2022-05-24 10:59:03,356 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-24 10:59:04,890 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-24 10:59:05.705  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default May 24, 2022 10:59:08 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 24, 2022 10:59:08 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 24, 2022 10:59:08 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 24, 2022 10:59:08 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-24 10:59:09.306 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-24 10:59:09.706  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-05-24 10:59:09.917  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-24 10:59:10.831 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-24 10:59:10.834 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-05-24 10:59:10.835 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-24 10:59:10.839 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-24 10:59:10.904 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-24 10:59:10.911 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-05-24 10:59:11.087 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-05-24 10:59:11.926 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 24, 2022 10:59:12 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-24 10:59:13.178  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 10.664 seconds (JVM running for 12.618) May 24, 2022 10:59:39 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-24 11:00:16.422  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-24 11:00:16.430 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-24 11:00:16.484 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-24 11:00:16.489 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 11:00:16.517  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-24 11:00:16.520  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-24 11:00:16.521  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-24 11:00:16.523 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-24 11:00:16.523 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 11:00:16.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-24 11:00:16.540 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-24 11:00:16.544 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-24 11:00:16.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-24 11:00:16.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 11:00:16.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 11:00:16.609 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 11:00:17.309  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-24 11:00:17.312  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-24 11:00:17.313 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-24 11:00:17.314 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 11:00:17.323  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-24 11:00:17.324  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-24 11:00:17.325 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:00:17.326 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:00:17.326 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:00:17.337 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:00:17.338 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:00:17.338 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:00:17.344 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:00:17.344 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:00:17.344 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:00:17.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 11:00:17.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69439209368930756307476909643009018678627485205 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:56:43 UTC 2022 Final Date: Sun May 23 10:56:42 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [09:23:d8:04:f4:cd:d9:84:19:da:07:8d:c2:aa:27:cb:5e:e1:5d:6f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b926f4ae7a24083de5bb332cee3f2d583c60ec44 ff759c872598bf67111421c614e812f8ab8a74a3 cec1fd780601fa7f1fa911a90de79151cb9d8583 eea4d9d15d7d0bb2ad6eef4d9b7f7faf3dbfbb8b 2524533cc546b1f631d7445f8a498d87d50185f7 3ab2a6fc1ff32cfa4897190f2a3b28a17dd5a1ee 5b78ffa8bc4353c586d0465070d5250014d9e379 c9aa35b0386dbf8832ea1279f3037a179ba5b94e ddf233e6316fc5a411c100aee19e19644197641c eda166c1d27e2a2acc7e38b66ce4ea0fecaafd15 cf836b50b1ccc794a415b269b692dcdd837ad1ee 5d7497763c2f0f62b8b9b8071aa9f85b456a827d 3871604dc152119a917f44ab900d21dda9c9e7b2 8f3889d02a07de7954a56835d08b78af87453ef5 0093c618b7194c38e779d4072279ecf64debeb9c 25e4d4331eb0beb7e7b173a0564b8a8f05fa255a af88e5124a93c5c2d9ffb8585f805f27ba027b6c 0e4f4c962fe574810973946ad839bfa8f6f67080 7b776580680e2e45e11dc8708aa4b46d7e3ef033 8485c9cb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:25:b9:a0:f3:e9:cc:48:5a:3c:04:dc:d8:79:09:56:ef:bd:d7:9e] modulus: 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 public exponent: 10001 ] 2022-05-24 11:58:19.657  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-24 11:58:19.662 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-24 11:58:19.665 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 11:58:19.667 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 11:58:19.668  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 11:58:19.670  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-24 11:58:19.670  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-24 11:58:19.671 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-24 11:58:19.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-24 11:58:19.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-24 11:58:19.690 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-24 11:58:19.692 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 11:58:19.692 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 11:58:19.693 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 11:58:19.887  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-24 11:58:19.888  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-24 11:58:19.888 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-24 11:58:19.889 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 11:58:19.893  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-24 11:58:19.893  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-24 11:58:19.894 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:58:19.894 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:58:19.895 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:58:19.896 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:58:19.896 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:58:19.897 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:58:19.898 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:58:19.898 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:58:19.898 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:58:19.900 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 11:58:19.906 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69439209368930756307476909643009018678627485205 