2022-05-11 04:47:48,858 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-11 04:47:49,457 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-11 04:47:50.063  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default May 11, 2022 4:47:51 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 11, 2022 4:47:51 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 11, 2022 4:47:51 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 11, 2022 4:47:51 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-11 04:47:51.712 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-11 04:47:51.904  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-05-11 04:47:52.010  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-11 04:47:52.524 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-11 04:47:52.526 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-05-11 04:47:52.527 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-11 04:47:52.530 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-11 04:47:52.559 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-11 04:47:52.562 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-05-11 04:47:52.646 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-05-11 04:47:53.127 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 11, 2022 4:47:53 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-11 04:47:53.740  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 5.377 seconds (JVM running for 6.482) May 11, 2022 4:48:19 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-11 04:48:35.794  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-11 04:48:35.799 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-11 04:48:35.821 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-11 04:48:35.823 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-11 04:48:35.832  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-11 04:48:35.834  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-11 04:48:35.835  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-11 04:48:35.836 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-11 04:48:35.836 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-11 04:48:35.838 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-11 04:48:35.841 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-11 04:48:35.844 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-11 04:48:35.869 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-11 04:48:35.873 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-11 04:48:35.874 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-11 04:48:35.878 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 04:48:36.261  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-11 04:48:36.263  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-11 04:48:36.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-11 04:48:36.264 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 04:48:36.270  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-11 04:48:36.271  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-11 04:48:36.271 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 04:48:36.271 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 04:48:36.271 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 04:48:36.279 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 04:48:36.279 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 04:48:36.279 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 04:48:36.283 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 04:48:36.284 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 04:48:36.284 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 04:48:36.285 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-11 04:48:36.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 18953703487387602305056660450011604770460396523 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 11 04:46:18 UTC 2022 Final Date: Mon May 10 04:46:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0b:f1:92:09:f8:58:36:33:e9:f1:78:8f:72:d9:8f:ef:36:f4:fb:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 760827f318fb205eba41d3121e39af907001349d c67c69d3cf5bdf8c077213d62f132bfcd0e2de2d b5595d3b161f73fd3e9e7a59a769ef3c1765ba83 64a7a310b5b8617cd400ab63a6107eaf48924abe 868f680d3fc2fd3515fe819310a04556173ac5a9 e887339e277827a8a60d08dc82046b5d42748e88 e2f3e59499e4590a113dacc4324a5040b19354c2 72a86750902b398031af7de640968ec61f01af71 3d0506e5c31b0a1e850219f3b18a207c23a6dfe2 98345a02ccbe5ad5ace97c91035c5c3c3648e551 8790089a116f9ef78fa16c6687e3bbe68f3cb5cf eb94e7982d8cf29ee5bdbcc4ea34216e0f80187f 3036835dfbd68bd56bbccb6d9f831975b2b2aeaf 98fecbffdcb5315e4daf5ef3d8aebab76c01a795 e1300fb5a34470328419716cbe03101964f9f09a c459bcfbc47361c7dcac67b72669ffcf32c48d65 5675193ef953002a133559d0196bec4de0690d2b 22c36329c53a48d1ec803961ffd5920ea65c7ce0 8ed531ec00a1a85ca7bcfd1e7732df5db7e93bda 3351b5fb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [77:c6:7d:5b:d8:d3:38:81:db:9c:8e:98:a5:55:dd:06:1a:d7:92:7c] modulus: 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 