2022-07-16 03:14:58,894 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-07-16 03:15:00,727 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-07-16 03:15:01.716  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jul 16, 2022 3:15:04 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jul 16, 2022 3:15:04 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jul 16, 2022 3:15:04 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jul 16, 2022 3:15:04 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-07-16 03:15:05.031 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-07-16 03:15:05.429  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-07-16 03:15:05.661  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-07-16 03:15:06.584 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-07-16 03:15:06.587 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-07-16 03:15:06.589 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-07-16 03:15:06.595 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-07-16 03:15:06.645 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-07-16 03:15:06.649 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-07-16 03:15:06.789 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-07-16 03:15:07.659 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jul 16, 2022 3:15:08 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-07-16 03:15:08.891  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 11.113 seconds (JVM running for 13.449) Jul 16, 2022 3:15:26 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-07-16 03:15:44.819  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-16 03:15:44.828 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-16 03:15:44.866 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-16 03:15:44.872 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-16 03:15:44.893  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-16 03:15:44.896  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-16 03:15:44.897  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-16 03:15:44.899 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 03:15:44.900 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 03:15:44.904 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 03:15:44.912 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-16 03:15:44.916 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-16 03:15:44.954 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-16 03:15:44.960 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 03:15:44.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 03:15:44.966 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 03:15:45.831  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-16 03:15:45.835  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-16 03:15:45.836 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-16 03:15:45.838 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 03:15:45.849  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-16 03:15:45.850  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-16 03:15:45.852 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 03:15:45.852 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 03:15:45.853 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 03:15:45.869 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 03:15:45.870 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 03:15:45.870 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 03:15:45.883 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 03:15:45.884 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 03:15:45.884 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 03:15:45.887 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-16 03:15:45.940 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196873537050637438723760275529492411438063743168 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 16 03:11:19 UTC 2022 Final Date: Thu Jul 15 03:11:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:f1:35:e1:ad:c2:08:11:dd:f5:3d:df:54:77:30:73:04:4d:1d:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 90eb9f76a837e5ff67811f8032b90e97b0d01318 e3aacf94a89340cb9558fd73283deeff24c9b707 6d52fb9da5f70c4d12e0a9a01656dc2aeb4aed7b 900cff8a58d54fd42075e5a29ac9673c6c32a12f 8f08c80d2d39b72ec7552d3df4f094315a2a61f2 6e68ff4248b4e9172d06df3b68f6bc781a9b1a65 2bd868f4b4ee615dbb8eb65812ee7de51cfd8483 acec111046213c7fd14b9be6720a86e40e0e2992 2907b7b2d6e78a182e6670fa5f3dfb3a24673925 eeb774e9c4721a6d796bc7335e11486d01d4dc97 a42b697569f49c5dddb6e3d4cb27260fb84b86c1 84c9ee75be41cb2d374e26cfd1c3c710b7c0f269 a2d8f699f824447ffe761d7d569ade2e40a878cf cdb55490f565203999a2587a76497a7115a1cf58 dc86fabc74400b004873064c7577ed3a6bd64691 8c1838c88ca76ad36ece5be71d35bd4b73e89b88 67ad44d146d2af8188df7e5c2e0a31824ad2baee 74c7e9843948fd5103018bb29660dc1bc12d7e3e 7ec5f33effa84c37122546a9d07b2c9f94a5ef94 fb0d2f75 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [db:64:79:85:12:45:cd:4b:0d:11:4c:a8:e7:dd:bb:91:ca:87:c9:dd] modulus: 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 public exponent: 10001 ] 2022-07-16 04:40:01.075  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-16 04:40:01.079 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-16 04:40:01.083 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 04:40:01.084 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-16 04:40:01.084  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 04:40:01.086  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-16 04:40:01.087  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-16 04:40:01.087 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 04:40:01.088 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-16 04:40:01.088 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-16 04:40:01.095 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-16 04:40:01.096 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 04:40:01.097 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 04:40:01.097 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 04:40:01.461  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-16 04:40:01.462  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-16 04:40:01.462 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-16 04:40:01.463 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 04:40:01.466  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-16 04:40:01.466  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-16 04:40:01.467 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:40:01.468 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:40:01.468 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:40:01.469 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:40:01.469 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:40:01.470 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:40:01.471 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:40:01.471 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:40:01.471 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:40:01.473 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-16 04:40:01.479 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196873537050637438723760275529492411438063743168 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 16 03:11:19 UTC 2022 Final Date: Thu Jul 15 03:11:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:f1:35:e1:ad:c2:08:11:dd:f5:3d:df:54:77:30:73:04:4d:1d:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 90eb9f76a837e5ff67811f8032b90e97b0d01318 e3aacf94a89340cb9558fd73283deeff24c9b707 6d52fb9da5f70c4d12e0a9a01656dc2aeb4aed7b 900cff8a58d54fd42075e5a29ac9673c6c32a12f 8f08c80d2d39b72ec7552d3df4f094315a2a61f2 6e68ff4248b4e9172d06df3b68f6bc781a9b1a65 2bd868f4b4ee615dbb8eb65812ee7de51cfd8483 acec111046213c7fd14b9be6720a86e40e0e2992 2907b7b2d6e78a182e6670fa5f3dfb3a24673925 eeb774e9c4721a6d796bc7335e11486d01d4dc97 a42b697569f49c5dddb6e3d4cb27260fb84b86c1 84c9ee75be41cb2d374e26cfd1c3c710b7c0f269 a2d8f699f824447ffe761d7d569ade2e40a878cf cdb55490f565203999a2587a76497a7115a1cf58 dc86fabc74400b004873064c7577ed3a6bd64691 8c1838c88ca76ad36ece5be71d35bd4b73e89b88 67ad44d146d2af8188df7e5c2e0a31824ad2baee 74c7e9843948fd5103018bb29660dc1bc12d7e3e 7ec5f33effa84c37122546a9d07b2c9f94a5ef94 fb0d2f75 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:ee:f6:ab:92:6a:29:e6:57:54:72:1e:5c:9b:42:a0:75:4a:c4:64] modulus: 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 public exponent: 10001 ] 2022-07-16 04:43:04.782  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-16 04:43:04.785 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-16 04:43:04.788 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 04:43:04.790 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-16 04:43:04.790  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 04:43:04.791  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-16 04:43:04.792  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-16 04:43:04.792 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 04:43:04.793 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-16 04:43:04.794 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-16 04:43:04.805 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-16 04:43:04.