2022-06-23 03:14:12,534 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-23 03:14:13,541 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-23 03:14:14.246  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jun 23, 2022 3:14:16 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 23, 2022 3:14:16 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 23, 2022 3:14:16 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 23, 2022 3:14:16 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-23 03:14:16.889 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-23 03:14:17.173  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-06-23 03:14:17.344  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-23 03:14:18.062 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-23 03:14:18.066 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-23 03:14:18.067 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-23 03:14:18.073 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-23 03:14:18.117 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-23 03:14:18.122 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-06-23 03:14:18.269 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-06-23 03:14:18.852 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 23, 2022 3:14:19 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-23 03:14:19.769  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.021 seconds (JVM running for 9.75) Jun 23, 2022 3:14:41 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-23 03:14:59.032  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-23 03:14:59.042 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-23 03:14:59.083 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-23 03:14:59.087 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-23 03:14:59.104  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-23 03:14:59.107  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-23 03:14:59.108  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-23 03:14:59.109 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 03:14:59.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 03:14:59.114 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 03:14:59.121 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-23 03:14:59.125 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-23 03:14:59.165 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-23 03:14:59.170 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 03:14:59.170 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 03:14:59.174 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 03:14:59.789  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-23 03:14:59.791  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-23 03:14:59.791 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-23 03:14:59.793 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 03:14:59.802  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-23 03:14:59.802  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-23 03:14:59.803 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 03:14:59.804 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 03:14:59.804 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 03:14:59.817 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 03:14:59.818 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 03:14:59.818 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 03:14:59.824 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 03:14:59.824 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 03:14:59.825 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 03:14:59.826 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-23 03:14:59.855 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31901880197755761012553140989362061623093746243 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 23 03:12:01 UTC 2022 Final Date: Tue Jun 22 03:12:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:01:f7:3c:16:e2:99:2f:24:c4:11:ca:f0:32:a6:0f:93:4c:13:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb516d8e1bc222ebeece6488140dd70e16537e3 4c80d8343e1786cca1eae10bc9d3b5d81ec92132 f91311000bc01d5019cccf23d2be2cdc40da2800 8d8c7cba3153adaef7d653236f4f9275c1297acf 45b0c6b9cccb235c845dc7f57b0f4ab645ae692f ecfac995ec27a9195b6945d7c586b4c0686418ca 1529edaf2063590eb37bff972dff7ec508a111a1 0ffc4f06928f8c0f23519f552b188def956a5581 ebfa69d0c0275a7ac9496d81117b057ed221c549 7a391dac79843b852342824ae2dc34b57618dc98 25e3b4452b071a8d5922d25892a855f5ef862d76 c1b3211cf0349be8be7820cb3495abb2feea8f3f dda9fb5cac627d5ac9c4424dec9148929cad1a0a f183f1574f330b59a791184907f958709fdb2260 da8603ac6f950a92eedd0fd4a2260b1ca4e692b6 469a833374e58f856d66cec6b8567dcaf8b92a7e 3d7bec112f5293ecb5ffd7a5a60c4dceb38ef2a7 22fab385b0ea76af2e1f779a22af1c8eef9fedf1 de12ed45409a32d1100c03d3240141ad0e0e89e9 91c4427a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [10:9a:30:5b:90:41:9e:09:b9:dd:62:8b:cb:45:88:fb:9f:9c:f9:db] modulus: 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 public exponent: 10001 ] 2022-06-23 04:42:47.280  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-23 04:42:47.285 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-23 04:42:47.289 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 04:42:47.290 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-23 04:42:47.291  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 04:42:47.292  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-23 04:42:47.293  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-23 04:42:47.294 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 04:42:47.294 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-23 04:42:47.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-23 04:42:47.302 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-23 04:42:47.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 04:42:47.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 04:42:47.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 04:42:47.499  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-23 04:42:47.500  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-23 04:42:47.501 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-23 04:42:47.501 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 04:42:47.506  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-23 04:42:47.507  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-23 04:42:47.508 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:42:47.508 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:42:47.509 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:42:47.510 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:42:47.511 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:42:47.511 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:42:47.513 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:42:47.514 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:42:47.514 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:42:47.516 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-23 04:42:47.525 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31901880197755761012553140989362061623093746243 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 23 03:12:01 UTC 2022 Final Date: Tue Jun 22 03:12:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:01:f7:3c:16:e2:99:2f:24:c4:11:ca:f0:32:a6:0f:93:4c:13:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb516d8e1bc222ebeece6488140dd70e16537e3 4c80d8343e1786cca1eae10bc9d3b5d81ec92132 f91311000bc01d5019cccf23d2be2cdc40da2800 8d8c7cba3153adaef7d653236f4f9275c1297acf 45b0c6b9cccb235c845dc7f57b0f4ab645ae692f ecfac995ec27a9195b6945d7c586b4c0686418ca 1529edaf2063590eb37bff972dff7ec508a111a1 0ffc4f06928f8c0f23519f552b188def956a5581 ebfa69d0c0275a7ac9496d81117b057ed221c549 7a391dac79843b852342824ae2dc34b57618dc98 25e3b4452b071a8d5922d25892a855f5ef862d76 c1b3211cf0349be8be7820cb3495abb2feea8f3f dda9fb5cac627d5ac9c4424dec9148929cad1a0a f183f1574f330b59a791184907f958709fdb2260 da8603ac6f950a92eedd0fd4a2260b1ca4e692b6 469a833374e58f856d66cec6b8567dcaf8b92a7e 3d7bec112f5293ecb5ffd7a5a60c4dceb38ef2a7 22fab385b0ea76af2e1f779a22af1c8eef9fedf1 de12ed45409a32d1100c03d3240141ad0e0e89e9 91c4427a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5b:79:f4:bf:7e:0a:52:b6:7b:93:7f:9e:7e:75:93:7b:e6:0b:76:a8] modulus: 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 public exponent: 10001 ] 2022-06-23 04:44:35.642  