public exponent: 10001 ] 2022-05-11 05:48:17.107  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-11 05:48:17.110 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-11 05:48:17.112 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-11 05:48:17.114 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-11 05:48:17.114  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-11 05:48:17.115  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-11 05:48:17.115  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-11 05:48:17.116 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-11 05:48:17.116 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-11 05:48:17.117 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-11 05:48:17.122 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-11 05:48:17.123 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-11 05:48:17.124 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-11 05:48:17.124 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 05:48:17.270  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-11 05:48:17.271  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-11 05:48:17.271 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-11 05:48:17.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 05:48:17.274  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-11 05:48:17.274  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-11 05:48:17.275 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:48:17.275 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:48:17.275 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:48:17.276 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:48:17.277 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:48:17.277 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:48:17.278 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:48:17.278 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:48:17.278 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:48:17.279 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-11 05:48:17.282 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 18953703487387602305056660450011604770460396523 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 11 04:46:18 UTC 2022 Final Date: Mon May 10 04:46:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0b:f1:92:09:f8:58:36:33:e9:f1:78:8f:72:d9:8f:ef:36:f4:fb:0e] modulus: ae51e6a59576c9b1d2e2fb7844e7d62f80f129b299157cec1a3fcddd660728634ca79960df63faf140609f1d3b37bd5c64048da5edeed3ae65521955e21d7a9941594220debea1c6ddc4a5052912424482a7968f78f3374ada3e3230fb69cd4592a83798b1393b20e0bbc2e3e41c5220f61abe89e8d3e946349f122f2545c3783ed748dd448943ca5dc083c8b407c205064c7c6892ff5801ca733a96115a23f874e7bb0dc5cf4e587da09bcee384fee9b1d98df9dd6330d012613739023cd189c1d4f77027de615f6744b163a2300c01fbf5ab47651c17054aecca1f52d8d09dc7a52a9670b866d6307dbab6dab2aacba1c32cb0578fe570d26c6d4365d7576762b99b1725549995edecb17303d4c99873fe458f0964473186a1680d5a5daccb55015a9649f9e4a602fe8cd1e8c3a50210d0aa3efa8c870251683b3e6d363e09191977446c9ce8e69972e7b60c998b259056cf125b566f2ca0a21d5892377809d90fad9f1f4bbfde0b41ed15417df0930d8b773aa23384fb69c9d422fc866c25 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 760827f318fb205eba41d3121e39af907001349d c67c69d3cf5bdf8c077213d62f132bfcd0e2de2d b5595d3b161f73fd3e9e7a59a769ef3c1765ba83 64a7a310b5b8617cd400ab63a6107eaf48924abe 868f680d3fc2fd3515fe819310a04556173ac5a9 e887339e277827a8a60d08dc82046b5d42748e88 e2f3e59499e4590a113dacc4324a5040b19354c2 72a86750902b398031af7de640968ec61f01af71 3d0506e5c31b0a1e850219f3b18a207c23a6dfe2 98345a02ccbe5ad5ace97c91035c5c3c3648e551 8790089a116f9ef78fa16c6687e3bbe68f3cb5cf eb94e7982d8cf29ee5bdbcc4ea34216e0f80187f 3036835dfbd68bd56bbccb6d9f831975b2b2aeaf 98fecbffdcb5315e4daf5ef3d8aebab76c01a795 e1300fb5a34470328419716cbe03101964f9f09a c459bcfbc47361c7dcac67b72669ffcf32c48d65 5675193ef953002a133559d0196bec4de0690d2b 22c36329c53a48d1ec803961ffd5920ea65c7ce0 8ed531ec00a1a85ca7bcfd1e7732df5db7e93bda 3351b5fb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3d:bc:e3:e1:30:fd:78:5c:1f:56:72:c1:68:db:d5:07:02:7e:f5:ce] modulus: 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 public exponent: 10001 ] 2022-05-11 05:48:24.054  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-11 05:48:24.055 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-11 05:48:24.056 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-11 05:48:24.057 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-11 05:48:24.057  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-11 05:48:24.057  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-11 05:48:24.057  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-11 05:48:24.058 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-11 05:48:24.058 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-11 05:48:24.058 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-11 05:48:24.063 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-11 05:48:24.063 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-11 05:48:24.064 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-11 05:48:24.064 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 05:48:24.248  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-11 05:48:24.249  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-11 05:48:24.250 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-11 05:48:24.250 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 05:48:24.255  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-11 05:48:24.256  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-11 05:48:24.256 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:48:24.256 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:48:24.256 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:48:24.