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 04:43:04.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 04:43:04.808 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 04:43:05.101  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-16 04:43:05.102  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-16 04:43:05.102 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-16 04:43:05.103 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 04:43:05.106  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-16 04:43:05.107  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-16 04:43:05.107 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:43:05.108 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:43:05.108 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:43:05.110 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:43:05.110 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:43:05.111 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:43:05.112 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:43:05.112 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:43:05.113 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:43:05.114 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-16 04:43:05.119 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196873537050637438723760275529492411438063743168 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 16 03:11:19 UTC 2022 Final Date: Thu Jul 15 03:11:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:f1:35:e1:ad:c2:08:11:dd:f5:3d:df:54:77:30:73:04:4d:1d:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 90eb9f76a837e5ff67811f8032b90e97b0d01318 e3aacf94a89340cb9558fd73283deeff24c9b707 6d52fb9da5f70c4d12e0a9a01656dc2aeb4aed7b 900cff8a58d54fd42075e5a29ac9673c6c32a12f 8f08c80d2d39b72ec7552d3df4f094315a2a61f2 6e68ff4248b4e9172d06df3b68f6bc781a9b1a65 2bd868f4b4ee615dbb8eb65812ee7de51cfd8483 acec111046213c7fd14b9be6720a86e40e0e2992 2907b7b2d6e78a182e6670fa5f3dfb3a24673925 eeb774e9c4721a6d796bc7335e11486d01d4dc97 a42b697569f49c5dddb6e3d4cb27260fb84b86c1 84c9ee75be41cb2d374e26cfd1c3c710b7c0f269 a2d8f699f824447ffe761d7d569ade2e40a878cf cdb55490f565203999a2587a76497a7115a1cf58 dc86fabc74400b004873064c7577ed3a6bd64691 8c1838c88ca76ad36ece5be71d35bd4b73e89b88 67ad44d146d2af8188df7e5c2e0a31824ad2baee 74c7e9843948fd5103018bb29660dc1bc12d7e3e 7ec5f33effa84c37122546a9d07b2c9f94a5ef94 fb0d2f75 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5f:af:3a:c7:20:8a:c4:13:41:89:84:ac:f5:c2:52:bb:50:54:d8:6d] modulus: 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 public exponent: 10001 ] 2022-07-16 04:44:24.091  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-16 04:44:24.093 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-16 04:44:24.095 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-16 04:44:24.096 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-16 04:44:24.097  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-16 04:44:24.098  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-16 04:44:24.098  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-16 04:44:24.099 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 04:44:24.099 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-16 04:44:24.099 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-16 04:44:24.105 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-16 04:44:24.105 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 04:44:24.106 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 04:44:24.106 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 04:44:24.426  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-16 04:44:24.427  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-16 04:44:24.427 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-16 04:44:24.427 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 04:44:24.430  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-16 04:44:24.431  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-16 04:44:24.432 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:44:24.432 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:44:24.432 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:44:24.433 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:44:24.433 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:44:24.434 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:44:24.435 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:44:24.435 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:44:24.435 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:44:24.436 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-16 04:44:24.441 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196873537050637438723760275529492411438063743168 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 16 03:11:19 UTC 2022 Final Date: Thu Jul 15 03:11:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:f1:35:e1:ad:c2:08:11:dd:f5:3d:df:54:77:30:73:04:4d:1d:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 90eb9f76a837e5ff67811f8032b90e97b0d01318 e3aacf94a89340cb9558fd73283deeff24c9b707 6d52fb9da5f70c4d12e0a9a01656dc2aeb4aed7b 900cff8a58d54fd42075e5a29ac9673c6c32a12f 8f08c80d2d39b72ec7552d3df4f094315a2a61f2 6e68ff4248b4e9172d06df3b68f6bc781a9b1a65 2bd868f4b4ee615dbb8eb65812ee7de51cfd8483 acec111046213c7fd14b9be6720a86e40e0e2992 2907b7b2d6e78a182e6670fa5f3dfb3a24673925 eeb774e9c4721a6d796bc7335e11486d01d4dc97 a42b697569f49c5dddb6e3d4cb27260fb84b86c1 84c9ee75be41cb2d374e26cfd1c3c710b7c0f269 a2d8f699f824447ffe761d7d569ade2e40a878cf cdb55490f565203999a2587a76497a7115a1cf58 dc86fabc74400b004873064c7577ed3a6bd64691 8c1838c88ca76ad36ece5be71d35bd4b73e89b88 67ad44d146d2af8188df7e5c2e0a31824ad2baee 74c7e9843948fd5103018bb29660dc1bc12d7e3e 7ec5f33effa84c37122546a9d07b2c9f94a5ef94 fb0d2f75 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:99:14:a2:35:20:7f:b2:1e:f5:75:af:b3:5f:5b:2a:41:3f:79:fa] modulus: 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 public exponent: 10001 ] 2022-07-16 04:46:31.546  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-16 04:46:31.549 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-16 04:46:31.553 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-16 04:46:31.557 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-16 04:46:31.557  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-16 04:46:31.558  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-16 04:46:31.559  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-16 04:46:31.560 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 04:46:31.561 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-16 04:46:31.562 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-16 04:46:31.569 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-16 04:46:31.571 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 04:46:31.571 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 04:46:31.572 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 04:46:31.994  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-16 04:46:31.996  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-16 04:46:31.996 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-16 04:46:31.997 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 04:46:32.000  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-16 04:46:32.000  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-16 04:46:32.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:46:32.002 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:46:32.002 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:46:32.005 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:46:32.006 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:46:32.