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:56:43 UTC 2022 Final Date: Sun May 23 10:56:42 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [09:23:d8:04:f4:cd:d9:84:19:da:07:8d:c2:aa:27:cb:5e:e1:5d:6f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b926f4ae7a24083de5bb332cee3f2d583c60ec44 ff759c872598bf67111421c614e812f8ab8a74a3 cec1fd780601fa7f1fa911a90de79151cb9d8583 eea4d9d15d7d0bb2ad6eef4d9b7f7faf3dbfbb8b 2524533cc546b1f631d7445f8a498d87d50185f7 3ab2a6fc1ff32cfa4897190f2a3b28a17dd5a1ee 5b78ffa8bc4353c586d0465070d5250014d9e379 c9aa35b0386dbf8832ea1279f3037a179ba5b94e ddf233e6316fc5a411c100aee19e19644197641c eda166c1d27e2a2acc7e38b66ce4ea0fecaafd15 cf836b50b1ccc794a415b269b692dcdd837ad1ee 5d7497763c2f0f62b8b9b8071aa9f85b456a827d 3871604dc152119a917f44ab900d21dda9c9e7b2 8f3889d02a07de7954a56835d08b78af87453ef5 0093c618b7194c38e779d4072279ecf64debeb9c 25e4d4331eb0beb7e7b173a0564b8a8f05fa255a af88e5124a93c5c2d9ffb8585f805f27ba027b6c 0e4f4c962fe574810973946ad839bfa8f6f67080 7b776580680e2e45e11dc8708aa4b46d7e3ef033 8485c9cb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [25:22:3e:71:9b:7d:e4:4f:ce:7d:dc:47:c5:e7:ce:07:ad:f0:1c:10] modulus: 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 public exponent: 10001 ] 2022-05-24 12:00:07.283  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-24 12:00:07.285 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-24 12:00:07.289 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-24 12:00:07.290 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 12:00:07.291  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-24 12:00:07.292  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-24 12:00:07.293  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-24 12:00:07.293 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-24 12:00:07.293 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-24 12:00:07.302 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-24 12:00:07.315 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-24 12:00:07.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:00:07.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:00:07.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:00:07.465  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-24 12:00:07.466  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-24 12:00:07.466 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-24 12:00:07.467 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:00:07.470  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-24 12:00:07.470  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-24 12:00:07.471 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:00:07.471 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:00:07.471 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:00:07.476 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:00:07.476 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:00:07.476 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:00:07.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:00:07.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:00:07.478 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:00:07.479 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 12:00:07.483 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69439209368930756307476909643009018678627485205 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:56:43 UTC 2022 Final Date: Sun May 23 10:56:42 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [09:23:d8:04:f4:cd:d9:84:19:da:07:8d:c2:aa:27:cb:5e:e1:5d:6f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b926f4ae7a24083de5bb332cee3f2d583c60ec44 ff759c872598bf67111421c614e812f8ab8a74a3 cec1fd780601fa7f1fa911a90de79151cb9d8583 eea4d9d15d7d0bb2ad6eef4d9b7f7faf3dbfbb8b 2524533cc546b1f631d7445f8a498d87d50185f7 3ab2a6fc1ff32cfa4897190f2a3b28a17dd5a1ee 5b78ffa8bc4353c586d0465070d5250014d9e379 c9aa35b0386dbf8832ea1279f3037a179ba5b94e ddf233e6316fc5a411c100aee19e19644197641c eda166c1d27e2a2acc7e38b66ce4ea0fecaafd15 cf836b50b1ccc794a415b269b692dcdd837ad1ee 5d7497763c2f0f62b8b9b8071aa9f85b456a827d 3871604dc152119a917f44ab900d21dda9c9e7b2 8f3889d02a07de7954a56835d08b78af87453ef5 0093c618b7194c38e779d4072279ecf64debeb9c 25e4d4331eb0beb7e7b173a0564b8a8f05fa255a af88e5124a93c5c2d9ffb8585f805f27ba027b6c 0e4f4c962fe574810973946ad839bfa8f6f67080 7b776580680e2e45e11dc8708aa4b46d7e3ef033 8485c9cb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:99:2a:77:57:35:8a:73:78:2e:5a:a3:63:80:41:5b:43:61:c9:29] modulus: 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 public exponent: 10001 ] 2022-05-24 12:01:24.914  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-24 12:01:24.916 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-24 12:01:24.918 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-24 12:01:24.919 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 12:01:24.920  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-24 12:01:24.922  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-24 12:01:24.923  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-24 12:01:24.924 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-24 12:01:24.925 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-24 12:01:24.926 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-24 12:01:24.934 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-24 12:01:24.935 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:01:24.935 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:01:24.936 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:01:25.096  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-24 12:01:25.097  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-24 12:01:25.098 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-24 12:01:25.098 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:01:25.100  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-24 12:01:25.100  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-24 12:01:25.101 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:01:25.101 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:01:25.102 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:01:25.103 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:01:25.103 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:01:25.104 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:01:25.104 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:01:25.105 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:01:25.105 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:01:25.106 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 12:01:25.110 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69439209368930756307476909643009018678627485205 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:56:43 UTC 2022 Final Date: Sun May 23 10:56:42 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [09:23:d8:04:f4:cd:d9:84:19:da:07:8d:c2:aa:27:cb:5e:e1:5d:6f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b926f4ae7a24083de5bb332cee3f2d583c60ec44 ff759c872598bf67111421c614e812f8ab8a74a3 cec1fd780601fa7f1fa911a90de79151cb9d8583 