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:48:24.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:48:24.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:48:24.258 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:48:24.258 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:48:24.258 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:48:24.259 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-11 05:48:24.261 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 18953703487387602305056660450011604770460396523 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 11 04:46:18 UTC 2022 Final Date: Mon May 10 04:46:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0b:f1:92:09:f8:58:36:33:e9:f1:78:8f:72:d9:8f:ef:36:f4:fb:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 760827f318fb205eba41d3121e39af907001349d c67c69d3cf5bdf8c077213d62f132bfcd0e2de2d b5595d3b161f73fd3e9e7a59a769ef3c1765ba83 64a7a310b5b8617cd400ab63a6107eaf48924abe 868f680d3fc2fd3515fe819310a04556173ac5a9 e887339e277827a8a60d08dc82046b5d42748e88 e2f3e59499e4590a113dacc4324a5040b19354c2 72a86750902b398031af7de640968ec61f01af71 3d0506e5c31b0a1e850219f3b18a207c23a6dfe2 98345a02ccbe5ad5ace97c91035c5c3c3648e551 8790089a116f9ef78fa16c6687e3bbe68f3cb5cf eb94e7982d8cf29ee5bdbcc4ea34216e0f80187f 3036835dfbd68bd56bbccb6d9f831975b2b2aeaf 98fecbffdcb5315e4daf5ef3d8aebab76c01a795 e1300fb5a34470328419716cbe03101964f9f09a c459bcfbc47361c7dcac67b72669ffcf32c48d65 5675193ef953002a133559d0196bec4de0690d2b 22c36329c53a48d1ec803961ffd5920ea65c7ce0 8ed531ec00a1a85ca7bcfd1e7732df5db7e93bda 3351b5fb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1a:17:0a:56:b8:61:d9:54:55:b4:a5:16:5e:40:a0:73:e7:f4:ad:bc] modulus: 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 public exponent: 10001 ] 2022-05-11 05:50:11.842  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-11 05:50:11.844 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-11 05:50:11.845 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-11 05:50:11.846 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-11 05:50:11.847  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-11 05:50:11.848  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-11 05:50:11.848  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-11 05:50:11.848 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-11 05:50:11.849 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-11 05:50:11.849 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-11 05:50:11.854 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-11 05:50:11.855 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-11 05:50:11.855 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-11 05:50:11.855 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 05:50:11.954  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-11 05:50:11.955  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-11 05:50:11.956 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-11 05:50:11.956 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 05:50:11.959  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-11 05:50:11.960  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-11 05:50:11.960 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:50:11.961 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:50:11.962 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:50:11.962 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:50:11.963 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:50:11.963 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:50:11.964 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:50:11.965 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:50:11.965 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:50:11.966 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-11 05:50:11.970 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 18953703487387602305056660450011604770460396523 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 11 04:46:18 UTC 2022 Final Date: Mon May 10 04:46:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0b:f1:92:09:f8:58:36:33:e9:f1:78:8f:72:d9:8f:ef:36:f4:fb:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 760827f318fb205eba41d3121e39af907001349d c67c69d3cf5bdf8c077213d62f132bfcd0e2de2d b5595d3b161f73fd3e9e7a59a769ef3c1765ba83 