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:46:32.008 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:46:32.009 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:46:32.009 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:46:32.010 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-16 04:46:32.015 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196873537050637438723760275529492411438063743168 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 16 03:11:19 UTC 2022 Final Date: Thu Jul 15 03:11:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:f1:35:e1:ad:c2:08:11:dd:f5:3d:df:54:77:30:73:04:4d:1d:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 90eb9f76a837e5ff67811f8032b90e97b0d01318 e3aacf94a89340cb9558fd73283deeff24c9b707 6d52fb9da5f70c4d12e0a9a01656dc2aeb4aed7b 900cff8a58d54fd42075e5a29ac9673c6c32a12f 8f08c80d2d39b72ec7552d3df4f094315a2a61f2 6e68ff4248b4e9172d06df3b68f6bc781a9b1a65 2bd868f4b4ee615dbb8eb65812ee7de51cfd8483 acec111046213c7fd14b9be6720a86e40e0e2992 2907b7b2d6e78a182e6670fa5f3dfb3a24673925 eeb774e9c4721a6d796bc7335e11486d01d4dc97 a42b697569f49c5dddb6e3d4cb27260fb84b86c1 84c9ee75be41cb2d374e26cfd1c3c710b7c0f269 a2d8f699f824447ffe761d7d569ade2e40a878cf cdb55490f565203999a2587a76497a7115a1cf58 dc86fabc74400b004873064c7577ed3a6bd64691 8c1838c88ca76ad36ece5be71d35bd4b73e89b88 67ad44d146d2af8188df7e5c2e0a31824ad2baee 74c7e9843948fd5103018bb29660dc1bc12d7e3e 7ec5f33effa84c37122546a9d07b2c9f94a5ef94 fb0d2f75 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [51:be:51:d5:07:94:53:15:ad:fd:48:8b:51:a0:08:9f:dc:53:34:90] modulus: d73bfb52ac1014cc2dfff7644c642e8831866cc5d6f64f00ee33543079a14b1e703511c2edef3885b6b91e1dc6488bf47a18e2f513b94d93393184739020268f0bc0076c5a7fc71fad6eb2af02ad3163abe22f6d3d1b5314f5c41be8229ab403fc63845ecdce2354828bd3d30251f2ed7695a8ad275ffa2796798a552e64aba7020d5925f9a4d320b91cb214a6d23c36399505ed4535f1be6cb12e6a62d61d455f9ef8306b3daef6796bfe1c860afeb814caa82e4731ad88218a13b8dff7f65cd011f82ec7cb37d6d7fa5c230402aacf155ad990bc31bf35b541272ebcb7ef407a6a12d06e53bfad5afc8aea98188c70ed5d91f3d95ccb2f2243edc3c9a6478f public exponent: 10001 ] 2022-07-16 04:49:04.886  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-16 04:49:04.888 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-16 04:49:04.890 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 04:49:04.890 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-16 04:49:04.891  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 04:49:04.892  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-16 04:49:04.892  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-16 04:49:04.892 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 04:49:04.893 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-16 04:49:04.893 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-16 04:49:04.900 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-16 04:49:04.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 04:49:04.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 04:49:04.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 04:49:05.290  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-16 04:49:05.291  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-16 04:49:05.291 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-16 04:49:05.292 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 04:49:05.294  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-16 04:49:05.294  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-16 04:49:05.295 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:49:05.295 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:49:05.295 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:49:05.299 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:49:05.301 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:49:05.302 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:49:05.311 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:49:05.314 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:49:05.318 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:49:05.323 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-16 04:49:05.330 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196873537050637438723760275529492411438063743168 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 16 03:11:19 UTC 2022 Final Date: Thu Jul 15 03:11:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:f1:35:e1:ad:c2:08:11:dd:f5:3d:df:54:77:30:73:04:4d:1d:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 90eb9f76a837e5ff67811f8032b90e97b0d01318 e3aacf94a89340cb9558fd73283deeff24c9b707 6d52fb9da5f70c4d12e0a9a01656dc2aeb4aed7b 900cff8a58d54fd42075e5a29ac9673c6c32a12f 8f08c80d2d39b72ec7552d3df4f094315a2a61f2 6e68ff4248b4e9172d06df3b68f6bc781a9b1a65 2bd868f4b4ee615dbb8eb65812ee7de51cfd8483 acec111046213c7fd14b9be6720a86e40e0e2992 2907b7b2d6e78a182e6670fa5f3dfb3a24673925 eeb774e9c4721a6d796bc7335e11486d01d4dc97 a42b697569f49c5dddb6e3d4cb27260fb84b86c1 84c9ee75be41cb2d374e26cfd1c3c710b7c0f269 a2d8f699f824447ffe761d7d569ade2e40a878cf cdb55490f565203999a2587a76497a7115a1cf58 dc86fabc74400b004873064c7577ed3a6bd64691 8c1838c88ca76ad36ece5be71d35bd4b73e89b88 67ad44d146d2af8188df7e5c2e0a31824ad2baee 74c7e9843948fd5103018bb29660dc1bc12d7e3e 7ec5f33effa84c37122546a9d07b2c9f94a5ef94 fb0d2f75 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [99:b7:a7:a6:a9:22:d1:1e:d0:b1:44:c5:c2:c6:93:48:49:32:67:08] modulus: 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 public exponent: 10001 ] 2022-07-16 04:54:15.857  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-16 04:54:15.860 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-16 04:54:15.876 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 04:54:15.881 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-16 04:54:15.885  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 04:54:15.886  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-16 04:54:15.887  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-16 04:54:15.890 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 04:54:15.890 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-16 04:54:15.891 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-16 04:54:15.908 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-16 04:54:15.910 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 04:54:15.910 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 04:54:15.911 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 04:54:16.158  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-16 04:54:16.159  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-16 04:54:16.160 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-16 04:54:16.160 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 04:54:16.161  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-16 04:54:16.162  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-16 04:54:16.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:54:16.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:54:16.164 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:54:16.165 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:54:16.165 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:54:16.166 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:54:16.167 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:54:16.168 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:54:16.169 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:54:16.171 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-16 04:54:16.178 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196873537050637438723760275529492411438063743168 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 16 03:11:19 UTC 2022 Final Date: Thu Jul 15 03:11:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:f1:35:e1:ad:c2:08:11:dd:f5:3d:df:54:77:30:73:04:4d:1d:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 90eb9f76a837e5ff67811f8032b90e97b0d01318 e3aacf94a89340cb9558fd73283deeff24c9b707 6d52fb9da5f70c4d12e0a9a01656dc2aeb4aed7b 900cff8a58d54fd42075e5a29ac9673c6c32a12f 8f08c80d2d39b72ec7552d3df4f094315a2a61f2 6e68ff4248b4e9172d06df3b68f6bc781a9b1a65 2bd868f4b4ee615dbb8eb65812ee7de51cfd8483 acec111046213c7fd14b9be6720a86e40e0e2992 2907b7b2d6e78a182e6670fa5f3dfb3a24673925 eeb774e9c4721a6d796bc7335e11486d01d4dc97 a42b697569f49c5dddb6e3d4cb27260fb84b86c1 84c9ee75be41cb2d374e26cfd1c3c710b7c0f269 a2d8f699f824447ffe761d7d569ade2e40a878cf