eea4d9d15d7d0bb2ad6eef4d9b7f7faf3dbfbb8b 2524533cc546b1f631d7445f8a498d87d50185f7 3ab2a6fc1ff32cfa4897190f2a3b28a17dd5a1ee 5b78ffa8bc4353c586d0465070d5250014d9e379 c9aa35b0386dbf8832ea1279f3037a179ba5b94e ddf233e6316fc5a411c100aee19e19644197641c eda166c1d27e2a2acc7e38b66ce4ea0fecaafd15 cf836b50b1ccc794a415b269b692dcdd837ad1ee 5d7497763c2f0f62b8b9b8071aa9f85b456a827d 3871604dc152119a917f44ab900d21dda9c9e7b2 8f3889d02a07de7954a56835d08b78af87453ef5 0093c618b7194c38e779d4072279ecf64debeb9c 25e4d4331eb0beb7e7b173a0564b8a8f05fa255a af88e5124a93c5c2d9ffb8585f805f27ba027b6c 0e4f4c962fe574810973946ad839bfa8f6f67080 7b776580680e2e45e11dc8708aa4b46d7e3ef033 8485c9cb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c5:53:26:58:14:cb:b6:8a:75:61:50:1e:b3:77:fb:18:c4:e0:0e:ec] modulus: 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 public exponent: 10001 ] 2022-05-24 12:03:31.425  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-24 12:03:31.428 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-24 12:03:31.430 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:03:31.431 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 12:03:31.432  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:03:31.433  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-24 12:03:31.434  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-24 12:03:31.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-24 12:03:31.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-24 12:03:31.436 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-24 12:03:31.442 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-24 12:03:31.443 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:03:31.443 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:03:31.444 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:03:31.582  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-24 12:03:31.583  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-24 12:03:31.584 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-24 12:03:31.584 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:03:31.586  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-24 12:03:31.587  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-24 12:03:31.588 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:03:31.588 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:03:31.588 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:03:31.589 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:03:31.590 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:03:31.590 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:03:31.591 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:03:31.592 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:03:31.592 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:03:31.593 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 12:03:31.597 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69439209368930756307476909643009018678627485205 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:56:43 UTC 2022 Final Date: Sun May 23 10:56:42 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [09:23:d8:04:f4:cd:d9:84:19:da:07:8d:c2:aa:27:cb:5e:e1:5d:6f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b926f4ae7a24083de5bb332cee3f2d583c60ec44 ff759c872598bf67111421c614e812f8ab8a74a3 cec1fd780601fa7f1fa911a90de79151cb9d8583 eea4d9d15d7d0bb2ad6eef4d9b7f7faf3dbfbb8b 2524533cc546b1f631d7445f8a498d87d50185f7 3ab2a6fc1ff32cfa4897190f2a3b28a17dd5a1ee 5b78ffa8bc4353c586d0465070d5250014d9e379 c9aa35b0386dbf8832ea1279f3037a179ba5b94e ddf233e6316fc5a411c100aee19e19644197641c eda166c1d27e2a2acc7e38b66ce4ea0fecaafd15 cf836b50b1ccc794a415b269b692dcdd837ad1ee 5d7497763c2f0f62b8b9b8071aa9f85b456a827d 3871604dc152119a917f44ab900d21dda9c9e7b2 8f3889d02a07de7954a56835d08b78af87453ef5 0093c618b7194c38e779d4072279ecf64debeb9c 25e4d4331eb0beb7e7b173a0564b8a8f05fa255a af88e5124a93c5c2d9ffb8585f805f27ba027b6c 0e4f4c962fe574810973946ad839bfa8f6f67080 7b776580680e2e45e11dc8708aa4b46d7e3ef033 8485c9cb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [27:5f:e1:a9:15:24:b0:2a:4d:02:20:c3:ef:94:5e:3f:69:8c:51:41] modulus: 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 public exponent: 10001 ] 2022-05-24 12:07:05.308  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-24 12:07:05.312 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-24 12:07:05.315 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:07:05.316 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 12:07:05.318  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:07:05.319  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-24 12:07:05.319  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-24 12:07:05.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-24 12:07:05.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-24 12:07:05.321 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-24 12:07:05.328 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-24 12:07:05.329 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:07:05.330 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:07:05.330 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:07:05.460  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-24 12:07:05.461  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-24 12:07:05.462 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-24 12:07:05.462 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:07:05.464  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-24 12:07:05.464  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-24 12:07:05.465 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:07:05.465 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:07:05.466 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:07:05.466 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:07:05.467 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:07:05.467 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:07:05.468 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:07:05.468 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:07:05.469 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:07:05.470 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 12:07:05.474 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69439209368930756307476909643009018678627485205 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:56:43 UTC 2022 Final Date: Sun May 23 10:56:42 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [09:23:d8:04:f4:cd:d9:84:19:da:07:8d:c2:aa:27:cb:5e:e1:5d:6f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b926f4ae7a24083de5bb332cee3f2d583c60ec44 ff759c872598bf67111421c614e812f8ab8a74a3 cec1fd780601fa7f1fa911a90de79151cb9d8583 eea4d9d15d7d0bb2ad6eef4d9b7f7faf3dbfbb8b 2524533cc546b1f631d7445f8a498d87d50185f7 3ab2a6fc1ff32cfa4897190f2a3b28a17dd5a1ee 5b78ffa8bc4353c586d0465070d5250014d9e379 c9aa35b0386dbf8832ea1279f3037a179ba5b94e ddf233e6316fc5a411c100aee19e19644197641c eda166c1d27e2a2acc7e38b66ce4ea0fecaafd15 cf836b50b1ccc794a415b269b692dcdd837ad1ee 5d7497763c2f0f62b8b9b8071aa9f85b456a827d 3871604dc152119a917f44ab900d21dda9c9e7b2 8f3889d02a07de7954a56835d08b78af87453ef5 