64a7a310b5b8617cd400ab63a6107eaf48924abe 868f680d3fc2fd3515fe819310a04556173ac5a9 e887339e277827a8a60d08dc82046b5d42748e88 e2f3e59499e4590a113dacc4324a5040b19354c2 72a86750902b398031af7de640968ec61f01af71 3d0506e5c31b0a1e850219f3b18a207c23a6dfe2 98345a02ccbe5ad5ace97c91035c5c3c3648e551 8790089a116f9ef78fa16c6687e3bbe68f3cb5cf eb94e7982d8cf29ee5bdbcc4ea34216e0f80187f 3036835dfbd68bd56bbccb6d9f831975b2b2aeaf 98fecbffdcb5315e4daf5ef3d8aebab76c01a795 e1300fb5a34470328419716cbe03101964f9f09a c459bcfbc47361c7dcac67b72669ffcf32c48d65 5675193ef953002a133559d0196bec4de0690d2b 22c36329c53a48d1ec803961ffd5920ea65c7ce0 8ed531ec00a1a85ca7bcfd1e7732df5db7e93bda 3351b5fb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8a:0d:7f:e7:94:50:92:9e:ca:e0:f9:85:d5:37:d8:80:fc:f1:27:63] modulus: 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 public exponent: 10001 ] 2022-05-11 05:51:29.893  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-11 05:51:29.894 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-11 05:51:29.896 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-11 05:51:29.897 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-11 05:51:29.897  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-11 05:51:29.898  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-11 05:51:29.899  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-11 05:51:29.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-11 05:51:29.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-11 05:51:29.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-11 05:51:29.904 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-11 05:51:29.905 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-11 05:51:29.905 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-11 05:51:29.905 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 05:51:30.000  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-11 05:51:30.001  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-11 05:51:30.001 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-11 05:51:30.002 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 05:51:30.003  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-11 05:51:30.003  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-11 05:51:30.004 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:51:30.004 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:51:30.004 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:51:30.005 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:51:30.005 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:51:30.006 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:51:30.006 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:51:30.007 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:51:30.007 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:51:30.008 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-11 05:51:30.011 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 18953703487387602305056660450011604770460396523 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 11 04:46:18 UTC 2022 Final Date: Mon May 10 04:46:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0b:f1:92:09:f8:58:36:33:e9:f1:78:8f:72:d9:8f:ef:36:f4:fb:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 760827f318fb205eba41d3121e39af907001349d c67c69d3cf5bdf8c077213d62f132bfcd0e2de2d b5595d3b161f73fd3e9e7a59a769ef3c1765ba83 64a7a310b5b8617cd400ab63a6107eaf48924abe 868f680d3fc2fd3515fe819310a04556173ac5a9 e887339e277827a8a60d08dc82046b5d42748e88 e2f3e59499e4590a113dacc4324a5040b19354c2 72a86750902b398031af7de640968ec61f01af71 3d0506e5c31b0a1e850219f3b18a207c23a6dfe2 98345a02ccbe5ad5ace97c91035c5c3c3648e551 8790089a116f9ef78fa16c6687e3bbe68f3cb5cf eb94e7982d8cf29ee5bdbcc4ea34216e0f80187f 3036835dfbd68bd56bbccb6d9f831975b2b2aeaf 98fecbffdcb5315e4daf5ef3d8aebab76c01a795 e1300fb5a34470328419716cbe03101964f9f09a c459bcfbc47361c7dcac67b72669ffcf32c48d65 5675193ef953002a133559d0196bec4de0690d2b 22c36329c53a48d1ec803961ffd5920ea65c7ce0 8ed531ec00a1a85ca7bcfd1e7732df5db7e93bda 3351b5fb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d7:d8:c1:72:a8:22:da:57:78:18:05:3a:2e:6f:f9:0e:a7:88:3c:22] modulus: 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 public exponent: 10001 ] 2022-05-11 05:53:01.598  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-11 05:53:01.602 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-11 05:53:01.605 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-11 05:53:01.606 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-11 05:53:01.607  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-11 05:53:01.607  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-11 05:53:01.608  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-11 05:53:01.608 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-11 05:53:01.611 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-11 05:53:01.612 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-11 05:53:01.621 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-11 05:53:01.622 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-11 05:53:01.622 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-11 05:53:01.622 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 05:53:01.710  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-11 05:53:01.711  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-11 05:53:01.711 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-11 05:53:01.712 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 05:53:01.714  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-11 05:53:01.714  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-11 05:53:01.