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-23 04:44:35.643 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-23 04:44:35.645 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-23 04:44:35.646 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-23 04:44:35.647  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-23 04:44:35.648  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-23 04:44:35.648  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-23 04:44:35.649 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 04:44:35.649 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-23 04:44:35.651 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-23 04:44:35.660 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-23 04:44:35.661 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 04:44:35.661 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 04:44:35.662 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 04:44:35.852  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-23 04:44:35.853  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-23 04:44:35.853 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-23 04:44:35.853 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 04:44:35.856  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-23 04:44:35.857  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-23 04:44:35.857 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:44:35.858 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:44:35.858 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:44:35.859 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:44:35.860 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:44:35.860 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:44:35.861 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:44:35.861 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:44:35.862 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:44:35.863 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-23 04:44:35.867 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31901880197755761012553140989362061623093746243 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 23 03:12:01 UTC 2022 Final Date: Tue Jun 22 03:12:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:01:f7:3c:16:e2:99:2f:24:c4:11:ca:f0:32:a6:0f:93:4c:13:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb516d8e1bc222ebeece6488140dd70e16537e3 4c80d8343e1786cca1eae10bc9d3b5d81ec92132 f91311000bc01d5019cccf23d2be2cdc40da2800 8d8c7cba3153adaef7d653236f4f9275c1297acf 45b0c6b9cccb235c845dc7f57b0f4ab645ae692f ecfac995ec27a9195b6945d7c586b4c0686418ca 1529edaf2063590eb37bff972dff7ec508a111a1 0ffc4f06928f8c0f23519f552b188def956a5581 ebfa69d0c0275a7ac9496d81117b057ed221c549 7a391dac79843b852342824ae2dc34b57618dc98 25e3b4452b071a8d5922d25892a855f5ef862d76 c1b3211cf0349be8be7820cb3495abb2feea8f3f dda9fb5cac627d5ac9c4424dec9148929cad1a0a f183f1574f330b59a791184907f958709fdb2260 da8603ac6f950a92eedd0fd4a2260b1ca4e692b6 469a833374e58f856d66cec6b8567dcaf8b92a7e 3d7bec112f5293ecb5ffd7a5a60c4dceb38ef2a7 22fab385b0ea76af2e1f779a22af1c8eef9fedf1 de12ed45409a32d1100c03d3240141ad0e0e89e9 91c4427a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4b:79:07:ce:03:57:b1:77:f1:24:5b:64:89:93:6d:6c:8c:fa:0b:6d] modulus: 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 public exponent: 10001 ] 2022-06-23 04:46:27.704  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-23 04:46:27.708 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-23 04:46:27.713 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-23 04:46:27.714 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-23 04:46:27.715  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-23 04:46:27.716  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-23 04:46:27.716  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-23 04:46:27.717 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 04:46:27.718 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-23 04:46:27.718 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-23 04:46:27.724 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-23 04:46:27.726 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 04:46:27.726 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 04:46:27.727 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 04:46:28.923  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-23 04:46:28.924  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-23 04:46:28.925 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-23 04:46:28.925 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 04:46:28.928  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-23 04:46:28.929  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-23 04:46:28.929 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:46:28.930 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:46:28.930 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:46:28.931 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:46:28.932 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:46:28.932 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:46:28.933 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:46:28.934 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:46:28.934 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:46:28.936 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-23 04:46:28.943 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31901880197755761012553140989362061623093746243 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 23 03:12:01 UTC 2022 Final Date: Tue Jun 22 03:12:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:01:f7:3c:16:e2:99:2f:24:c4:11:ca:f0:32:a6:0f:93:4c:13:1a] modulus: d43905208738ad11cc73914964ab91e41af86fd217e55a21ec1daa8a2b84eaa41d7c2cd0a2e11a10ce14b941cd8f550096d6d9b9fd40d6aeee8917124e8b76e8dbcec6385e1f0b31e4878c3d3f24df57aa0a262889c4574050d0dcef985426d785328a18bb38513ed626a62e5289f601f009de3c2519ed0212cfba51c726bf0843738d9c6162f45792d50a17897a784ab403e1796ea4d62dcf9592725ad54273d84a4ea143e9887208cea99f31c0ba90eeb426c9e87409b8d717c30bbf2764903aba4f191eb096ebca002ee101fe78a756a67a440f95483a7175f97ef51968f93a201191aa12f38d26347daef86ee4cd65e85454214733696c8beff2177912b01761b8de33b98adc4ae6c237f4e61ffeceec03702697690135739aaf07e8d3e1de7d932c6c9d0e76329ea01a6b1ab7d3dac73d249c9a73dc0e64647d3bff6c5075296294eb5de8d6952e8cc883a18d33f12a4fb9681a66f44c5e308bc9d1c861cccdcbdb0752130cd5e8ea23a4cbb835fb69f895762ba2c734407cb1b78d01bd public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb516d8e1bc222ebeece6488140dd70e16537e3 4c80d8343e1786cca1eae10bc9d3b5d81ec92132 f91311000bc01d5019cccf23d2be2cdc40da2800 8d8c7cba3153adaef7d653236f4f9275c1297acf 45b0c6b9cccb235c845dc7f57b0f4ab645ae692f ecfac995ec27a9195b6945d7c586b4c0686418ca 1529edaf2063590eb37bff972dff7ec508a111a1 0ffc4f06928f8c0f23519f552b188def956a5581 ebfa69d0c0275a7ac9496d81117b057ed221c549 7a391dac79843b852342824ae2dc34b57618dc98 25e3b4452b071a8d5922d25892a855f5ef862d76 c1b3211cf0349be8be7820cb3495abb2feea8f3f dda9fb5cac627d5ac9c4424dec9148929cad1a0a f183f1574f330b59a791184907f958709fdb2260 da8603ac6f950a92eedd0fd4a2260b1ca4e692b6 469a833374e58f856d66cec6b8567dcaf8b92a7e 3d7bec112f5293ecb5ffd7a5a60c4dceb38ef2a7 22fab385b0ea76af2e1f779a22af1c8eef9fedf1 de12ed45409a32d1100c03d3240141ad0e0e89e9 91c4427a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:b7:ab:0f:2a:6c:2b:50:4f:16:2c:55:a9:da:bf:93:e9:73:58:3b] modulus: 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 public exponent: 10001 ] 2022-06-23 04:48:32.099  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-23 04:48:32.100 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-23 04:48:32.102 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 04:48:32.103 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-23 04:48:32.103  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 04:48:32.104  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-23 04:48:32.104  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-23 04:48:32.105 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 04:48:32.105 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-23 04:48:32.105 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-23 04:48:32.111 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-23 04:48:32.112 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 04:48:32.112 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 04:48:32.112 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 04:48:32.307  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-23 04:48:32.308  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-23 04:48:32.308 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-23 04:48:32.309 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 04:48:32.310  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-23 04:48:32.312  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-23 04:48:32.