 13:26:12.219  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-13 13:26:12.219  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-13 13:26:12.219 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:26:12.220 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:26:12.220 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:26:12.221 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:26:12.222 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:26:12.222 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:26:12.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:26:12.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:26:12.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:26:12.225 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-13 13:26:12.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186786263748182100301188942711828821047014833484 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 13 11:47:18 UTC 2022 Final Date: Sat Jun 12 11:47:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:8f:2e:c2:d0:e5:00:00:6f:dc:16:92:21:85:3d:18:a5:f5:0f:59] modulus: c9beaeca4b647a142d8f6dea46bd25996054a0c6ea9132aa342a07df9d73cbf613a8cc35100ff73bbe518afdc2725de6d7bd55d02e4e0f1025fb0a15da6029f70d2d9fe3d1f3e3528b48bc36a4c830bfe9fceda9845497c9eed25e9e56d2bda359ebbb3cddd1b2b40651670963d63a69497a473cbd485ce9df91b6e0541f68904b897be0d7ff0047da75ab22096aa935f156e3a35d57e32f8a83d3144cfe8a6da3771a26e4fa061dcff1dd44d626b03c81aebe50a430aa8cc600e9c5ac74a2c5317fc8b500103f2b50fcd1d0b4a41f4a38615ca82bb099c489ec6e430c4e4097a3ae0b6b601c497613e5ac60142302e6d92dedea629545a99fc7c8a08323c5acebd5922abd3a2993137d8a6c08645d07d78ade4d1779f9193dfbf374b49ed7779552a4f4c4554230608f3b10c9320085bcd3b6b00cef8030ca7e280d74245055aca99b4adbb0c15b2a55c87e5b68e0ade787cd8be4edf85797b7812965566759945a896b99fd3463b15fd50b6a5f426417a74976e331acc407e76a8d69b89b7d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c69f4e71a9480c6e4af258bf31f2ac7b8d209b9d 51ec8743b73c320a16a0c79e2e00d541e5424e51 8ed2c29f0fcb241ac1b409a53f540593f6945e0c f4f324702df770e850a33bb17f4e06c221a1250d 7c60e2644d351bee92d659b7c3321ac86f623a16 8d62886e6e4dff5c4baba9c08d75b2473267fe28 147612a20a3b013c4403bce283dca7bbbf58bcb5 d827b975f8fb7f960c462d8660879bf3c553c4ae 5ea2690da8761db33ca100b11e9835cc60f81f4b 1b653769e513e7ea781ff389d19110db347ba145 b07d9f18cc40408815945bb86dae8327906dfb06 acf6fab6b60d9d8b58b86de6e91ce69a46658a2e 5ea8ba9a0e4551ea2b853bd3c2e1cc28e38b875b 8d0f3345cbf55f423e7d2bcffa7c5f7f9d5332cb 497d37460ca5660bf6eac9cd42e967cf11899409 68e02f06f274791c2c837366824a0665a7d1c0cc e51c761716a485918fb2d5869c9b1379fd4364ed 8d6cc0d49fa154663914ad5474e5efda29c7c0ee 390f241300aff58e62073bc470ae57f4d6d5e874 2c11088b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:de:25:84:c8:d0:16:1a:3e:d1:99:f6:de:f0:93:16:41:6b:c0:93] modulus: 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 public exponent: 10001 ] 2022-06-13 13:32:52.070  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-13 13:32:52.074 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-13 13:32:52.079 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-13 13:32:52.081 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-13 13:32:52.082  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-13 13:32:52.082  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-13 13:32:52.083  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-13 13:32:52.084 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-13 13:32:52.085 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-13 13:32:52.086 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-13 13:32:52.092 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-13 13:32:52.093 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 13:32:52.094 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 13:32:52.094 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 13:32:52.425  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-13 13:32:52.426  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-13 13:32:52.426 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-13 13:32:52.426 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 13:32:52.427  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-13 13:32:52.428  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-13 13:32:52.428 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:32:52.429 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:32:52.429 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:32:52.430 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:32:52.430 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:32:52.431 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:32:52.431 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:32:52.432 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:32:52.432 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:32:52.433 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-13 13:32:52.436 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186786263748182100301188942711828821047014833484 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 13 11:47:18 UTC 2022 Final Date: Sat Jun 12 11:47:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:8f:2e:c2:d0:e5:00:00:6f:dc:16:92:21:85:3d:18:a5:f5:0f:59] modulus: c9beaeca4b647a142d8f6dea46bd25996054a0c6ea9132aa342a07df9d73cbf613a8cc35100ff73bbe518afdc2725de6d7bd55d02e4e0f1025fb0a15da6029f70d2d9fe3d1f3e3528b48bc36a4c830bfe9fceda9845497c9eed25e9e56d2bda359ebbb3cddd1b2b40651670963d63a69497a473cbd485ce9df91b6e0541f68904b897be0d7ff0047da75ab22096aa935f156e3a35d57e32f8a83d3144cfe8a6da3771a26e4fa061dcff1dd44d626b03c81aebe50a430aa8cc600e9c5ac74a2c5317fc8b500103f2b50fcd1d0b4a41f4a38615ca82bb099c489ec6e430c4e4097a3ae0b6b601c497613e5ac60142302e6d92dedea629545a99fc7c8a08323c5acebd5922abd3a2993137d8a6c08645d07d78ade4d1779f9193dfbf374b49ed7779552a4f4c4554230608f3b10c9320085bcd3b6b00cef8030ca7e280d74245055aca99b4adbb0c15b2a55c87e5b68e0ade787cd8be4edf85797b7812965566759945a896b99fd3463b15fd50b6a5f426417a74976e331acc407e76a8d69b89b7d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c69f4e71a9480c6e4af258bf31f2ac7b8d209b9d 51ec8743b73c320a16a0c79e2e00d541e5424e51 8ed2c29f0fcb241ac1b409a53f540593f6945e0c f4f324702df770e850a33bb17f4e06c221a1250d 7c60e2644d351bee92d659b7c3321ac86f623a16 8d62886e6e4dff5c4baba9c08d75b2473267fe28 147612a20a3b013c4403bce283dca7bbbf58bcb5 d827b975f8fb7f960c462d8660879bf3c553c4ae 5ea2690da8761db33ca100b11e9835cc60f81f4b 1b653769e513e7ea781ff389d19110db347ba145 b07d9f18cc40408815945bb86dae8327906dfb06 acf6fab6b60d9d8b58b86de6e91ce69a46658a2e 5ea8ba9a0e4551ea2b853bd3c2e1cc28e38b875b 8d0f3345cbf55f423e7d2bcffa7c5f7f9d5332cb 497d37460ca5660bf6eac9cd42e967cf11899409 68e02f06f274791c2c837366824a0665a7d1c0cc e51c761716a485918fb2d5869c9b1379fd4364ed 8d6cc0d49fa154663914ad5474e5efda29c7c0ee 390f241300aff58e62073bc470ae57f4d6d5e874 2c11088b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e8:09:a1:06:d5:fc:e7:7a:fb:51:f1:4b:ba:f1:80:60:0e:a0:a4:12] modulus: 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 public exponent: 10001 ] 2022-06-13 13:33:09.211  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-13 13:33:09.215 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-13 13:33:09.216 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-13 13:33:09.217 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-13 13:33:09.217  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-13 13:33:09.218  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-13 13:33:09.218  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-13 13:33:09.220 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-13 13:33:09.220 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-13 13:33:09.221 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-13 13:33:09.225 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-13 13:33:09.226 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 13:33:09.226 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-13 13:33:09.227 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 13:33:09.379  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-13 13:33:09.379  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-13 13:33:09.380 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-13 13:33:09.380 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-13 13:33:09.381  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-13 13:33:09.382  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-13 13:33:09.382 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:33:09.382 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:33:09.382 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:33:09.383 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:33:09.383 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:33:09.384 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:33:09.384 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-13 13:33:09.385 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-13 13:33:09.385 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-13 13:33:09.386 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-13 13:33:09.389 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186786263748182100301188942711828821047014833484 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 13 11:47:18 UTC 2022 Final Date: Sat Jun 12 11:47:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:8f:2e:c2:d0:e5:00:00:6f:dc:16:92:21:85:3d:18:a5:f5:0f:59] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c69f4e71a9480c6e4af258bf31f2ac7b8d209b9d 51ec8743b73c320a16a0c79e2e00d541e5424e51 8ed2c29f0fcb241ac1b409a53f540593f6945e0c f4f324702df770e850a33bb17f4e06c221a1250d 7c60e2644d351bee92d659b7c3321ac86f623a16 8d62886e6e4dff5c4baba9c08d75b2473267fe28 147612a20a3b013c4403bce283dca7bbbf58bcb5 d827b975f8fb7f960c462d8660879bf3c553c4ae 5ea2690da8761db33ca100b11e9835cc60f81f4b 1b653769e513e7ea781ff389d19110db347ba145 b07d9f18cc40408815945bb86dae8327906dfb06 acf6fab6b60d9d8b58b86de6e91ce69a46658a2e 5ea8ba9a0e4551ea2b853bd3c2e1cc28e38b875b 8d0f3345cbf55f423e7d2bcffa7c5f7f9d5332cb 497d37460ca5660bf6eac9cd42e967cf11899409 68e02f06f274791c2c837366824a0665a7d1c0cc e51c761716a485918fb2d5869c9b1379fd4364ed 8d6cc0d49fa154663914ad5474e5efda29c7c0ee 390f241300aff58e62073bc470ae57f4d6d5e874 2c11088b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:55:bd:9f:91:5d:bf:48:a5:ea:76:17:21:85:68:e8:f9:7d:d4:f9] modulus: b6ac3fd9ecf1cd8cd1da49680c3ba32902a7c26faab49bf72ca9fbaa6c868f7f9d536857dc19a0edb54f40a03d5014a1b623eaac2d03fcab066590cd7fad126fec78ba6b0197be7bef1cbda333cf8bbe6f74a7d5f1c62519e58c2904760f105728035997b9ddc02a06dbf8976de447d690b0af1aebf4bc01be674c45c2eec594c35040add4573ce061987b934d0ce754e4fc9fd73f6fbf6215b67ae73e708f1e1da5e21ea81ee59f65a3f11b43b6909d55c0a396641a7641b973e6771ac5a71e754c3d843d2084f658136cf865bedae91a73bb2d461028d3480218115e5dcf24bd22222f68532bfa5f9c11545fba4e48b5f5ded79988e2210546d2ad8b6fa385 public exponent: 10001 ]