0093c618b7194c38e779d4072279ecf64debeb9c 25e4d4331eb0beb7e7b173a0564b8a8f05fa255a af88e5124a93c5c2d9ffb8585f805f27ba027b6c 0e4f4c962fe574810973946ad839bfa8f6f67080 7b776580680e2e45e11dc8708aa4b46d7e3ef033 8485c9cb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f9:8e:e1:40:1e:21:79:e4:aa:d9:b5:49:7f:68:ac:a7:d9:89:b1:0c] modulus: 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 public exponent: 10001 ] 2022-05-24 12:11:35.235  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-24 12:11:35.239 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-24 12:11:35.242 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:11:35.243 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 12:11:35.244  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:11:35.245  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-24 12:11:35.247  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-24 12:11:35.247 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-24 12:11:35.248 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-24 12:11:35.250 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-24 12:11:35.258 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-24 12:11:35.260 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:11:35.261 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:11:35.261 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:11:35.435  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-24 12:11:35.437  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-24 12:11:35.438 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-24 12:11:35.439 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:11:35.446  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-24 12:11:35.448  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-24 12:11:35.450 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:11:35.451 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:11:35.451 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:11:35.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:11:35.455 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:11:35.457 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:11:35.459 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:11:35.459 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:11:35.460 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:11:35.462 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 12:11:35.470 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69439209368930756307476909643009018678627485205 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:56:43 UTC 2022 Final Date: Sun May 23 10:56:42 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [09:23:d8:04:f4:cd:d9:84:19:da:07:8d:c2:aa:27:cb:5e:e1:5d:6f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b926f4ae7a24083de5bb332cee3f2d583c60ec44 ff759c872598bf67111421c614e812f8ab8a74a3 cec1fd780601fa7f1fa911a90de79151cb9d8583 eea4d9d15d7d0bb2ad6eef4d9b7f7faf3dbfbb8b 2524533cc546b1f631d7445f8a498d87d50185f7 3ab2a6fc1ff32cfa4897190f2a3b28a17dd5a1ee 5b78ffa8bc4353c586d0465070d5250014d9e379 c9aa35b0386dbf8832ea1279f3037a179ba5b94e ddf233e6316fc5a411c100aee19e19644197641c eda166c1d27e2a2acc7e38b66ce4ea0fecaafd15 cf836b50b1ccc794a415b269b692dcdd837ad1ee 5d7497763c2f0f62b8b9b8071aa9f85b456a827d 3871604dc152119a917f44ab900d21dda9c9e7b2 8f3889d02a07de7954a56835d08b78af87453ef5 0093c618b7194c38e779d4072279ecf64debeb9c 25e4d4331eb0beb7e7b173a0564b8a8f05fa255a af88e5124a93c5c2d9ffb8585f805f27ba027b6c 0e4f4c962fe574810973946ad839bfa8f6f67080 7b776580680e2e45e11dc8708aa4b46d7e3ef033 8485c9cb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [64:3e:7a:8a:84:25:47:88:d4:6a:40:d0:48:95:ef:95:b1:5d:7a:42] modulus: b78f32d1430163ae80410713cd23af0273226b3658531eb1d1402e1bcffbce5295ffcbd56743986d9cb100905402973215b9f479cf06c10c338b3d13d990493bc0ca4207dfbd4a047dd7596b0773138397c3624a95c8fcfade1e25b25e07731861845625eafa6c68960c0668e10d7b1a1a9b899fdce823265d632afef8edf11420aa849a6f3f7a6e734b935765bd0999f3624b707d3274ee12357605f42d68878ee1c6f13b516221a928ada5070c54c54a660635c58838d1311ade32e9ee6a139393ed2db1150bf5ddcc15ac5c004af99cec85185afb48ade8954d6348860528d46d49d5f79f6082cfce53a78e2fcfd6b12daa92710c7d08b708304ec21793db public exponent: 10001 ] 2022-05-24 12:15:19.650  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-24 12:15:19.652 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-24 12:15:19.653 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:15:19.654 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 12:15:19.655  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:15:19.656  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-24 12:15:19.656  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-24 12:15:19.657 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-24 12:15:19.657 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-24 12:15:19.658 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-24 12:15:19.663 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-24 12:15:19.664 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:15:19.664 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:15:19.665 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:15:19.793  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-24 12:15:19.794  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-24 12:15:19.795 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-24 12:15:19.795 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:15:19.797  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-24 12:15:19.797  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-24 12:15:19.798 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:15:19.798 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:15:19.798 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:15:19.799 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:15:19.799 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:15:19.800 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:15:19.801 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:15:19.801 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:15:19.801 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:15:19.802 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 12:15:19.806 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69439209368930756307476909643009018678627485205 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:56:43 UTC 2022 Final Date: Sun May 23 10:56:42 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [09:23:d8:04:f4:cd:d9:84:19:da:07:8d:c2:aa:27:cb:5e:e1:5d:6f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b926f4ae7a24083de5bb332cee3f2d583c60ec44 ff759c872598bf67111421c614e812f8ab8a74a3 cec1fd780601fa7f1fa911a90de79151cb9d8583 eea4d9d15d7d0bb2ad6eef4d9b7f7faf3dbfbb8b 2524533cc546b1f631d7445f8a498d87d50185f7 3ab2a6fc1ff32cfa4897190f2a3b28a17dd5a1ee 5b78ffa8bc4353c586d0465070d5250014d9e379 c9aa35b0386dbf8832ea1279f3037a179ba5b94e ddf233e6316fc5a411c100aee19e19644197641c eda166c1d27e2a2acc7e38b66ce4ea0fecaafd15 cf836b50b1ccc794a415b269b692dcdd837ad1ee 5d7497763c2f0f62b8b9b8071aa9f85b456a827d 3871604dc152119a917f44ab900d21dda9c9e7b2 