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:48:32.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:48:32.313 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:48:32.314 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:48:32.314 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:48:32.314 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:48:32.315 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:48:32.315 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:48:32.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:48:32.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-23 04:48:32.324 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31901880197755761012553140989362061623093746243 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 23 03:12:01 UTC 2022 Final Date: Tue Jun 22 03:12:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:01:f7:3c:16:e2:99:2f:24:c4:11:ca:f0:32:a6:0f:93:4c:13:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb516d8e1bc222ebeece6488140dd70e16537e3 4c80d8343e1786cca1eae10bc9d3b5d81ec92132 f91311000bc01d5019cccf23d2be2cdc40da2800 8d8c7cba3153adaef7d653236f4f9275c1297acf 45b0c6b9cccb235c845dc7f57b0f4ab645ae692f ecfac995ec27a9195b6945d7c586b4c0686418ca 1529edaf2063590eb37bff972dff7ec508a111a1 0ffc4f06928f8c0f23519f552b188def956a5581 ebfa69d0c0275a7ac9496d81117b057ed221c549 7a391dac79843b852342824ae2dc34b57618dc98 25e3b4452b071a8d5922d25892a855f5ef862d76 c1b3211cf0349be8be7820cb3495abb2feea8f3f dda9fb5cac627d5ac9c4424dec9148929cad1a0a f183f1574f330b59a791184907f958709fdb2260 da8603ac6f950a92eedd0fd4a2260b1ca4e692b6 469a833374e58f856d66cec6b8567dcaf8b92a7e 3d7bec112f5293ecb5ffd7a5a60c4dceb38ef2a7 22fab385b0ea76af2e1f779a22af1c8eef9fedf1 de12ed45409a32d1100c03d3240141ad0e0e89e9 91c4427a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ab:94:13:a8:eb:3e:f5:a1:f5:b6:b1:49:74:f4:2a:c5:12:b1:cc:fb] modulus: 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 public exponent: 10001 ] 2022-06-23 04:52:14.365  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-23 04:52:14.366 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-23 04:52:14.368 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 04:52:14.368 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-23 04:52:14.369  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 04:52:14.370  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-23 04:52:14.370  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-23 04:52:14.370 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 04:52:14.371 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-23 04:52:14.371 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-23 04:52:14.376 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-23 04:52:14.377 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 04:52:14.377 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 04:52:14.378 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 04:52:14.528  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-23 04:52:14.529  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-23 04:52:14.529 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-23 04:52:14.530 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 04:52:14.531  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-23 04:52:14.532  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-23 04:52:14.532 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:52:14.532 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:52:14.533 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:52:14.533 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:52:14.533 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:52:14.534 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:52:14.534 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:52:14.535 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:52:14.535 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:52:14.536 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-23 04:52:14.539 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31901880197755761012553140989362061623093746243 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 23 03:12:01 UTC 2022 Final Date: Tue Jun 22 03:12:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:01:f7:3c:16:e2:99:2f:24:c4:11:ca:f0:32:a6:0f:93:4c:13:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb516d8e1bc222ebeece6488140dd70e16537e3 4c80d8343e1786cca1eae10bc9d3b5d81ec92132 f91311000bc01d5019cccf23d2be2cdc40da2800 8d8c7cba3153adaef7d653236f4f9275c1297acf 45b0c6b9cccb235c845dc7f57b0f4ab645ae692f ecfac995ec27a9195b6945d7c586b4c0686418ca 1529edaf2063590eb37bff972dff7ec508a111a1 0ffc4f06928f8c0f23519f552b188def956a5581 ebfa69d0c0275a7ac9496d81117b057ed221c549 7a391dac79843b852342824ae2dc34b57618dc98 25e3b4452b071a8d5922d25892a855f5ef862d76 c1b3211cf0349be8be7820cb3495abb2feea8f3f dda9fb5cac627d5ac9c4424dec9148929cad1a0a f183f1574f330b59a791184907f958709fdb2260 da8603ac6f950a92eedd0fd4a2260b1ca4e692b6 469a833374e58f856d66cec6b8567dcaf8b92a7e 3d7bec112f5293ecb5ffd7a5a60c4dceb38ef2a7 22fab385b0ea76af2e1f779a22af1c8eef9fedf1 de12ed45409a32d1100c03d3240141ad0e0e89e9 91c4427a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:b5:05:51:0d:99:27:65:45:4c:8e:a1:9b:01:a9:56:a8:27:43:ee] modulus: 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 public exponent: 10001 ] 2022-06-23 04:56:26.490  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-23 04:56:26.491 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-23 04:56:26.493 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 04:56:26.494 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-23 04:56:26.494  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 04:56:26.495  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-23 04:56:26.496  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-23 04:56:26.496 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 04:56:26.497 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-23 04:56:26.497 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-23 04:56:26.502 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-23 04:56:26.503 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 04:56:26.503 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 04:56:26.504 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 04:56:26.647  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-23 04:56:26.647  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-23 04:56:26.648 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-23 04:56:26.648 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 04:56:26.651  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-23 04:56:26.651  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-23 04:56:26.652 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:56:26.652 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:56:26.653 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:56:26.653 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:56:26.654 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:56:26.655 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:56:26.656 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:56:26.656 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:56:26.657 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:56:26.658 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-23 04:56:26.663 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31901880197755761012553140989362061623093746243 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 23 03:12:01 UTC 2022 Final Date: Tue Jun 22 03:12:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:01:f7:3c:16:e2:99:2f:24:c4:11:ca:f0:32:a6:0f:93:4c:13:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb516d8e1bc222ebeece6488140dd70e16537e3 4c80d8343e1786cca1eae10bc9d3b5d81ec92132 f91311000bc01d5019cccf23d2be2cdc40da2800 8d8c7cba3153adaef7d653236f4f9275c1297acf 45b0c6b9cccb235c845dc7f57b0f4ab645ae692f ecfac995ec27a9195b6945d7c586b4c0686418ca 