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:53:01.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:53:01.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:53:01.716 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:53:01.716 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:53:01.716 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:53:01.717 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:53:01.717 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:53:01.717 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:53:01.718 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-11 05:53:01.721 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 18953703487387602305056660450011604770460396523 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 11 04:46:18 UTC 2022 Final Date: Mon May 10 04:46:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0b:f1:92:09:f8:58:36:33:e9:f1:78:8f:72:d9:8f:ef:36:f4:fb:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 760827f318fb205eba41d3121e39af907001349d c67c69d3cf5bdf8c077213d62f132bfcd0e2de2d b5595d3b161f73fd3e9e7a59a769ef3c1765ba83 64a7a310b5b8617cd400ab63a6107eaf48924abe 868f680d3fc2fd3515fe819310a04556173ac5a9 e887339e277827a8a60d08dc82046b5d42748e88 e2f3e59499e4590a113dacc4324a5040b19354c2 72a86750902b398031af7de640968ec61f01af71 3d0506e5c31b0a1e850219f3b18a207c23a6dfe2 98345a02ccbe5ad5ace97c91035c5c3c3648e551 8790089a116f9ef78fa16c6687e3bbe68f3cb5cf eb94e7982d8cf29ee5bdbcc4ea34216e0f80187f 3036835dfbd68bd56bbccb6d9f831975b2b2aeaf 98fecbffdcb5315e4daf5ef3d8aebab76c01a795 e1300fb5a34470328419716cbe03101964f9f09a c459bcfbc47361c7dcac67b72669ffcf32c48d65 5675193ef953002a133559d0196bec4de0690d2b 22c36329c53a48d1ec803961ffd5920ea65c7ce0 8ed531ec00a1a85ca7bcfd1e7732df5db7e93bda 3351b5fb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [54:22:ad:c4:ba:2f:ec:4f:1e:2a:59:f6:01:fa:ff:1f:f9:15:59:0c] modulus: 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 public exponent: 10001 ] 2022-05-11 05:53:14.452  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-11 05:53:14.454 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-11 05:53:14.455 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-11 05:53:14.456 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-11 05:53:14.457  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-11 05:53:14.457  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-11 05:53:14.458  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-11 05:53:14.458 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-11 05:53:14.458 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-11 05:53:14.459 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-11 05:53:14.462 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-11 05:53:14.462 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-11 05:53:14.462 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-11 05:53:14.462 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 05:53:14.561  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-11 05:53:14.562  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-11 05:53:14.563 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-11 05:53:14.563 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 05:53:14.565  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-11 05:53:14.565  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-11 05:53:14.566 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:53:14.566 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:53:14.567 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:53:14.567 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:53:14.568 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:53:14.568 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:53:14.569 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:53:14.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:53:14.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:53:14.571 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-11 05:53:14.