8f3889d02a07de7954a56835d08b78af87453ef5 0093c618b7194c38e779d4072279ecf64debeb9c 25e4d4331eb0beb7e7b173a0564b8a8f05fa255a af88e5124a93c5c2d9ffb8585f805f27ba027b6c 0e4f4c962fe574810973946ad839bfa8f6f67080 7b776580680e2e45e11dc8708aa4b46d7e3ef033 8485c9cb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [db:d2:15:ca:9f:1f:d6:3b:50:5a:5d:7f:31:8c:7d:e5:ec:6f:20:72] modulus: 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 public exponent: 10001 ] 2022-05-24 12:19:11.292  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-24 12:19:11.295 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-24 12:19:11.298 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:19:11.299 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 12:19:11.300  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:19:11.301  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-24 12:19:11.302  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-24 12:19:11.302 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-24 12:19:11.303 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-24 12:19:11.303 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-24 12:19:11.309 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-24 12:19:11.310 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:19:11.310 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:19:11.310 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:19:11.433  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-24 12:19:11.434  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-24 12:19:11.435 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-24 12:19:11.436 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:19:11.438  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-24 12:19:11.438  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-24 12:19:11.439 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:19:11.440 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:19:11.440 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:19:11.442 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:19:11.442 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:19:11.442 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:19:11.443 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:19:11.444 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:19:11.444 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:19:11.445 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 12:19:11.450 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69439209368930756307476909643009018678627485205 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:56:43 UTC 2022 Final Date: Sun May 23 10:56:42 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [09:23:d8:04:f4:cd:d9:84:19:da:07:8d:c2:aa:27:cb:5e:e1:5d:6f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b926f4ae7a24083de5bb332cee3f2d583c60ec44 ff759c872598bf67111421c614e812f8ab8a74a3 cec1fd780601fa7f1fa911a90de79151cb9d8583 eea4d9d15d7d0bb2ad6eef4d9b7f7faf3dbfbb8b 2524533cc546b1f631d7445f8a498d87d50185f7 3ab2a6fc1ff32cfa4897190f2a3b28a17dd5a1ee 5b78ffa8bc4353c586d0465070d5250014d9e379 c9aa35b0386dbf8832ea1279f3037a179ba5b94e ddf233e6316fc5a411c100aee19e19644197641c eda166c1d27e2a2acc7e38b66ce4ea0fecaafd15 cf836b50b1ccc794a415b269b692dcdd837ad1ee 5d7497763c2f0f62b8b9b8071aa9f85b456a827d 3871604dc152119a917f44ab900d21dda9c9e7b2 8f3889d02a07de7954a56835d08b78af87453ef5 0093c618b7194c38e779d4072279ecf64debeb9c 25e4d4331eb0beb7e7b173a0564b8a8f05fa255a af88e5124a93c5c2d9ffb8585f805f27ba027b6c 0e4f4c962fe574810973946ad839bfa8f6f67080 7b776580680e2e45e11dc8708aa4b46d7e3ef033 8485c9cb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [44:12:eb:67:78:1e:ec:67:db:70:7b:86:54:fd:88:73:d9:f7:be:65] modulus: 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 public exponent: 10001 ] 2022-05-24 12:20:47.734  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-24 12:20:47.736 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-24 12:20:47.737 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:20:47.738 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 12:20:47.738  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:20:47.739  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-24 12:20:47.739  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-24 12:20:47.740 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-24 12:20:47.740 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-24 12:20:47.742 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-24 12:20:47.747 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-24 12:20:47.748 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:20:47.748 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:20:47.748 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:20:47.913  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-24 12:20:47.914  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-24 12:20:47.914 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-24 12:20:47.914 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:20:47.916  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-24 12:20:47.916  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-24 12:20:47.917 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:20:47.917 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:20:47.917 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:20:47.918 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:20:47.918 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:20:47.919 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:20:47.919 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:20:47.920 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:20:47.920 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:20:47.921 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 12:20:47.924 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69439209368930756307476909643009018678627485205 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:56:43 UTC 2022 Final Date: Sun May 23 10:56:42 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [09:23:d8:04:f4:cd:d9:84:19:da:07:8d:c2:aa:27:cb:5e:e1:5d:6f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b926f4ae7a24083de5bb332cee3f2d583c60ec44 ff759c872598bf67111421c614e812f8ab8a74a3 cec1fd780601fa7f1fa911a90de79151cb9d8583 eea4d9d15d7d0bb2ad6eef4d9b7f7faf3dbfbb8b 2524533cc546b1f631d7445f8a498d87d50185f7 3ab2a6fc1ff32cfa4897190f2a3b28a17dd5a1ee 5b78ffa8bc4353c586d0465070d5250014d9e379 c9aa35b0386dbf8832ea1279f3037a179ba5b94e ddf233e6316fc5a411c100aee19e19644197641c eda166c1d27e2a2acc7e38b66ce4ea0fecaafd15 cf836b50b1ccc794a415b269b692dcdd837ad1ee 5d7497763c2f0f62b8b9b8071aa9f85b456a827d 3871604dc152119a917f44ab900d21dda9c9e7b2 8f3889d02a07de7954a56835d08b78af87453ef5 0093c618b7194c38e779d4072279ecf64debeb9c 25e4d4331eb0beb7e7b173a0564b8a8f05fa255a af88e5124a93c5c2d9ffb8585f805f27ba027b6c 0e4f4c962fe574810973946ad839bfa8f6f67080 7b776580680e2e45e11dc8708aa4b46d7e3ef033 8485c9cb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4f:f1:58:38:67:39:6f:0d:a6:87:2c:47:37:c4:b2:a0:76:9a:f1:4d] modulus: fbf639e2a02e328a6c5d105ab6c6f718b979799203b5be4a3ce6c2d75242720b89a2bca3c5eca55c1da3c787b9d5161306fac39b2a10ddef958c242d58fc9abb2435530976cdcec48cc84e83e0d87d33bb1b18e8596b490d6aed2e2a801f5940ba9459d2a797a69998f24b36d90e0b65e3cb00c7132a4e68ea4b7d656553ccd7801926a6f7213b356ad7541ff69544557b300da9e2e16262b0db60f0099c8f9c4c426ab87de273ba9744c1f5cd702d86a25f56ec094073e2493c8fd9501ecc52f4b6a61253847b7abb43c4f77765d71e7cc93b71db6f35bc2d862440c8ae8351bf031c1b781c25f1c5aaa97bc041b11cf4578b2fd49a45df25d0fc176af594cf public exponent: 10001 ] 2022-05-24 12:22:24.973  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-24 12:22:24.975 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-24 12:22:24.977 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-24 12:22:24.978 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 12:22:24.978  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-24 12:22:24.979  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-24 12:22:24.979  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-24 12:22:24.980 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-24 12:22:24.980 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-24 12:22:24.981 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-24 12:22:24.985 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-24 12:22:24.986 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:22:24.986 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:22:24.987 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:22:25.150  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-24 12:22:25.151  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-24 12:22:25.152 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-24 12:22:25.152 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:22:25.153  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-24 12:22:25.154  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-24 12:22:25.154 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:22:25.154 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:22:25.155 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:22:25.155 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:22:25.156 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:22:25.156 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:22:25.157 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:22:25.157 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:22:25.157 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:22:25.158 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 12:22:25.166 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69439209368930756307476909643009018678627485205 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:56:43 UTC 2022 Final Date: Sun May 23 10:56:42 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [09:23:d8:04:f4:cd:d9:84:19:da:07:8d:c2:aa:27:cb:5e:e1:5d:6f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b926f4ae7a24083de5bb332cee3f2d583c60ec44 ff759c872598bf67111421c614e812f8ab8a74a3 cec1fd780601fa7f1fa911a90de79151cb9d8583 eea4d9d15d7d0bb2ad6eef4d9b7f7faf3dbfbb8b 2524533cc546b1f631d7445f8a498d87d50185f7 3ab2a6fc1ff32cfa4897190f2a3b28a17dd5a1ee 5b78ffa8bc4353c586d0465070d5250014d9e379 c9aa35b0386dbf8832ea1279f3037a179ba5b94e ddf233e6316fc5a411c100aee19e19644197641c eda166c1d27e2a2acc7e38b66ce4ea0fecaafd15 cf836b50b1ccc794a415b269b692dcdd837ad1ee 5d7497763c2f0f62b8b9b8071aa9f85b456a827d 3871604dc152119a917f44ab900d21dda9c9e7b2 8f3889d02a07de7954a56835d08b78af87453ef5 0093c618b7194c38e779d4072279ecf64debeb9c 25e4d4331eb0beb7e7b173a0564b8a8f05fa255a af88e5124a93c5c2d9ffb8585f805f27ba027b6c 0e4f4c962fe574810973946ad839bfa8f6f67080 7b776580680e2e45e11dc8708aa4b46d7e3ef033 8485c9cb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:b9:62:a5:5d:6d:1e:df:0a:b7:83:b4:53:a0:d4:bf:d1:ad:b7:14] modulus: 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 public exponent: 10001 ] 2022-05-24 12:24:28.264  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-24 12:24:28.265 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-24 12:24:28.267 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:24:28.267 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 12:24:28.268  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:24:28.268  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-24 12:24:28.268  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-24 12:24:28.269 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-24 12:24:28.269 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-24 12:24:28.269 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-24 12:24:28.274 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-24 12:24:28.275 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:24:28.275 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:24:28.275 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:24:28.420  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-24 12:24:28.421  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-24 12:24:28.422 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-24 12:24:28.422 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:24:28.424  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-24 12:24:28.425  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-24 12:24:28.425 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:24:28.425 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:24:28.426 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:24:28.427 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:24:28.427 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:24:28.427 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:24:28.428 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:24:28.429 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:24:28.429 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:24:28.431 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 12:24:28.436 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69439209368930756307476909643009018678627485205 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:56:43 UTC 2022 Final Date: Sun May 23 10:56:42 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [09:23:d8:04:f4:cd:d9:84:19:da:07:8d:c2:aa:27:cb:5e:e1:5d:6f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b926f4ae7a24083de5bb332cee3f2d583c60ec44 ff759c872598bf67111421c614e812f8ab8a74a3 cec1fd780601fa7f1fa911a90de79151cb9d8583 eea4d9d15d7d0bb2ad6eef4d9b7f7faf3dbfbb8b 2524533cc546b1f631d7445f8a498d87d50185f7 3ab2a6fc1ff32cfa4897190f2a3b28a17dd5a1ee 5b78ffa8bc4353c586d0465070d5250014d9e379 c9aa35b0386dbf8832ea1279f3037a179ba5b94e ddf233e6316fc5a411c100aee19e19644197641c eda166c1d27e2a2acc7e38b66ce4ea0fecaafd15 cf836b50b1ccc794a415b269b692dcdd837ad1ee 5d7497763c2f0f62b8b9b8071aa9f85b456a827d 3871604dc152119a917f44ab900d21dda9c9e7b2 8f3889d02a07de7954a56835d08b78af87453ef5 0093c618b7194c38e779d4072279ecf64debeb9c 25e4d4331eb0beb7e7b173a0564b8a8f05fa255a af88e5124a93c5c2d9ffb8585f805f27ba027b6c 0e4f4c962fe574810973946ad839bfa8f6f67080 7b776580680e2e45e11dc8708aa4b46d7e3ef033 8485c9cb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [22:40:5c:d8:b3:d8:d4:a6:a4:64:c0:d6:6e:ea:42:30:94:75:8e:07] modulus: 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 public exponent: 10001 ] 2022-05-24 12:26:42.814  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-24 12:26:42.817 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-24 12:26:42.820 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-24 12:26:42.821 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 12:26:42.822  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-24 12:26:42.823  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-24 12:26:42.823  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-24 12:26:42.824 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-24 12:26:42.824 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-24 12:26:42.825 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-24 12:26:42.831 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-24 12:26:42.832 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:26:42.