1529edaf2063590eb37bff972dff7ec508a111a1 0ffc4f06928f8c0f23519f552b188def956a5581 ebfa69d0c0275a7ac9496d81117b057ed221c549 7a391dac79843b852342824ae2dc34b57618dc98 25e3b4452b071a8d5922d25892a855f5ef862d76 c1b3211cf0349be8be7820cb3495abb2feea8f3f dda9fb5cac627d5ac9c4424dec9148929cad1a0a f183f1574f330b59a791184907f958709fdb2260 da8603ac6f950a92eedd0fd4a2260b1ca4e692b6 469a833374e58f856d66cec6b8567dcaf8b92a7e 3d7bec112f5293ecb5ffd7a5a60c4dceb38ef2a7 22fab385b0ea76af2e1f779a22af1c8eef9fedf1 de12ed45409a32d1100c03d3240141ad0e0e89e9 91c4427a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [59:ba:c0:20:82:a2:d8:d6:a9:12:9d:f1:6d:9f:e0:aa:a3:2d:71:68] modulus: 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 public exponent: 10001 ] 2022-06-23 04:58:25.777  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-23 04:58:25.779 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-23 04:58:25.782 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 04:58:25.783 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-23 04:58:25.783  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 04:58:25.784  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-23 04:58:25.785  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-23 04:58:25.786 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 04:58:25.786 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-23 04:58:25.787 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-23 04:58:25.793 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-23 04:58:25.794 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 04:58:25.794 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 04:58:25.794 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 04:58:25.973  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-23 04:58:25.973  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-23 04:58:25.974 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-23 04:58:25.974 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 04:58:25.976  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-23 04:58:25.976  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-23 04:58:25.977 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:58:25.977 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:58:25.978 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:58:25.979 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:58:25.979 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:58:25.979 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:58:25.980 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 04:58:25.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 04:58:25.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 04:58:25.982 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-23 04:58:25.988 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31901880197755761012553140989362061623093746243 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 23 03:12:01 UTC 2022 Final Date: Tue Jun 22 03:12:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:01:f7:3c:16:e2:99:2f:24:c4:11:ca:f0:32:a6:0f:93:4c:13:1a] modulus: d43905208738ad11cc73914964ab91e41af86fd217e55a21ec1daa8a2b84eaa41d7c2cd0a2e11a10ce14b941cd8f550096d6d9b9fd40d6aeee8917124e8b76e8dbcec6385e1f0b31e4878c3d3f24df57aa0a262889c4574050d0dcef985426d785328a18bb38513ed626a62e5289f601f009de3c2519ed0212cfba51c726bf0843738d9c6162f45792d50a17897a784ab403e1796ea4d62dcf9592725ad54273d84a4ea143e9887208cea99f31c0ba90eeb426c9e87409b8d717c30bbf2764903aba4f191eb096ebca002ee101fe78a756a67a440f95483a7175f97ef51968f93a201191aa12f38d26347daef86ee4cd65e85454214733696c8beff2177912b01761b8de33b98adc4ae6c237f4e61ffeceec03702697690135739aaf07e8d3e1de7d932c6c9d0e76329ea01a6b1ab7d3dac73d249c9a73dc0e64647d3bff6c5075296294eb5de8d6952e8cc883a18d33f12a4fb9681a66f44c5e308bc9d1c861cccdcbdb0752130cd5e8ea23a4cbb835fb69f895762ba2c734407cb1b78d01bd public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb516d8e1bc222ebeece6488140dd70e16537e3 4c80d8343e1786cca1eae10bc9d3b5d81ec92132 f91311000bc01d5019cccf23d2be2cdc40da2800 8d8c7cba3153adaef7d653236f4f9275c1297acf 45b0c6b9cccb235c845dc7f57b0f4ab645ae692f ecfac995ec27a9195b6945d7c586b4c0686418ca 1529edaf2063590eb37bff972dff7ec508a111a1 0ffc4f06928f8c0f23519f552b188def956a5581 ebfa69d0c0275a7ac9496d81117b057ed221c549 7a391dac79843b852342824ae2dc34b57618dc98 25e3b4452b071a8d5922d25892a855f5ef862d76 c1b3211cf0349be8be7820cb3495abb2feea8f3f dda9fb5cac627d5ac9c4424dec9148929cad1a0a f183f1574f330b59a791184907f958709fdb2260 da8603ac6f950a92eedd0fd4a2260b1ca4e692b6 469a833374e58f856d66cec6b8567dcaf8b92a7e 3d7bec112f5293ecb5ffd7a5a60c4dceb38ef2a7 22fab385b0ea76af2e1f779a22af1c8eef9fedf1 de12ed45409a32d1100c03d3240141ad0e0e89e9 91c4427a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b9:f8:dc:91:1f:76:c8:28:28:5f:8c:6c:84:24:10:59:34:ff:57:00] modulus: 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 public exponent: 10001 ] 2022-06-23 05:01:02.979  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-23 05:01:02.981 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-23 05:01:02.984 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 05:01:02.985 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-23 05:01:02.985  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 05:01:02.986  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-23 05:01:02.986  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-23 05:01:02.987 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 05:01:02.988 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-23 05:01:02.988 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-23 05:01:02.996 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-23 05:01:02.996 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:01:02.997 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:01:02.997 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:01:03.191  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-23 05:01:03.192  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-23 05:01:03.193 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-23 05:01:03.193 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:01:03.195  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-23 05:01:03.196  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-23 05:01:03.196 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:01:03.197 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:01:03.197 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:01:03.198 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:01:03.198 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:01:03.199 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:01:03.200 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:01:03.200 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:01:03.201 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:01:03.202 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-23 05:01:03.208 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31901880197755761012553140989362061623093746243 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 23 03:12:01 UTC 2022 Final Date: Tue Jun 22 03:12:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:01:f7:3c:16:e2:99:2f:24:c4:11:ca:f0:32:a6:0f:93:4c:13:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb516d8e1bc222ebeece6488140dd70e16537e3 4c80d8343e1786cca1eae10bc9d3b5d81ec92132 f91311000bc01d5019cccf23d2be2cdc40da2800 8d8c7cba3153adaef7d653236f4f9275c1297acf 45b0c6b9cccb235c845dc7f57b0f4ab645ae692f ecfac995ec27a9195b6945d7c586b4c0686418ca 1529edaf2063590eb37bff972dff7ec508a111a1 0ffc4f06928f8c0f23519f552b188def956a5581 ebfa69d0c0275a7ac9496d81117b057ed221c549 7a391dac79843b852342824ae2dc34b57618dc98 25e3b4452b071a8d5922d25892a855f5ef862d76 c1b3211cf0349be8be7820cb3495abb2feea8f3f dda9fb5cac627d5ac9c4424dec9148929cad1a0a f183f1574f330b59a791184907f958709fdb2260 da8603ac6f950a92eedd0fd4a2260b1ca4e692b6 469a833374e58f856d66cec6b8567dcaf8b92a7e 3d7bec112f5293ecb5ffd7a5a60c4dceb38ef2a7 22fab385b0ea76af2e1f779a22af1c8eef9fedf1 de12ed45409a32d1100c03d3240141ad0e0e89e9 91c4427a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ab:0d:92:bd:10:ed:4c:48:d4:76:df:ff:00:0f:51:94:9b:ed:e5:d0] modulus: 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 public exponent: 10001 ] 2022-06-23 05:04:33.273  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-23 05:04:33.274 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-23 05:04:33.276 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-23 05:04:33.277 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-23 05:04:33.277  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-23 05:04:33.278  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-23 05:04:33.279  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-23 05:04:33.