cdb55490f565203999a2587a76497a7115a1cf58 dc86fabc74400b004873064c7577ed3a6bd64691 8c1838c88ca76ad36ece5be71d35bd4b73e89b88 67ad44d146d2af8188df7e5c2e0a31824ad2baee 74c7e9843948fd5103018bb29660dc1bc12d7e3e 7ec5f33effa84c37122546a9d07b2c9f94a5ef94 fb0d2f75 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [19:00:34:35:b8:ea:15:db:13:39:12:e4:60:55:a4:25:80:a9:17:a0] modulus: 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 public exponent: 10001 ] 2022-07-16 04:58:34.197  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-16 04:58:34.200 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-16 04:58:34.204 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 04:58:34.205 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-16 04:58:34.206  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 04:58:34.206  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-16 04:58:34.207  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-16 04:58:34.207 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 04:58:34.208 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-16 04:58:34.208 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-16 04:58:34.215 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-16 04:58:34.216 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 04:58:34.217 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 04:58:34.218 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 04:58:34.728  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-16 04:58:34.729  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-16 04:58:34.729 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-16 04:58:34.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 04:58:34.731  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-16 04:58:34.732  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-16 04:58:34.732 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:58:34.733 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:58:34.733 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:58:34.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:58:34.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:58:34.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:58:34.735 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 04:58:34.736 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 04:58:34.736 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 04:58:34.737 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-16 04:58:34.745 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196873537050637438723760275529492411438063743168 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 16 03:11:19 UTC 2022 Final Date: Thu Jul 15 03:11:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:f1:35:e1:ad:c2:08:11:dd:f5:3d:df:54:77:30:73:04:4d:1d:a8] modulus: adfd8ac85809150fd1abd1b04fb80e5b5cab4e42841680c98c13644032f803b706e72a156e5564a3e9b1e243f12af6302ed6d8b846cc5dd0d9a6d1ceca539653340eefcd8fecb1d0fae0d746c546d0acd4fa1772ada1e76ba45a228f703ddf918dfee306b25faa447b18bbd5bb2819e591f35179d719e3fce48bfe5a5d425d00f284be1b0001f8ae2af1c20ac975f5029f73faf71ac10d1fb8da29e3b0052b89f2dc2027cbd83d44b06496a5152787b5f53e3f726bb66ec819fe116a7511a27e4cab532c900591f6aa714eccf84c6d333bd9d663b88ad7e75ebf48f948580461031f5215c59b08bb0f175fbd3bad2b5bb4600f9a728ce5b90ff3b6e59070f699d9b7a0e0bd9f9a67a207188929fba8641ac3346636bb825fbec4ba1da75cf5db57fa261b0f00ee5a1bc0ceac83b1a6d6d6d377c34a775e9add89141eac0a10490c46c6f559e72f8bb7979fec4a3d669585b68b4acda1624dfd24ba6676b6c32b6c2cd1223b637ee69c9ced5bb5eaa8e53a9b16ab7c6c8aabeecb0d48aa91c693 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 90eb9f76a837e5ff67811f8032b90e97b0d01318 e3aacf94a89340cb9558fd73283deeff24c9b707 6d52fb9da5f70c4d12e0a9a01656dc2aeb4aed7b 900cff8a58d54fd42075e5a29ac9673c6c32a12f 8f08c80d2d39b72ec7552d3df4f094315a2a61f2 6e68ff4248b4e9172d06df3b68f6bc781a9b1a65 2bd868f4b4ee615dbb8eb65812ee7de51cfd8483 acec111046213c7fd14b9be6720a86e40e0e2992 2907b7b2d6e78a182e6670fa5f3dfb3a24673925 eeb774e9c4721a6d796bc7335e11486d01d4dc97 a42b697569f49c5dddb6e3d4cb27260fb84b86c1 84c9ee75be41cb2d374e26cfd1c3c710b7c0f269 a2d8f699f824447ffe761d7d569ade2e40a878cf cdb55490f565203999a2587a76497a7115a1cf58 dc86fabc74400b004873064c7577ed3a6bd64691 8c1838c88ca76ad36ece5be71d35bd4b73e89b88 67ad44d146d2af8188df7e5c2e0a31824ad2baee 74c7e9843948fd5103018bb29660dc1bc12d7e3e 7ec5f33effa84c37122546a9d07b2c9f94a5ef94 fb0d2f75 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7b:72:1e:21:ff:54:0f:b2:f6:b1:5d:e0:ef:ef:ee:d5:28:ce:e7:bb] modulus: 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 public exponent: 10001 ] 2022-07-16 05:03:24.326  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-16 05:03:24.332 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-16 05:03:24.336 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-16 05:03:24.339 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-16 05:03:24.340  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-16 05:03:24.341  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-16 05:03:24.342  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-16 05:03:24.342 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 05:03:24.343 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-16 05:03:24.344 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-16 05:03:24.353 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-16 05:03:24.356 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:03:24.356 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:03:24.356 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:03:24.725  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-16 05:03:24.726  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-16 05:03:24.727 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-16 05:03:24.727 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:03:24.730  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-16 05:03:24.731  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-16 05:03:24.733 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:03:24.733 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:03:24.734 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:03:24.736 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:03:24.737 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:03:24.737 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:03:24.738 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:03:24.739 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:03:24.739 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:03:24.740 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-16 05:03:24.745 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196873537050637438723760275529492411438063743168 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 16 03:11:19 UTC 2022 Final Date: Thu Jul 15 03:11:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:f1:35:e1:ad:c2:08:11:dd:f5:3d:df:54:77:30:73:04:4d:1d:a8] modulus: adfd8ac85809150fd1abd1b04fb80e5b5cab4e42841680c98c13644032f803b706e72a156e5564a3e9b1e243f12af6302ed6d8b846cc5dd0d9a6d1ceca539653340eefcd8fecb1d0fae0d746c546d0acd4fa1772ada1e76ba45a228f703ddf918dfee306b25faa447b18bbd5bb2819e591f35179d719e3fce48bfe5a5d425d00f284be1b0001f8ae2af1c20ac975f5029f73faf71ac10d1fb8da29e3b0052b89f2dc2027cbd83d44b06496a5152787b5f53e3f726bb66ec819fe116a7511a27e4cab532c900591f6aa714eccf84c6d333bd9d663b88ad7e75ebf48f948580461031f5215c59b08bb0f175fbd3bad2b5bb4600f9a728ce5b90ff3b6e59070f699d9b7a0e0bd9f9a67a207188929fba8641ac3346636bb825fbec4ba1da75cf5db57fa261b0f00ee5a1bc0ceac83b1a6d6d6d377c34a775e9add89141eac0a10490c46c6f559e72f8bb7979fec4a3d669585b68b4acda1624dfd24ba6676b6c32b6c2cd1223b637ee69c9ced5bb5eaa8e53a9b16ab7c6c8aabeecb0d48aa91c693 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 90eb9f76a837e5ff67811f8032b90e97b0d01318 e3aacf94a89340cb9558fd73283deeff24c9b707 6d52fb9da5f70c4d12e0a9a01656dc2aeb4aed7b 900cff8a58d54fd42075e5a29ac9673c6c32a12f 8f08c80d2d39b72ec7552d3df4f094315a2a61f2 6e68ff4248b4e9172d06df3b68f6bc781a9b1a65 2bd868f4b4ee615dbb8eb65812ee7de51cfd8483 acec111046213c7fd14b9be6720a86e40e0e2992 2907b7b2d6e78a182e6670fa5f3dfb3a24673925 eeb774e9c4721a6d796bc7335e11486d01d4dc97 a42b697569f49c5dddb6e3d4cb27260fb84b86c1 84c9ee75be41cb2d374e26cfd1c3c710b7c0f269 a2d8f699f824447ffe761d7d569ade2e40a878cf cdb55490f565203999a2587a76497a7115a1cf58 dc86fabc74400b004873064c7577ed3a6bd64691 8c1838c88ca76ad36ece5be71d35bd4b73e89b88 67ad44d146d2af8188df7e5c2e0a31824ad2baee 74c7e9843948fd5103018bb29660dc1bc12d7e3e 7ec5f33effa84c37122546a9d07b2c9f94a5ef94 fb0d2f75 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4d:57:09:d4:84:7a:cd:08:13:b1:ae:0d:92:75:15:d5:c7:e2:57:b5] modulus: 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 public exponent: 10001 ] 2022-07-16 05:03:53.500  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-16 05:03:53.503 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-16 05:03:53.508 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 05:03:53.510 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-16 05:03:53.511  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 05:03:53.512  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-16 05:03:53.513  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-16 05:03:53.