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:26:42.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:26:42.988  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-24 12:26:42.992  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-24 12:26:42.993 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-24 12:26:42.993 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:26:43.002  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-24 12:26:43.005  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-24 12:26:43.006 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:26:43.006 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:26:43.006 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:26:43.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:26:43.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:26:43.008 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:26:43.008 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:26:43.009 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:26:43.009 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:26:43.010 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 12:26:43.014 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69439209368930756307476909643009018678627485205 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:56:43 UTC 2022 Final Date: Sun May 23 10:56:42 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [09:23:d8:04:f4:cd:d9:84:19:da:07:8d:c2:aa:27:cb:5e:e1:5d:6f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b926f4ae7a24083de5bb332cee3f2d583c60ec44 ff759c872598bf67111421c614e812f8ab8a74a3 cec1fd780601fa7f1fa911a90de79151cb9d8583 eea4d9d15d7d0bb2ad6eef4d9b7f7faf3dbfbb8b 2524533cc546b1f631d7445f8a498d87d50185f7 3ab2a6fc1ff32cfa4897190f2a3b28a17dd5a1ee 5b78ffa8bc4353c586d0465070d5250014d9e379 c9aa35b0386dbf8832ea1279f3037a179ba5b94e ddf233e6316fc5a411c100aee19e19644197641c eda166c1d27e2a2acc7e38b66ce4ea0fecaafd15 cf836b50b1ccc794a415b269b692dcdd837ad1ee 5d7497763c2f0f62b8b9b8071aa9f85b456a827d 3871604dc152119a917f44ab900d21dda9c9e7b2 8f3889d02a07de7954a56835d08b78af87453ef5 0093c618b7194c38e779d4072279ecf64debeb9c 25e4d4331eb0beb7e7b173a0564b8a8f05fa255a af88e5124a93c5c2d9ffb8585f805f27ba027b6c 0e4f4c962fe574810973946ad839bfa8f6f67080 7b776580680e2e45e11dc8708aa4b46d7e3ef033 8485c9cb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [15:2d:cc:6a:04:d6:92:3c:fa:7e:d1:86:88:a2:05:56:f0:81:47:bf] modulus: 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 public exponent: 10001 ] 2022-05-24 12:26:57.295  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-24 12:26:57.297 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-24 12:26:57.299 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-24 12:26:57.300 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 12:26:57.301  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-24 12:26:57.301  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-24 12:26:57.302  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-24 12:26:57.302 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-24 12:26:57.303 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-24 12:26:57.303 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-24 12:26:57.311 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-24 12:26:57.312 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:26:57.312 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:26:57.313 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:26:57.437  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-24 12:26:57.438  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-24 12:26:57.438 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-24 12:26:57.438 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:26:57.441  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-24 12:26:57.441  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-24 12:26:57.441 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:26:57.442 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:26:57.442 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:26:57.443 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:26:57.443 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:26:57.444 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:26:57.445 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:26:57.445 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:26:57.446 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:26:57.446 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 12:26:57.450 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69439209368930756307476909643009018678627485205 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:56:43 UTC 2022 Final Date: Sun May 23 10:56:42 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [09:23:d8:04:f4:cd:d9:84:19:da:07:8d:c2:aa:27:cb:5e:e1:5d:6f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b926f4ae7a24083de5bb332cee3f2d583c60ec44 ff759c872598bf67111421c614e812f8ab8a74a3 cec1fd780601fa7f1fa911a90de79151cb9d8583 eea4d9d15d7d0bb2ad6eef4d9b7f7faf3dbfbb8b 2524533cc546b1f631d7445f8a498d87d50185f7 3ab2a6fc1ff32cfa4897190f2a3b28a17dd5a1ee 5b78ffa8bc4353c586d0465070d5250014d9e379 c9aa35b0386dbf8832ea1279f3037a179ba5b94e ddf233e6316fc5a411c100aee19e19644197641c eda166c1d27e2a2acc7e38b66ce4ea0fecaafd15 cf836b50b1ccc794a415b269b692dcdd837ad1ee 5d7497763c2f0f62b8b9b8071aa9f85b456a827d 3871604dc152119a917f44ab900d21dda9c9e7b2 8f3889d02a07de7954a56835d08b78af87453ef5 0093c618b7194c38e779d4072279ecf64debeb9c 25e4d4331eb0beb7e7b173a0564b8a8f05fa255a af88e5124a93c5c2d9ffb8585f805f27ba027b6c 0e4f4c962fe574810973946ad839bfa8f6f67080 7b776580680e2e45e11dc8708aa4b46d7e3ef033 8485c9cb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b1:f4:88:67:70:51:2e:43:24:94:18:dd:b2:50:6a:81:a9:59:fe:7e] modulus: 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 public exponent: 10001 ] 2022-05-24 12:28:59.322  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-24 12:28:59.323 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-24 12:28:59.325 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:28:59.325 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 12:28:59.326  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:28:59.326  