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 05:04:33.280 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-23 05:04:33.280 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-23 05:04:33.285 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-23 05:04:33.286 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:04:33.286 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:04:33.286 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:04:33.465  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-23 05:04:33.465  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-23 05:04:33.466 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-23 05:04:33.466 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:04:33.467  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-23 05:04:33.468  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-23 05:04:33.468 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:04:33.469 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:04:33.469 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:04:33.470 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:04:33.470 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:04:33.470 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:04:33.471 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:04:33.472 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:04:33.472 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:04:33.473 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-23 05:04:33.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31901880197755761012553140989362061623093746243 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 23 03:12:01 UTC 2022 Final Date: Tue Jun 22 03:12:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:01:f7:3c:16:e2:99:2f:24:c4:11:ca:f0:32:a6:0f:93:4c:13:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb516d8e1bc222ebeece6488140dd70e16537e3 4c80d8343e1786cca1eae10bc9d3b5d81ec92132 f91311000bc01d5019cccf23d2be2cdc40da2800 8d8c7cba3153adaef7d653236f4f9275c1297acf 45b0c6b9cccb235c845dc7f57b0f4ab645ae692f ecfac995ec27a9195b6945d7c586b4c0686418ca 1529edaf2063590eb37bff972dff7ec508a111a1 0ffc4f06928f8c0f23519f552b188def956a5581 ebfa69d0c0275a7ac9496d81117b057ed221c549 7a391dac79843b852342824ae2dc34b57618dc98 25e3b4452b071a8d5922d25892a855f5ef862d76 c1b3211cf0349be8be7820cb3495abb2feea8f3f dda9fb5cac627d5ac9c4424dec9148929cad1a0a f183f1574f330b59a791184907f958709fdb2260 da8603ac6f950a92eedd0fd4a2260b1ca4e692b6 469a833374e58f856d66cec6b8567dcaf8b92a7e 3d7bec112f5293ecb5ffd7a5a60c4dceb38ef2a7 22fab385b0ea76af2e1f779a22af1c8eef9fedf1 de12ed45409a32d1100c03d3240141ad0e0e89e9 91c4427a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [47:17:61:a9:b4:0f:b4:bd:87:17:c4:49:34:d2:e7:fd:09:5d:9e:98] modulus: 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 public exponent: 10001 ] 2022-06-23 05:05:18.768  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-23 05:05:18.769 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-23 05:05:18.771 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 05:05:18.772 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-23 05:05:18.773  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 05:05:18.774  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-23 05:05:18.775  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-23 05:05:18.775 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 05:05:18.776 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-23 05:05:18.776 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-23 05:05:18.781 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-23 05:05:18.781 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:05:18.782 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:05:18.782 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:05:18.898  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-23 05:05:18.899  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-23 05:05:18.899 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-23 05:05:18.899 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:05:18.901  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-23 05:05:18.901  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-23 05:05:18.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:05:18.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:05:18.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:05:18.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:05:18.903 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:05:18.903 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:05:18.903 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:05:18.904 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:05:18.904 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:05:18.905 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-23 05:05:18.908 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31901880197755761012553140989362061623093746243 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 23 03:12:01 UTC 2022 Final Date: Tue Jun 22 03:12:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:01:f7:3c:16:e2:99:2f:24:c4:11:ca:f0:32:a6:0f:93:4c:13:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb516d8e1bc222ebeece6488140dd70e16537e3 4c80d8343e1786cca1eae10bc9d3b5d81ec92132 f91311000bc01d5019cccf23d2be2cdc40da2800 8d8c7cba3153adaef7d653236f4f9275c1297acf 45b0c6b9cccb235c845dc7f57b0f4ab645ae692f ecfac995ec27a9195b6945d7c586b4c0686418ca 1529edaf2063590eb37bff972dff7ec508a111a1 0ffc4f06928f8c0f23519f552b188def956a5581 ebfa69d0c0275a7ac9496d81117b057ed221c549 7a391dac79843b852342824ae2dc34b57618dc98 25e3b4452b071a8d5922d25892a855f5ef862d76 c1b3211cf0349be8be7820cb3495abb2feea8f3f dda9fb5cac627d5ac9c4424dec9148929cad1a0a f183f1574f330b59a791184907f958709fdb2260 da8603ac6f950a92eedd0fd4a2260b1ca4e692b6 469a833374e58f856d66cec6b8567dcaf8b92a7e 3d7bec112f5293ecb5ffd7a5a60c4dceb38ef2a7 22fab385b0ea76af2e1f779a22af1c8eef9fedf1 de12ed45409a32d1100c03d3240141ad0e0e89e9 91c4427a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c7:8b:9e:ad:61:1b:7c:a5:f5:31:70:f7:89:ce:b5:f8:99:ea:80:b6] modulus: e314aeb6f3b2c38bf37e37384faa8344f545449e84abd2a74f9fb770875aac794a015b1afe4e157affefd75700898a8299bdc8a2ff5aa954d77fd410d14c0d88734a5f28c1a22220ed9df20411006938e633ac9422504f771e255f5493dab0ef2665a1824eb3fb96056242808beed078c529fc2d8595354ec57b9dcde3fdabaef437c9274823dd96a01e1231321bd373c21281712a87545058154d097af5410083e3709ac47beff8e014ffdc5c5960237c652dfd85e52fe293671e390b0c68bc557e7594f8bf85916d147e88737f0fd05ca0713bc54a5d9f53994d1ccfd5a5fa60196986656f6666eae4b17499ae2daa46e74cfeef91a464d8745fc2c26a2d0d public exponent: 10001 ] 2022-06-23 05:09:23.863  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-23 05:09:23.864 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-23 05:09:23.865 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 05:09:23.866 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-23 05:09:23.866  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 05:09:23.867  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-23 05:09:23.867  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-23 05:09:23.868 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 05:09:23.868 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-23 05:09:23.868 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-23 05:09:23.873 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-23 05:09:23.873 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:09:23.874 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:09:23.874 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:09:24.033  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-23 05:09:24.033  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-23 05:09:24.034 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-23 05:09:24.034 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:09:24.035  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-23 05:09:24.035  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-23 05:09:24.036 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:09:24.036 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:09:24.036 