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 05:03:53.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-16 05:03:53.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-16 05:03:53.526 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-16 05:03:53.529 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:03:53.530 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:03:53.530 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:03:53.790  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-16 05:03:53.790  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-16 05:03:53.791 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-16 05:03:53.791 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:03:53.793  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-16 05:03:53.796  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-16 05:03:53.797 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:03:53.798 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:03:53.799 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:03:53.801 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:03:53.801 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:03:53.802 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:03:53.803 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:03:53.804 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:03:53.804 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:03:53.806 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-16 05:03:53.818 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196873537050637438723760275529492411438063743168 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 16 03:11:19 UTC 2022 Final Date: Thu Jul 15 03:11:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:f1:35:e1:ad:c2:08:11:dd:f5:3d:df:54:77:30:73:04:4d:1d:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 90eb9f76a837e5ff67811f8032b90e97b0d01318 e3aacf94a89340cb9558fd73283deeff24c9b707 6d52fb9da5f70c4d12e0a9a01656dc2aeb4aed7b 900cff8a58d54fd42075e5a29ac9673c6c32a12f 8f08c80d2d39b72ec7552d3df4f094315a2a61f2 6e68ff4248b4e9172d06df3b68f6bc781a9b1a65 2bd868f4b4ee615dbb8eb65812ee7de51cfd8483 acec111046213c7fd14b9be6720a86e40e0e2992 2907b7b2d6e78a182e6670fa5f3dfb3a24673925 eeb774e9c4721a6d796bc7335e11486d01d4dc97 a42b697569f49c5dddb6e3d4cb27260fb84b86c1 84c9ee75be41cb2d374e26cfd1c3c710b7c0f269 a2d8f699f824447ffe761d7d569ade2e40a878cf cdb55490f565203999a2587a76497a7115a1cf58 dc86fabc74400b004873064c7577ed3a6bd64691 8c1838c88ca76ad36ece5be71d35bd4b73e89b88 67ad44d146d2af8188df7e5c2e0a31824ad2baee 74c7e9843948fd5103018bb29660dc1bc12d7e3e 7ec5f33effa84c37122546a9d07b2c9f94a5ef94 fb0d2f75 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:6f:6e:f0:6f:c7:b7:a7:05:63:f3:74:b8:8f:07:0a:8c:b6:b6:dc] modulus: c3ca86c4999a3b4f9896bff6c7963ddb4ba878bce8eb27a79c3b15ef5e80438e3ad42345d8edfc4ee773a23eed1de803f77b405f83777699cc954e5e55f75389de904c301304b8b2b1c1a742a67609c35ecff1e1c04ebc3f9dc8813b405332e9e7020e228ead9302bec6ee61ce6a93d3292ccbc29884fa4931dbe6f51aaf0147153a7391f54919d1a8eeae853549d045d409e310d93f6be709e53d119242a83cb241b5f8d52fa746462c3b45390500700ed0937bbb7f4e67896164a1984e4bc9f61cf441242b6f4fd98d89cd946665fabd9374af54e9bbb4309d759c86a76319134317597a6d5e7f4b6638900e32dddde4e250efe2fc0dab5c2f18a61313372d public exponent: 10001 ] 2022-07-16 05:08:10.338  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-16 05:08:10.341 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-16 05:08:10.345 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 05:08:10.347 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-16 05:08:10.348  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 05:08:10.349  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-16 05:08:10.349  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-16 05:08:10.350 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 05:08:10.350 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-16 05:08:10.351 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-16 05:08:10.358 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-16 05:08:10.360 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:08:10.360 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:08:10.361 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:08:10.565  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-16 05:08:10.571  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-16 05:08:10.572 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-16 05:08:10.572 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:08:10.575  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-16 05:08:10.575  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-16 05:08:10.576 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:08:10.576 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:08:10.576 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:08:10.583 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:08:10.584 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:08:10.584 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:08:10.590 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:08:10.591 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:08:10.591 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:08:10.593 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-16 05:08:10.603 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196873537050637438723760275529492411438063743168 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 16 03:11:19 UTC 2022 Final Date: Thu Jul 15 03:11:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:f1:35:e1:ad:c2:08:11:dd:f5:3d:df:54:77:30:73:04:4d:1d:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 90eb9f76a837e5ff67811f8032b90e97b0d01318 e3aacf94a89340cb9558fd73283deeff24c9b707 6d52fb9da5f70c4d12e0a9a01656dc2aeb4aed7b 900cff8a58d54fd42075e5a29ac9673c6c32a12f 8f08c80d2d39b72ec7552d3df4f094315a2a61f2 6e68ff4248b4e9172d06df3b68f6bc781a9b1a65 2bd868f4b4ee615dbb8eb65812ee7de51cfd8483 acec111046213c7fd14b9be6720a86e40e0e2992 2907b7b2d6e78a182e6670fa5f3dfb3a24673925 eeb774e9c4721a6d796bc7335e11486d01d4dc97 a42b697569f49c5dddb6e3d4cb27260fb84b86c1 84c9ee75be41cb2d374e26cfd1c3c710b7c0f269 a2d8f699f824447ffe761d7d569ade2e40a878cf cdb55490f565203999a2587a76497a7115a1cf58 dc86fabc74400b004873064c7577ed3a6bd64691 8c1838c88ca76ad36ece5be71d35bd4b73e89b88 67ad44d146d2af8188df7e5c2e0a31824ad2baee 74c7e9843948fd5103018bb29660dc1bc12d7e3e 7ec5f33effa84c37122546a9d07b2c9f94a5ef94 fb0d2f75 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [28:cb:e5:93:e2:2e:be:6c:e9:d2:2a:1a:b7:d3:89:db:eb:79:63:33] modulus: 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 public exponent: 10001 ] 2022-07-16 05:11:17.030  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-16 05:11:17.032 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-16 05:11:17.036 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-16 05:11:17.036 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-16 05:11:17.037  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-16 05:11:17.037  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-16 05:11:17.038  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-16 05:11:17.038 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 05:11:17.039 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-16 05:11:17.039 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-16 05:11:17.044 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-16 05:11:17.045 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:11:17.045 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:11:17.045 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:11:17.353  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-16 05:11:17.354  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-16 05:11:17.354 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-16 05:11:17.354 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:11:17.356  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-16 05:11:17.356  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-16 05:11:17.357 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:11:17.357 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:11:17.357 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:11:17.358 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:11:17.359 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:11:17.359 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:11:17.360 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:11:17.360 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:11:17.361 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:11:17.