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 18953703487387602305056660450011604770460396523 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 11 04:46:18 UTC 2022 Final Date: Mon May 10 04:46:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0b:f1:92:09:f8:58:36:33:e9:f1:78:8f:72:d9:8f:ef:36:f4:fb:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 760827f318fb205eba41d3121e39af907001349d c67c69d3cf5bdf8c077213d62f132bfcd0e2de2d b5595d3b161f73fd3e9e7a59a769ef3c1765ba83 64a7a310b5b8617cd400ab63a6107eaf48924abe 868f680d3fc2fd3515fe819310a04556173ac5a9 e887339e277827a8a60d08dc82046b5d42748e88 e2f3e59499e4590a113dacc4324a5040b19354c2 72a86750902b398031af7de640968ec61f01af71 3d0506e5c31b0a1e850219f3b18a207c23a6dfe2 98345a02ccbe5ad5ace97c91035c5c3c3648e551 8790089a116f9ef78fa16c6687e3bbe68f3cb5cf eb94e7982d8cf29ee5bdbcc4ea34216e0f80187f 3036835dfbd68bd56bbccb6d9f831975b2b2aeaf 98fecbffdcb5315e4daf5ef3d8aebab76c01a795 e1300fb5a34470328419716cbe03101964f9f09a c459bcfbc47361c7dcac67b72669ffcf32c48d65 5675193ef953002a133559d0196bec4de0690d2b 22c36329c53a48d1ec803961ffd5920ea65c7ce0 8ed531ec00a1a85ca7bcfd1e7732df5db7e93bda 3351b5fb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [47:17:7a:25:1f:83:9d:18:39:3f:fb:3d:20:af:25:fe:aa:2c:0e:fe] modulus: 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 public exponent: 10001 ] 2022-05-11 05:53:27.550  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-11 05:53:27.552 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-11 05:53:27.553 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-11 05:53:27.554 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-11 05:53:27.554  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-11 05:53:27.555  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-11 05:53:27.555  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-11 05:53:27.555 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-11 05:53:27.555 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-11 05:53:27.556 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-11 05:53:27.561 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-11 05:53:27.561 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-11 05:53:27.562 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-11 05:53:27.562 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 05:53:27.650  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-11 05:53:27.651  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-11 05:53:27.651 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-11 05:53:27.651 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-11 05:53:27.652  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-11 05:53:27.652  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-11 05:53:27.652 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:53:27.653 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:53:27.653 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:53:27.653 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:53:27.653 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:53:27.654 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:53:27.654 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-11 05:53:27.654 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-11 05:53:27.654 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-11 05:53:27.655 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-11 05:53:27.657 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 18953703487387602305056660450011604770460396523 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 11 04:46:18 UTC 2022 Final Date: Mon May 10 04:46:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0b:f1:92:09:f8:58:36:33:e9:f1:78:8f:72:d9:8f:ef:36:f4:fb:0e] modulus: ae51e6a59576c9b1d2e2fb7844e7d62f80f129b299157cec1a3fcddd660728634ca79960df63faf140609f1d3b37bd5c64048da5edeed3ae65521955e21d7a9941594220debea1c6ddc4a5052912424482a7968f78f3374ada3e3230fb69cd4592a83798b1393b20e0bbc2e3e41c5220f61abe89e8d3e946349f122f2545c3783ed748dd448943ca5dc083c8b407c205064c7c6892ff5801ca733a96115a23f874e7bb0dc5cf4e587da09bcee384fee9b1d98df9dd6330d012613739023cd189c1d4f77027de615f6744b163a2300c01fbf5ab47651c17054aecca1f52d8d09dc7a52a9670b866d6307dbab6dab2aacba1c32cb0578fe570d26c6d4365d7576762b99b1725549995edecb17303d4c99873fe458f0964473186a1680d5a5daccb55015a9649f9e4a602fe8cd1e8c3a50210d0aa3efa8c870251683b3e6d363e09191977446c9ce8e69972e7b60c998b259056cf125b566f2ca0a21d5892377809d90fad9f1f4bbfde0b41ed15417df0930d8b773aa23384fb69c9d422fc866c25 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 760827f318fb205eba41d3121e39af907001349d c67c69d3cf5bdf8c077213d62f132bfcd0e2de2d b5595d3b161f73fd3e9e7a59a769ef3c1765ba83 64a7a310b5b8617cd400ab63a6107eaf48924abe 868f680d3fc2fd3515fe819310a04556173ac5a9 e887339e277827a8a60d08dc82046b5d42748e88 e2f3e59499e4590a113dacc4324a5040b19354c2 72a86750902b398031af7de640968ec61f01af71 3d0506e5c31b0a1e850219f3b18a207c23a6dfe2 98345a02ccbe5ad5ace97c91035c5c3c3648e551 8790089a116f9ef78fa16c6687e3bbe68f3cb5cf eb94e7982d8cf29ee5bdbcc4ea34216e0f80187f 3036835dfbd68bd56bbccb6d9f831975b2b2aeaf 98fecbffdcb5315e4daf5ef3d8aebab76c01a795 e1300fb5a34470328419716cbe03101964f9f09a c459bcfbc47361c7dcac67b72669ffcf32c48d65 5675193ef953002a133559d0196bec4de0690d2b 22c36329c53a48d1ec803961ffd5920ea65c7ce0 8ed531ec00a1a85ca7bcfd1e7732df5db7e93bda 3351b5fb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d7:07:a1:4b:e6:d2:78:58:62:47:5a:34:3a:64:49:45:11:82:f0:28] modulus: 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 public exponent: 10001 ]