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:09:24.037 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:09:24.037 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:09:24.038 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:09:24.038 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:09:24.039 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:09:24.039 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:09:24.040 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-23 05:09:24.043 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31901880197755761012553140989362061623093746243 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 23 03:12:01 UTC 2022 Final Date: Tue Jun 22 03:12:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:01:f7:3c:16:e2:99:2f:24:c4:11:ca:f0:32:a6:0f:93:4c:13:1a] modulus: d43905208738ad11cc73914964ab91e41af86fd217e55a21ec1daa8a2b84eaa41d7c2cd0a2e11a10ce14b941cd8f550096d6d9b9fd40d6aeee8917124e8b76e8dbcec6385e1f0b31e4878c3d3f24df57aa0a262889c4574050d0dcef985426d785328a18bb38513ed626a62e5289f601f009de3c2519ed0212cfba51c726bf0843738d9c6162f45792d50a17897a784ab403e1796ea4d62dcf9592725ad54273d84a4ea143e9887208cea99f31c0ba90eeb426c9e87409b8d717c30bbf2764903aba4f191eb096ebca002ee101fe78a756a67a440f95483a7175f97ef51968f93a201191aa12f38d26347daef86ee4cd65e85454214733696c8beff2177912b01761b8de33b98adc4ae6c237f4e61ffeceec03702697690135739aaf07e8d3e1de7d932c6c9d0e76329ea01a6b1ab7d3dac73d249c9a73dc0e64647d3bff6c5075296294eb5de8d6952e8cc883a18d33f12a4fb9681a66f44c5e308bc9d1c861cccdcbdb0752130cd5e8ea23a4cbb835fb69f895762ba2c734407cb1b78d01bd public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb516d8e1bc222ebeece6488140dd70e16537e3 4c80d8343e1786cca1eae10bc9d3b5d81ec92132 f91311000bc01d5019cccf23d2be2cdc40da2800 8d8c7cba3153adaef7d653236f4f9275c1297acf 45b0c6b9cccb235c845dc7f57b0f4ab645ae692f ecfac995ec27a9195b6945d7c586b4c0686418ca 1529edaf2063590eb37bff972dff7ec508a111a1 0ffc4f06928f8c0f23519f552b188def956a5581 ebfa69d0c0275a7ac9496d81117b057ed221c549 7a391dac79843b852342824ae2dc34b57618dc98 25e3b4452b071a8d5922d25892a855f5ef862d76 c1b3211cf0349be8be7820cb3495abb2feea8f3f dda9fb5cac627d5ac9c4424dec9148929cad1a0a f183f1574f330b59a791184907f958709fdb2260 da8603ac6f950a92eedd0fd4a2260b1ca4e692b6 469a833374e58f856d66cec6b8567dcaf8b92a7e 3d7bec112f5293ecb5ffd7a5a60c4dceb38ef2a7 22fab385b0ea76af2e1f779a22af1c8eef9fedf1 de12ed45409a32d1100c03d3240141ad0e0e89e9 91c4427a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [72:ab:9c:32:1c:6d:a0:d4:62:33:83:43:c8:f8:11:d1:08:c9:f3:d4] modulus: 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 public exponent: 10001 ] 2022-06-23 05:11:39.541  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-23 05:11:39.544 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-23 05:11:39.546 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-23 05:11:39.547 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-23 05:11:39.548  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-23 05:11:39.549  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-23 05:11:39.549  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-23 05:11:39.550 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 05:11:39.550 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-23 05:11:39.551 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-23 05:11:39.556 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-23 05:11:39.557 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:11:39.557 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:11:39.557 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:11:39.737  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-23 05:11:39.737  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-23 05:11:39.738 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-23 05:11:39.738 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:11:39.739  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-23 05:11:39.740  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-23 05:11:39.740 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:11:39.740 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:11:39.741 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:11:39.741 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:11:39.742 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:11:39.742 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:11:39.743 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:11:39.743 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:11:39.743 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:11:39.744 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-23 05:11:39.748 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31901880197755761012553140989362061623093746243 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 23 03:12:01 UTC 2022 Final Date: Tue Jun 22 03:12:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:01:f7:3c:16:e2:99:2f:24:c4:11:ca:f0:32:a6:0f:93:4c:13:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb516d8e1bc222ebeece6488140dd70e16537e3 4c80d8343e1786cca1eae10bc9d3b5d81ec92132 f91311000bc01d5019cccf23d2be2cdc40da2800 8d8c7cba3153adaef7d653236f4f9275c1297acf 45b0c6b9cccb235c845dc7f57b0f4ab645ae692f ecfac995ec27a9195b6945d7c586b4c0686418ca 1529edaf2063590eb37bff972dff7ec508a111a1 0ffc4f06928f8c0f23519f552b188def956a5581 ebfa69d0c0275a7ac9496d81117b057ed221c549 7a391dac79843b852342824ae2dc34b57618dc98 25e3b4452b071a8d5922d25892a855f5ef862d76 c1b3211cf0349be8be7820cb3495abb2feea8f3f dda9fb5cac627d5ac9c4424dec9148929cad1a0a f183f1574f330b59a791184907f958709fdb2260 da8603ac6f950a92eedd0fd4a2260b1ca4e692b6 469a833374e58f856d66cec6b8567dcaf8b92a7e 3d7bec112f5293ecb5ffd7a5a60c4dceb38ef2a7 22fab385b0ea76af2e1f779a22af1c8eef9fedf1 de12ed45409a32d1100c03d3240141ad0e0e89e9 91c4427a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:4f:c3:b0:4e:5a:f1:00:87:e1:33:42:dd:4b:da:d3:53:c4:49:45] modulus: a143093b7efebe979a17bc4e1c70ff9ebffbd1078fcf8e62f9d9ea18cb3dfe9c02843166d95c8eeee0297be8a60ac793334eeea61c1c756d95b83097c14bf43b6d491b96c7e96b89e58c412b4ed83c2d3026501985eeb3d2aed5a082716fa648e9cef3c926a966ec8b553cbd5fbf2537b05f651a18a5a8cae781d668bcb8af3151053e77dc4608219096765dbec9ea7b2ae50770327224dff469d94332bfdea13c19e38c0522452bae029c166a6cd8eb82f68c939586c95b6bf64388b499976693a4a6f7c5fc3a3422873845ac53e35862ee7947a12e4e794a14039b0b120e14fb2c690523eef581062a3ba3c393cb8dcd7978dde0f208f39d301bc60ca427bb public exponent: 10001 ] 2022-06-23 05:11:58.065  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-23 05:11:58.066 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-23 05:11:58.067 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-23 05:11:58.068 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-23 05:11:58.069  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-23 05:11:58.069  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-23 05:11:58.069  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-23 05:11:58.070 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 05:11:58.070 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-23 05:11:58.071 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-23 05:11:58.076 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-23 05:11:58.076 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:11:58.077 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:11:58.077 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:11:58.243  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-23 05:11:58.244  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-23 05:11:58.244 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-23 05:11:58.244 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:11:58.245  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-23 05:11:58.245  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-23 05:11:58.246 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:11:58.246 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:11:58.246 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:11:58.247 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:11:58.247 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:11:58.247 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:11:58.248 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:11:58.248 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:11:58.248 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:11:58.249 