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-16 05:11:17.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196873537050637438723760275529492411438063743168 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 16 03:11:19 UTC 2022 Final Date: Thu Jul 15 03:11:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:f1:35:e1:ad:c2:08:11:dd:f5:3d:df:54:77:30:73:04:4d:1d:a8] modulus: adfd8ac85809150fd1abd1b04fb80e5b5cab4e42841680c98c13644032f803b706e72a156e5564a3e9b1e243f12af6302ed6d8b846cc5dd0d9a6d1ceca539653340eefcd8fecb1d0fae0d746c546d0acd4fa1772ada1e76ba45a228f703ddf918dfee306b25faa447b18bbd5bb2819e591f35179d719e3fce48bfe5a5d425d00f284be1b0001f8ae2af1c20ac975f5029f73faf71ac10d1fb8da29e3b0052b89f2dc2027cbd83d44b06496a5152787b5f53e3f726bb66ec819fe116a7511a27e4cab532c900591f6aa714eccf84c6d333bd9d663b88ad7e75ebf48f948580461031f5215c59b08bb0f175fbd3bad2b5bb4600f9a728ce5b90ff3b6e59070f699d9b7a0e0bd9f9a67a207188929fba8641ac3346636bb825fbec4ba1da75cf5db57fa261b0f00ee5a1bc0ceac83b1a6d6d6d377c34a775e9add89141eac0a10490c46c6f559e72f8bb7979fec4a3d669585b68b4acda1624dfd24ba6676b6c32b6c2cd1223b637ee69c9ced5bb5eaa8e53a9b16ab7c6c8aabeecb0d48aa91c693 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 90eb9f76a837e5ff67811f8032b90e97b0d01318 e3aacf94a89340cb9558fd73283deeff24c9b707 6d52fb9da5f70c4d12e0a9a01656dc2aeb4aed7b 900cff8a58d54fd42075e5a29ac9673c6c32a12f 8f08c80d2d39b72ec7552d3df4f094315a2a61f2 6e68ff4248b4e9172d06df3b68f6bc781a9b1a65 2bd868f4b4ee615dbb8eb65812ee7de51cfd8483 acec111046213c7fd14b9be6720a86e40e0e2992 2907b7b2d6e78a182e6670fa5f3dfb3a24673925 eeb774e9c4721a6d796bc7335e11486d01d4dc97 a42b697569f49c5dddb6e3d4cb27260fb84b86c1 84c9ee75be41cb2d374e26cfd1c3c710b7c0f269 a2d8f699f824447ffe761d7d569ade2e40a878cf cdb55490f565203999a2587a76497a7115a1cf58 dc86fabc74400b004873064c7577ed3a6bd64691 8c1838c88ca76ad36ece5be71d35bd4b73e89b88 67ad44d146d2af8188df7e5c2e0a31824ad2baee 74c7e9843948fd5103018bb29660dc1bc12d7e3e 7ec5f33effa84c37122546a9d07b2c9f94a5ef94 fb0d2f75 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e6:44:98:af:e6:94:b5:05:79:e5:a3:27:ef:d3:c4:12:aa:5f:98:76] modulus: 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 public exponent: 10001 ] 2022-07-16 05:11:37.926  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-16 05:11:37.928 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-16 05:11:37.930 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-16 05:11:37.931 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-16 05:11:37.932  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-16 05:11:37.933  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-16 05:11:37.933  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-16 05:11:37.933 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 05:11:37.934 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-16 05:11:37.934 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-16 05:11:37.939 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-16 05:11:37.940 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:11:37.941 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:11:37.941 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:11:38.134  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-16 05:11:38.135  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-16 05:11:38.135 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-16 05:11:38.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:11:38.138  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-16 05:11:38.139  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-16 05:11:38.140 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:11:38.140 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:11:38.141 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:11:38.142 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:11:38.142 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:11:38.142 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:11:38.144 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:11:38.144 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:11:38.145 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:11:38.146 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-16 05:11:38.150 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196873537050637438723760275529492411438063743168 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 16 03:11:19 UTC 2022 Final Date: Thu Jul 15 03:11:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:f1:35:e1:ad:c2:08:11:dd:f5:3d:df:54:77:30:73:04:4d:1d:a8] modulus: adfd8ac85809150fd1abd1b04fb80e5b5cab4e42841680c98c13644032f803b706e72a156e5564a3e9b1e243f12af6302ed6d8b846cc5dd0d9a6d1ceca539653340eefcd8fecb1d0fae0d746c546d0acd4fa1772ada1e76ba45a228f703ddf918dfee306b25faa447b18bbd5bb2819e591f35179d719e3fce48bfe5a5d425d00f284be1b0001f8ae2af1c20ac975f5029f73faf71ac10d1fb8da29e3b0052b89f2dc2027cbd83d44b06496a5152787b5f53e3f726bb66ec819fe116a7511a27e4cab532c900591f6aa714eccf84c6d333bd9d663b88ad7e75ebf48f948580461031f5215c59b08bb0f175fbd3bad2b5bb4600f9a728ce5b90ff3b6e59070f699d9b7a0e0bd9f9a67a207188929fba8641ac3346636bb825fbec4ba1da75cf5db57fa261b0f00ee5a1bc0ceac83b1a6d6d6d377c34a775e9add89141eac0a10490c46c6f559e72f8bb7979fec4a3d669585b68b4acda1624dfd24ba6676b6c32b6c2cd1223b637ee69c9ced5bb5eaa8e53a9b16ab7c6c8aabeecb0d48aa91c693 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 90eb9f76a837e5ff67811f8032b90e97b0d01318 e3aacf94a89340cb9558fd73283deeff24c9b707 6d52fb9da5f70c4d12e0a9a01656dc2aeb4aed7b 900cff8a58d54fd42075e5a29ac9673c6c32a12f 8f08c80d2d39b72ec7552d3df4f094315a2a61f2 6e68ff4248b4e9172d06df3b68f6bc781a9b1a65 2bd868f4b4ee615dbb8eb65812ee7de51cfd8483 acec111046213c7fd14b9be6720a86e40e0e2992 2907b7b2d6e78a182e6670fa5f3dfb3a24673925 eeb774e9c4721a6d796bc7335e11486d01d4dc97 a42b697569f49c5dddb6e3d4cb27260fb84b86c1 84c9ee75be41cb2d374e26cfd1c3c710b7c0f269 a2d8f699f824447ffe761d7d569ade2e40a878cf cdb55490f565203999a2587a76497a7115a1cf58 dc86fabc74400b004873064c7577ed3a6bd64691 8c1838c88ca76ad36ece5be71d35bd4b73e89b88 67ad44d146d2af8188df7e5c2e0a31824ad2baee 74c7e9843948fd5103018bb29660dc1bc12d7e3e 7ec5f33effa84c37122546a9d07b2c9f94a5ef94 fb0d2f75 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c5:a0:14:71:fb:40:02:22:71:4d:7b:8b:a4:be:ef:c5:a4:7c:0f:09] modulus: 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 public exponent: 10001 ] 2022-07-16 05:13:35.912  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-16 05:13:35.913 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-16 05:13:35.919 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 05:13:35.920 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-16 05:13:35.921  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 05:13:35.929  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-16 05:13:35.929  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-16 05:13:35.930 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 05:13:35.930 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-16 05:13:35.931 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-16 05:13:35.942 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-16 05:13:35.944 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:13:35.945 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:13:35.946 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:13:36.208  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-16 05:13:36.208  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-16 05:13:36.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-16 05:13:36.