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-24 12:28:59.327  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-24 12:28:59.327 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-24 12:28:59.327 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-24 12:28:59.328 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-24 12:28:59.333 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-24 12:28:59.334 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:28:59.334 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:28:59.334 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:28:59.469  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-24 12:28:59.470  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-24 12:28:59.470 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-24 12:28:59.470 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:28:59.472  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-24 12:28:59.472  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-24 12:28:59.472 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:28:59.473 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:28:59.473 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:28:59.473 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:28:59.474 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:28:59.474 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:28:59.474 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:28:59.475 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:28:59.475 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:28:59.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 12:28:59.479 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69439209368930756307476909643009018678627485205 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:56:43 UTC 2022 Final Date: Sun May 23 10:56:42 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [09:23:d8:04:f4:cd:d9:84:19:da:07:8d:c2:aa:27:cb:5e:e1:5d:6f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b926f4ae7a24083de5bb332cee3f2d583c60ec44 ff759c872598bf67111421c614e812f8ab8a74a3 cec1fd780601fa7f1fa911a90de79151cb9d8583 eea4d9d15d7d0bb2ad6eef4d9b7f7faf3dbfbb8b 2524533cc546b1f631d7445f8a498d87d50185f7 3ab2a6fc1ff32cfa4897190f2a3b28a17dd5a1ee 5b78ffa8bc4353c586d0465070d5250014d9e379 c9aa35b0386dbf8832ea1279f3037a179ba5b94e ddf233e6316fc5a411c100aee19e19644197641c eda166c1d27e2a2acc7e38b66ce4ea0fecaafd15 cf836b50b1ccc794a415b269b692dcdd837ad1ee 5d7497763c2f0f62b8b9b8071aa9f85b456a827d 3871604dc152119a917f44ab900d21dda9c9e7b2 8f3889d02a07de7954a56835d08b78af87453ef5 0093c618b7194c38e779d4072279ecf64debeb9c 25e4d4331eb0beb7e7b173a0564b8a8f05fa255a af88e5124a93c5c2d9ffb8585f805f27ba027b6c 0e4f4c962fe574810973946ad839bfa8f6f67080 7b776580680e2e45e11dc8708aa4b46d7e3ef033 8485c9cb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:ec:6c:ec:84:ef:51:ae:8b:26:b8:cb:90:9d:3f:e6:2f:30:12:46] modulus: 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 public exponent: 10001 ] 2022-05-24 12:33:04.195  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-24 12:33:04.196 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-24 12:33:04.198 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:33:04.198 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 12:33:04.199  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:33:04.199  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-24 12:33:04.206  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-24 12:33:04.218 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-24 12:33:04.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-24 12:33:04.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-24 12:33:04.225 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-24 12:33:04.226 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:33:04.227 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-24 12:33:04.227 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:33:04.391  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-24 12:33:04.392  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-24 12:33:04.392 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-24 12:33:04.393 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:33:04.394  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-24 12:33:04.394  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-24 12:33:04.395 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:33:04.395 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:33:04.396 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:33:04.397 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:33:04.397 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:33:04.397 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:33:04.399 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:33:04.399 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:33:04.400 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:33:04.401 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 12:33:04.409 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69439209368930756307476909643009018678627485205 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:56:43 UTC 2022 Final Date: Sun May 23 10:56:42 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [09:23:d8:04:f4:cd:d9:84:19:da:07:8d:c2:aa:27:cb:5e:e1:5d:6f] modulus: c70aa852da0a168c413337606a2ac803bbbae22fc3f1362a9b96807b62b024d63e4d2e6ec3e6d16b6e07a1bd27277523adc002a2010d0257b45dde34542e5afbaac72b78a4346bbd3030fce8da55f8eb2142781add18f8086e91be2df393cff47006803f988a50a5b194b5353ded2ba12b8c1157d8ad17cc7bae3d9163efb74c471680b83fb71818037eae2a142972a6073de53521259803b026ea5ce60836c42c670ac3df3dafacc433b968cfd5f1d7dfb2cb5f5c69856b1fcb6c31b9ab307e8822a698fcba4758925726696885fb6e9171af0f675ee70abfcb0ff55e8d023b44cf65bd2a09ad771843189d82bb6d7a17aec3f6f08942363bae7739712b5572bf47456e3452229ffc59c72b179173746139cbf65da75acbdd5a9edd6c5f1165f776be170361de570c2f901be303bcf0db95cc2551be0fb85be76a7f81b7f12b7ae55a142a7704a5d4448cc5fc2c0beab0f2932079b5fbf9316d3fbb9e90802af8a88e7af8f79c5e2a7ea0f9c217996b7e09bbf3248c48d67ab5499ed7e23365 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b926f4ae7a24083de5bb332cee3f2d583c60ec44 ff759c872598bf67111421c614e812f8ab8a74a3 cec1fd780601fa7f1fa911a90de79151cb9d8583 eea4d9d15d7d0bb2ad6eef4d9b7f7faf3dbfbb8b 2524533cc546b1f631d7445f8a498d87d50185f7 3ab2a6fc1ff32cfa4897190f2a3b28a17dd5a1ee 5b78ffa8bc4353c586d0465070d5250014d9e379 c9aa35b0386dbf8832ea1279f3037a179ba5b94e ddf233e6316fc5a411c100aee19e19644197641c eda166c1d27e2a2acc7e38b66ce4ea0fecaafd15 cf836b50b1ccc794a415b269b692dcdd837ad1ee 5d7497763c2f0f62b8b9b8071aa9f85b456a827d 3871604dc152119a917f44ab900d21dda9c9e7b2 8f3889d02a07de7954a56835d08b78af87453ef5 0093c618b7194c38e779d4072279ecf64debeb9c 25e4d4331eb0beb7e7b173a0564b8a8f05fa255a af88e5124a93c5c2d9ffb8585f805f27ba027b6c 0e4f4c962fe574810973946ad839bfa8f6f67080 7b776580680e2e45e11dc8708aa4b46d7e3ef033 8485c9cb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ef:b5:6f:2b:15:a4:05:ed:f8:34:0c:94:8b:ca:7a:3c:38:b1:69:a1] modulus: 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 public exponent: 10001 ]