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-23 05:11:58.253 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31901880197755761012553140989362061623093746243 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 23 03:12:01 UTC 2022 Final Date: Tue Jun 22 03:12:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:01:f7:3c:16:e2:99:2f:24:c4:11:ca:f0:32:a6:0f:93:4c:13:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb516d8e1bc222ebeece6488140dd70e16537e3 4c80d8343e1786cca1eae10bc9d3b5d81ec92132 f91311000bc01d5019cccf23d2be2cdc40da2800 8d8c7cba3153adaef7d653236f4f9275c1297acf 45b0c6b9cccb235c845dc7f57b0f4ab645ae692f ecfac995ec27a9195b6945d7c586b4c0686418ca 1529edaf2063590eb37bff972dff7ec508a111a1 0ffc4f06928f8c0f23519f552b188def956a5581 ebfa69d0c0275a7ac9496d81117b057ed221c549 7a391dac79843b852342824ae2dc34b57618dc98 25e3b4452b071a8d5922d25892a855f5ef862d76 c1b3211cf0349be8be7820cb3495abb2feea8f3f dda9fb5cac627d5ac9c4424dec9148929cad1a0a f183f1574f330b59a791184907f958709fdb2260 da8603ac6f950a92eedd0fd4a2260b1ca4e692b6 469a833374e58f856d66cec6b8567dcaf8b92a7e 3d7bec112f5293ecb5ffd7a5a60c4dceb38ef2a7 22fab385b0ea76af2e1f779a22af1c8eef9fedf1 de12ed45409a32d1100c03d3240141ad0e0e89e9 91c4427a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [45:a0:ab:e5:2c:e9:ae:97:f3:f9:e7:94:31:32:ee:e6:f5:43:0d:4e] modulus: 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 public exponent: 10001 ] 2022-06-23 05:13:53.742  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-23 05:13:53.743 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-23 05:13:53.745 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 05:13:53.746 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-23 05:13:53.746  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 05:13:53.747  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-23 05:13:53.747  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-23 05:13:53.747 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 05:13:53.748 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-23 05:13:53.748 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-23 05:13:53.752 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-23 05:13:53.753 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:13:53.753 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:13:53.753 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:13:53.969  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-23 05:13:53.969  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-23 05:13:53.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-23 05:13:53.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:13:53.971  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-23 05:13:53.972  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-23 05:13:53.972 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:13:53.972 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:13:53.972 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:13:53.973 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:13:53.973 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:13:53.973 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:13:53.974 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:13:53.974 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:13:53.975 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:13:53.975 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-23 05:13:53.979 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31901880197755761012553140989362061623093746243 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 23 03:12:01 UTC 2022 Final Date: Tue Jun 22 03:12:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:01:f7:3c:16:e2:99:2f:24:c4:11:ca:f0:32:a6:0f:93:4c:13:1a] modulus: d43905208738ad11cc73914964ab91e41af86fd217e55a21ec1daa8a2b84eaa41d7c2cd0a2e11a10ce14b941cd8f550096d6d9b9fd40d6aeee8917124e8b76e8dbcec6385e1f0b31e4878c3d3f24df57aa0a262889c4574050d0dcef985426d785328a18bb38513ed626a62e5289f601f009de3c2519ed0212cfba51c726bf0843738d9c6162f45792d50a17897a784ab403e1796ea4d62dcf9592725ad54273d84a4ea143e9887208cea99f31c0ba90eeb426c9e87409b8d717c30bbf2764903aba4f191eb096ebca002ee101fe78a756a67a440f95483a7175f97ef51968f93a201191aa12f38d26347daef86ee4cd65e85454214733696c8beff2177912b01761b8de33b98adc4ae6c237f4e61ffeceec03702697690135739aaf07e8d3e1de7d932c6c9d0e76329ea01a6b1ab7d3dac73d249c9a73dc0e64647d3bff6c5075296294eb5de8d6952e8cc883a18d33f12a4fb9681a66f44c5e308bc9d1c861cccdcbdb0752130cd5e8ea23a4cbb835fb69f895762ba2c734407cb1b78d01bd public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb516d8e1bc222ebeece6488140dd70e16537e3 4c80d8343e1786cca1eae10bc9d3b5d81ec92132 f91311000bc01d5019cccf23d2be2cdc40da2800 8d8c7cba3153adaef7d653236f4f9275c1297acf 45b0c6b9cccb235c845dc7f57b0f4ab645ae692f ecfac995ec27a9195b6945d7c586b4c0686418ca 1529edaf2063590eb37bff972dff7ec508a111a1 0ffc4f06928f8c0f23519f552b188def956a5581 ebfa69d0c0275a7ac9496d81117b057ed221c549 7a391dac79843b852342824ae2dc34b57618dc98 25e3b4452b071a8d5922d25892a855f5ef862d76 c1b3211cf0349be8be7820cb3495abb2feea8f3f dda9fb5cac627d5ac9c4424dec9148929cad1a0a f183f1574f330b59a791184907f958709fdb2260 da8603ac6f950a92eedd0fd4a2260b1ca4e692b6 469a833374e58f856d66cec6b8567dcaf8b92a7e 3d7bec112f5293ecb5ffd7a5a60c4dceb38ef2a7 22fab385b0ea76af2e1f779a22af1c8eef9fedf1 de12ed45409a32d1100c03d3240141ad0e0e89e9 91c4427a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5f:28:aa:01:89:fc:f0:2b:2e:83:c6:fa:a4:e1:6a:ab:a6:bc:d0:4f] modulus: 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 public exponent: 10001 ] 2022-06-23 05:18:42.606  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-23 05:18:42.609 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-23 05:18:42.610 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 05:18:42.612 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-23 05:18:42.612  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 05:18:42.613  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-23 05:18:42.613  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-23 05:18:42.614 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 05:18:42.615 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-23 05:18:42.615 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-23 05:18:42.622 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-23 05:18:42.623 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:18:42.623 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:18:42.623 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:18:42.904  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-23 05:18:42.904  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-23 05:18:42.905 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-23 05:18:42.905 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:18:42.906  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-23 05:18:42.906  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-23 05:18:42.906 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:18:42.907 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:18:42.907 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:18:42.907 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:18:42.907 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:18:42.908 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:18:42.908 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:18:42.908 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:18:42.909 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:18:42.909 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-23 05:18:42.916 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31901880197755761012553140989362061623093746243 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 23 03:12:01 UTC 2022 Final Date: Tue Jun 22 03:12:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:01:f7:3c:16:e2:99:2f:24:c4:11:ca:f0:32:a6:0f:93:4c:13:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb516d8e1bc222ebeece6488140dd70e16537e3 4c80d8343e1786cca1eae10bc9d3b5d81ec92132 f91311000bc01d5019cccf23d2be2cdc40da2800 8d8c7cba3153adaef7d653236f4f9275c1297acf 45b0c6b9cccb235c845dc7f57b0f4ab645ae692f ecfac995ec27a9195b6945d7c586b4c0686418ca 1529edaf2063590eb37bff972dff7ec508a111a1 0ffc4f06928f8c0f23519f552b188def956a5581 ebfa69d0c0275a7ac9496d81117b057ed221c549 7a391dac79843b852342824ae2dc34b57618dc98 25e3b4452b071a8d5922d25892a855f5ef862d76 c1b3211cf0349be8be7820cb3495abb2feea8f3f dda9fb5cac627d5ac9c4424dec9148929cad1a0a