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:13:36.211  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-16 05:13:36.211  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-16 05:13:36.211 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:13:36.212 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:13:36.212 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:13:36.213 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:13:36.213 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:13:36.213 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:13:36.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:13:36.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:13:36.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:13:36.215 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-16 05:13:36.220 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196873537050637438723760275529492411438063743168 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 16 03:11:19 UTC 2022 Final Date: Thu Jul 15 03:11:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:f1:35:e1:ad:c2:08:11:dd:f5:3d:df:54:77:30:73:04:4d:1d:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 90eb9f76a837e5ff67811f8032b90e97b0d01318 e3aacf94a89340cb9558fd73283deeff24c9b707 6d52fb9da5f70c4d12e0a9a01656dc2aeb4aed7b 900cff8a58d54fd42075e5a29ac9673c6c32a12f 8f08c80d2d39b72ec7552d3df4f094315a2a61f2 6e68ff4248b4e9172d06df3b68f6bc781a9b1a65 2bd868f4b4ee615dbb8eb65812ee7de51cfd8483 acec111046213c7fd14b9be6720a86e40e0e2992 2907b7b2d6e78a182e6670fa5f3dfb3a24673925 eeb774e9c4721a6d796bc7335e11486d01d4dc97 a42b697569f49c5dddb6e3d4cb27260fb84b86c1 84c9ee75be41cb2d374e26cfd1c3c710b7c0f269 a2d8f699f824447ffe761d7d569ade2e40a878cf cdb55490f565203999a2587a76497a7115a1cf58 dc86fabc74400b004873064c7577ed3a6bd64691 8c1838c88ca76ad36ece5be71d35bd4b73e89b88 67ad44d146d2af8188df7e5c2e0a31824ad2baee 74c7e9843948fd5103018bb29660dc1bc12d7e3e 7ec5f33effa84c37122546a9d07b2c9f94a5ef94 fb0d2f75 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [64:08:99:67:b6:c7:1e:e1:67:76:8e:b8:3a:95:9a:a3:4b:41:3d:29] modulus: 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 public exponent: 10001 ] 2022-07-16 05:18:31.141  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-16 05:18:31.143 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-16 05:18:31.146 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 05:18:31.147 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-16 05:18:31.148  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 05:18:31.149  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-16 05:18:31.149  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-16 05:18:31.150 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 05:18:31.150 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-16 05:18:31.151 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-16 05:18:31.157 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-16 05:18:31.159 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:18:31.159 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:18:31.160 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:18:31.426  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-16 05:18:31.426  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-16 05:18:31.427 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-16 05:18:31.428 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:18:31.430  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-16 05:18:31.431  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-16 05:18:31.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:18:31.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:18:31.432 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:18:31.432 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:18:31.433 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:18:31.433 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:18:31.433 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:18:31.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:18:31.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:18:31.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-16 05:18:31.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196873537050637438723760275529492411438063743168 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 16 03:11:19 UTC 2022 Final Date: Thu Jul 15 03:11:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:f1:35:e1:ad:c2:08:11:dd:f5:3d:df:54:77:30:73:04:4d:1d:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 90eb9f76a837e5ff67811f8032b90e97b0d01318 e3aacf94a89340cb9558fd73283deeff24c9b707 6d52fb9da5f70c4d12e0a9a01656dc2aeb4aed7b 900cff8a58d54fd42075e5a29ac9673c6c32a12f 8f08c80d2d39b72ec7552d3df4f094315a2a61f2 6e68ff4248b4e9172d06df3b68f6bc781a9b1a65 2bd868f4b4ee615dbb8eb65812ee7de51cfd8483 acec111046213c7fd14b9be6720a86e40e0e2992 2907b7b2d6e78a182e6670fa5f3dfb3a24673925 eeb774e9c4721a6d796bc7335e11486d01d4dc97 a42b697569f49c5dddb6e3d4cb27260fb84b86c1 84c9ee75be41cb2d374e26cfd1c3c710b7c0f269 a2d8f699f824447ffe761d7d569ade2e40a878cf cdb55490f565203999a2587a76497a7115a1cf58 dc86fabc74400b004873064c7577ed3a6bd64691 8c1838c88ca76ad36ece5be71d35bd4b73e89b88 67ad44d146d2af8188df7e5c2e0a31824ad2baee 74c7e9843948fd5103018bb29660dc1bc12d7e3e 7ec5f33effa84c37122546a9d07b2c9f94a5ef94 fb0d2f75 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8c:52:00:75:bf:c5:27:70:f4:8e:61:08:92:d1:1c:77:44:7c:61:cd] modulus: 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 public exponent: 10001 ] 2022-07-16 05:24:33.522  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-16 05:24:33.525 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-16 05:24:33.529 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 05:24:33.530 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-16 05:24:33.531  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 05:24:33.532  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-16 05:24:33.532  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-16 05:24:33.533 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 05:24:33.534 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-16 05:24:33.534 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-16 05:24:33.543 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-16 05:24:33.545 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:24:33.545 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:24:33.546 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:24:33.882  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-16 05:24:33.883  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-16 05:24:33.884 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-16 05:24:33.884 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:24:33.886  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-16 05:24:33.886  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-16 05:24:33.886 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:24:33.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:24:33.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:24:33.888 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:24:33.888 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:24:33.888 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:24:33.889 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:24:33.889 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:24:33.889 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:24:33.890 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-16 05:24:33.895 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196873537050637438723760275529492411438063743168 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 16 03:11:19 UTC 2022 Final Date: Thu Jul 15 03:11:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:f1:35:e1:ad:c2:08:11:dd:f5:3d:df:54:77:30:73:04:4d:1d:a8] modulus: adfd8ac85809150fd1abd1b04fb80e5b5cab4e42841680c98c13644032f803b706e72a156e5564a3e9b1e243f12af6302ed6d8b846cc5dd0d9a6d1ceca539653340eefcd8fecb1d0fae0d746c546d0acd4fa1772ada1e76ba45a228f703ddf918dfee306b25faa447b18bbd5bb2819e591f35179d719e3fce48bfe5a5d425d00f284be1b0001f8ae2af1c20ac975f5029f73faf71ac10d1fb8da29e3b0052b89f2dc2027cbd83d44b06496a5152787b5f53e3f726bb66ec819fe116a7511a27e4cab532c900591f6aa714eccf84c6d333bd9d663b88ad7e75ebf48f948580461031f5215c59b08bb0f175fbd3bad2b5bb4600f9a728ce5b90ff3b6e59070f699d9b7a0e0bd9f9a67a207188929fba8641ac3346636bb825fbec4ba1da75cf5db57fa261b0f00ee5a1bc0ceac83b1a6d6d6d377c34a775e9add89141eac0a10490c46c6f559e72f8bb7979fec4a3d669585b68b4acda1624dfd24ba6676b6c32b6c2cd1223b637ee69c9ced5bb5eaa8e53a9b16ab7c6c8aabeecb0d48aa91c693 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 90eb9f76a837e5ff67811f8032b90e97b0d01318 e3aacf94a89340cb9558fd73283deeff24c9b707 6d52fb9da5f70c4d12e0a9a01656dc2aeb4aed7b 900cff8a58d54fd42075e5a29ac9673c6c32a12f 8f08c80d2d39b72ec7552d3df4f094315a2a61f2 6e68ff4248b4e9172d06df3b68f6bc781a9b1a65 2bd868f4b4ee615dbb8eb65812ee7de51cfd8483 acec111046213c7fd14b9be6720a86e40e0e2992 2907b7b2d6e78a182e6670fa5f3dfb3a24673925 eeb774e9c4721a6d796bc7335e11486d01d4dc97 a42b697569f49c5dddb6e3d4cb27260fb84b86c1 84c9ee75be41cb2d374e26cfd1c3c710b7c0f269 a2d8f699f824447ffe761d7d569ade2e40a878cf cdb55490f565203999a2587a76497a7115a1cf58 dc86fabc74400b004873064c7577ed3a6bd64691 8c1838c88ca76ad36ece5be71d35bd4b73e89b88 67ad44d146d2af8188df7e5c2e0a31824ad2baee 74c7e9843948fd5103018bb29660dc1bc12d7e3e 7ec5f33effa84c37122546a9d07b2c9f94a5ef94 fb0d2f75 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c4:46:16:f6:b0:35:11:b9:d1:8b:be:5b:65:b6:fd:d1:19:a1:49:2a] modulus: d1ed6b81f61874a134326eb9f558dd88aeea997ceaca233cf115a8d0b2fbecf3bf975f0f02bd059d3e046d9adfecd5c18ffc1509f2a3891ffcf9a1c8097e2e3c94ae53f0f7aa3e5369a67bdf21da1c608b10fbd8e23cd5a8ebdc309f93efdb414eb9718da939864f230daa52a0182c679041d203593069c3fe06ce5ba1284209695f351163f4f8bb99079e1cf88037c3d69277496947885761543b3eb309359bbb385f6a7e13b870ac3ace0fe5b59c0197f94b1142fb866fdfc3443f9154f039b6f1e7fa47be9211490883e2a438fb092081b5a72e95960b070817468139db77b4ebe63085fd49cbceaa160f3a712931ddb31958d78ab4bd8921a84b017d970b public exponent: 10001 ] 2022-07-16 05:29:37.080  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-16 05:29:37.083 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-16 05:29:37.085 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 05:29:37.086 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-16 05:29:37.086  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 05:29:37.088  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-16 05:29:37.088  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-16 05:29:37.088 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 05:29:37.089 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-16 05:29:37.089 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-16 05:29:37.095 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-16 05:29:37.097 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:29:37.097 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:29:37.098 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:29:37.426  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-16 05:29:37.427  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-16 05:29:37.427 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-16 05:29:37.428 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:29:37.429  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-16 05:29:37.429  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-16 05:29:37.430 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:29:37.430 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:29:37.430 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:29:37.431 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:29:37.432 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:29:37.432 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:29:37.433 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:29:37.433 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:29:37.433 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:29:37.434 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-16 05:29:37.440 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196873537050637438723760275529492411438063743168 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 16 03:11:19 UTC 2022 Final Date: Thu Jul 15 03:11:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:f1:35:e1:ad:c2:08:11:dd:f5:3d:df:54:77:30:73:04:4d:1d:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 90eb9f76a837e5ff67811f8032b90e97b0d01318 e3aacf94a89340cb9558fd73283deeff24c9b707 6d52fb9da5f70c4d12e0a9a01656dc2aeb4aed7b 900cff8a58d54fd42075e5a29ac9673c6c32a12f 8f08c80d2d39b72ec7552d3df4f094315a2a61f2 6e68ff4248b4e9172d06df3b68f6bc781a9b1a65 2bd868f4b4ee615dbb8eb65812ee7de51cfd8483 acec111046213c7fd14b9be6720a86e40e0e2992 2907b7b2d6e78a182e6670fa5f3dfb3a24673925 eeb774e9c4721a6d796bc7335e11486d01d4dc97 a42b697569f49c5dddb6e3d4cb27260fb84b86c1 84c9ee75be41cb2d374e26cfd1c3c710b7c0f269 a2d8f699f824447ffe761d7d569ade2e40a878cf cdb55490f565203999a2587a76497a7115a1cf58 dc86fabc74400b004873064c7577ed3a6bd64691 8c1838c88ca76ad36ece5be71d35bd4b73e89b88 67ad44d146d2af8188df7e5c2e0a31824ad2baee 74c7e9843948fd5103018bb29660dc1bc12d7e3e 7ec5f33effa84c37122546a9d07b2c9f94a5ef94 fb0d2f75 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [46:df:17:54:db:37:d4:04:7d:fb:08:34:bb:76:03:20:51:6d:e4:fe] modulus: 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 public exponent: 10001 ] 2022-07-16 05:35:07.264  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-16 05:35:07.268 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-16 05:35:07.271 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 05:35:07.273 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-16 05:35:07.274  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-16 05:35:07.275  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-16 05:35:07.276  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-16 05:35:07.276 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-16 05:35:07.277 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-16 05:35:07.278 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-16 05:35:07.286 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-16 05:35:07.288 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:35:07.289 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-16 05:35:07.289 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:35:07.566  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-16 05:35:07.567  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-16 05:35:07.567 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-16 05:35:07.568 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-16 05:35:07.569  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-16 05:35:07.570  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-16 05:35:07.570 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:35:07.570 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:35:07.571 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:35:07.571 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:35:07.572 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:35:07.572 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:35:07.573 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-16 05:35:07.573 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-16 05:35:07.573 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-16 05:35:07.574 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-16 05:35:07.578 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196873537050637438723760275529492411438063743168 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 16 03:11:19 UTC 2022 Final Date: Thu Jul 15 03:11:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:f1:35:e1:ad:c2:08:11:dd:f5:3d:df:54:77:30:73:04:4d:1d:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 90eb9f76a837e5ff67811f8032b90e97b0d01318 e3aacf94a89340cb9558fd73283deeff24c9b707 6d52fb9da5f70c4d12e0a9a01656dc2aeb4aed7b 900cff8a58d54fd42075e5a29ac9673c6c32a12f 8f08c80d2d39b72ec7552d3df4f094315a2a61f2 6e68ff4248b4e9172d06df3b68f6bc781a9b1a65 2bd868f4b4ee615dbb8eb65812ee7de51cfd8483 acec111046213c7fd14b9be6720a86e40e0e2992 2907b7b2d6e78a182e6670fa5f3dfb3a24673925 eeb774e9c4721a6d796bc7335e11486d01d4dc97 a42b697569f49c5dddb6e3d4cb27260fb84b86c1 84c9ee75be41cb2d374e26cfd1c3c710b7c0f269 a2d8f699f824447ffe761d7d569ade2e40a878cf cdb55490f565203999a2587a76497a7115a1cf58 dc86fabc74400b004873064c7577ed3a6bd64691 8c1838c88ca76ad36ece5be71d35bd4b73e89b88 67ad44d146d2af8188df7e5c2e0a31824ad2baee 74c7e9843948fd5103018bb29660dc1bc12d7e3e 7ec5f33effa84c37122546a9d07b2c9f94a5ef94 fb0d2f75 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:30:a7:f1:0e:3f:4a:90:1c:c3:22:7f:b6:ef:31:d9:6f:3e:2a:0c] modulus: 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 public exponent: 10001 ]