f183f1574f330b59a791184907f958709fdb2260 da8603ac6f950a92eedd0fd4a2260b1ca4e692b6 469a833374e58f856d66cec6b8567dcaf8b92a7e 3d7bec112f5293ecb5ffd7a5a60c4dceb38ef2a7 22fab385b0ea76af2e1f779a22af1c8eef9fedf1 de12ed45409a32d1100c03d3240141ad0e0e89e9 91c4427a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:5c:3b:30:19:38:a7:e0:6d:b4:5f:40:4a:d9:90:92:77:20:b2:98] modulus: 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 public exponent: 10001 ] 2022-06-23 05:23:11.656  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-23 05:23:11.657 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-23 05:23:11.659 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 05:23:11.660 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-23 05:23:11.661  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 05:23:11.662  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-23 05:23:11.662  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-23 05:23:11.663 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 05:23:11.663 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-23 05:23:11.663 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-23 05:23:11.669 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-23 05:23:11.670 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:23:11.671 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:23:11.671 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:23:11.847  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-23 05:23:11.848  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-23 05:23:11.848 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-23 05:23:11.848 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:23:11.849  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-23 05:23:11.850  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-23 05:23:11.850 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:23:11.850 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:23:11.851 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:23:11.851 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:23:11.851 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:23:11.852 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:23:11.852 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:23:11.853 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:23:11.853 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:23:11.854 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-23 05:23:11.856 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31901880197755761012553140989362061623093746243 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 23 03:12:01 UTC 2022 Final Date: Tue Jun 22 03:12:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:01:f7:3c:16:e2:99:2f:24:c4:11:ca:f0:32:a6:0f:93:4c:13:1a] modulus: d43905208738ad11cc73914964ab91e41af86fd217e55a21ec1daa8a2b84eaa41d7c2cd0a2e11a10ce14b941cd8f550096d6d9b9fd40d6aeee8917124e8b76e8dbcec6385e1f0b31e4878c3d3f24df57aa0a262889c4574050d0dcef985426d785328a18bb38513ed626a62e5289f601f009de3c2519ed0212cfba51c726bf0843738d9c6162f45792d50a17897a784ab403e1796ea4d62dcf9592725ad54273d84a4ea143e9887208cea99f31c0ba90eeb426c9e87409b8d717c30bbf2764903aba4f191eb096ebca002ee101fe78a756a67a440f95483a7175f97ef51968f93a201191aa12f38d26347daef86ee4cd65e85454214733696c8beff2177912b01761b8de33b98adc4ae6c237f4e61ffeceec03702697690135739aaf07e8d3e1de7d932c6c9d0e76329ea01a6b1ab7d3dac73d249c9a73dc0e64647d3bff6c5075296294eb5de8d6952e8cc883a18d33f12a4fb9681a66f44c5e308bc9d1c861cccdcbdb0752130cd5e8ea23a4cbb835fb69f895762ba2c734407cb1b78d01bd public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb516d8e1bc222ebeece6488140dd70e16537e3 4c80d8343e1786cca1eae10bc9d3b5d81ec92132 f91311000bc01d5019cccf23d2be2cdc40da2800 8d8c7cba3153adaef7d653236f4f9275c1297acf 45b0c6b9cccb235c845dc7f57b0f4ab645ae692f ecfac995ec27a9195b6945d7c586b4c0686418ca 1529edaf2063590eb37bff972dff7ec508a111a1 0ffc4f06928f8c0f23519f552b188def956a5581 ebfa69d0c0275a7ac9496d81117b057ed221c549 7a391dac79843b852342824ae2dc34b57618dc98 25e3b4452b071a8d5922d25892a855f5ef862d76 c1b3211cf0349be8be7820cb3495abb2feea8f3f dda9fb5cac627d5ac9c4424dec9148929cad1a0a f183f1574f330b59a791184907f958709fdb2260 da8603ac6f950a92eedd0fd4a2260b1ca4e692b6 469a833374e58f856d66cec6b8567dcaf8b92a7e 3d7bec112f5293ecb5ffd7a5a60c4dceb38ef2a7 22fab385b0ea76af2e1f779a22af1c8eef9fedf1 de12ed45409a32d1100c03d3240141ad0e0e89e9 91c4427a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [41:9c:ce:a8:30:00:74:d6:70:8b:b1:a5:bf:fc:7b:42:69:55:e9:ac] modulus: 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 public exponent: 10001 ] 2022-06-23 05:29:20.354  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-23 05:29:20.356 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-23 05:29:20.358 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 05:29:20.360 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-23 05:29:20.361  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-23 05:29:20.362  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-23 05:29:20.362  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-23 05:29:20.363 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-23 05:29:20.363 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-23 05:29:20.364 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-23 05:29:20.369 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-23 05:29:20.370 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:29:20.370 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-23 05:29:20.371 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:29:20.515  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-23 05:29:20.516  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-23 05:29:20.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-23 05:29:20.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-23 05:29:20.518  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-23 05:29:20.518  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-23 05:29:20.519 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:29:20.519 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:29:20.519 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:29:20.520 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:29:20.520 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:29:20.520 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:29:20.521 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-23 05:29:20.521 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-23 05:29:20.522 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-23 05:29:20.522 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-23 05:29:20.526 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31901880197755761012553140989362061623093746243 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 23 03:12:01 UTC 2022 Final Date: Tue Jun 22 03:12:00 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:01:f7:3c:16:e2:99:2f:24:c4:11:ca:f0:32:a6:0f:93:4c:13:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb516d8e1bc222ebeece6488140dd70e16537e3 4c80d8343e1786cca1eae10bc9d3b5d81ec92132 f91311000bc01d5019cccf23d2be2cdc40da2800 8d8c7cba3153adaef7d653236f4f9275c1297acf 45b0c6b9cccb235c845dc7f57b0f4ab645ae692f ecfac995ec27a9195b6945d7c586b4c0686418ca 1529edaf2063590eb37bff972dff7ec508a111a1 0ffc4f06928f8c0f23519f552b188def956a5581 ebfa69d0c0275a7ac9496d81117b057ed221c549 7a391dac79843b852342824ae2dc34b57618dc98 25e3b4452b071a8d5922d25892a855f5ef862d76 c1b3211cf0349be8be7820cb3495abb2feea8f3f dda9fb5cac627d5ac9c4424dec9148929cad1a0a f183f1574f330b59a791184907f958709fdb2260 da8603ac6f950a92eedd0fd4a2260b1ca4e692b6 469a833374e58f856d66cec6b8567dcaf8b92a7e 3d7bec112f5293ecb5ffd7a5a60c4dceb38ef2a7 22fab385b0ea76af2e1f779a22af1c8eef9fedf1 de12ed45409a32d1100c03d3240141ad0e0e89e9 91c4427a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [43:22:a8:35:3e:73:10:3d:81:49:21:b4:f3:15:93:ee:69:22:ea:05] modulus: c1db038f945db9cda9cf1c4e9965799bda3a65a0b505ebace24a4895dc506b73148d83ef16801b7963381d2cf1a8e1efac89ab3b5a7e9e15318d6dc6d581aac7815bc7beafdd9fe08353ba1f4b02299940bf29c59fd5f26ea6ff4940da3dc026a532e49aa49ca7ec85563b1e908e468d621111c6487327cac4b22322428363bcf9127abf264b6f243836b56f5a988eaae04563097b545a25f1df26e9c8108decb9c041b8b8147ed22c6e9fcd3c4cd5f81bb2bc7ee750b13d118e7057ce26b50bff33adb1bdf69f21171f947fe2d873f2ce6659753eaaaf51c15b6120bb48c2fdc6e340c855bb81dd766288fbace3b8ac86f6512e584b1fe8ef1f6d5855818615 public exponent: 10001 ]