2022-06-18 05:11:07,347 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-18 05:11:10,192 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-18 05:11:12.321  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jun 18, 2022 5:11:16 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 18, 2022 5:11:16 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 18, 2022 5:11:16 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 18, 2022 5:11:16 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-18 05:11:17.403 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-18 05:11:17.949  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-06-18 05:11:18.269  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-18 05:11:19.741 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-18 05:11:19.747 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-18 05:11:19.750 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-18 05:11:19.758 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-18 05:11:19.830 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-18 05:11:19.839 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-06-18 05:11:20.073 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-06-18 05:11:21.339 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 18, 2022 5:11:22 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-18 05:11:23.384  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 18.213 seconds (JVM running for 22.609) Jun 18, 2022 5:11:36 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-18 05:12:11.897  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-18 05:12:11.938 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-18 05:12:12.037 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-18 05:12:12.057 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-18 05:12:12.109  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-18 05:12:12.115  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-18 05:12:12.118  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-18 05:12:12.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 05:12:12.125 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 05:12:12.133 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 05:12:12.144 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-18 05:12:12.152 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-18 05:12:12.242 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-18 05:12:12.262 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 05:12:12.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 05:12:12.269 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 05:12:13.135  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-18 05:12:13.140  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-18 05:12:13.141 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-18 05:12:13.144 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 05:12:13.161  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-18 05:12:13.163  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-18 05:12:13.164 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 05:12:13.165 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 05:12:13.166 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 05:12:13.194 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 05:12:13.195 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 05:12:13.196 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 05:12:13.212 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 05:12:13.214 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 05:12:13.214 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 05:12:13.218 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-18 05:12:13.299 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 275058944418273362647737992161968215412570186337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 18 05:07:13 UTC 2022 Final Date: Thu Jun 17 05:07:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c7:d9:64:58:c3:44:61:61:98:0a:ff:57:d7:19:78:25:b1:1c:55:67] modulus: 830060dd9e8f2e1d02ea71c2c000163229f4dc7de5c0ad501363278a50b7c7c43edfce48ccf499252ce3514edf0c5d1e08ada856fc9d50ad5a31f4fed7acef978df1b0816e8b70f396b4e9622b72f6bab7bcd03516516449b070b92edcda5197e423e245f79c8d3fc9e69b49770099ecfcf8f3511aed0e1ee366b85a5dcd46865a5484238832bfd269c9a684436629f6f37a296369a4f48dac84c3f48ca676557fba3122aa0b2ef30a769684e5824de172ba8a116aed439d136d3cf49ed942e3b78baed9a6e5d916437bf78a925298bb6fb89d3e11935806a3fc1366b8080e72ae865cfff0bffd323ecf474dfc3793225b33948902294cb2b5a918d762b0180d945411f7a4e7030a8f38eac2f8554a575d980eae9a95cadc0fa0e0275f2d034654ead6abc7eeef38c28de02f63a783a858c6a05c7d80b689aa289391120acad61dfbdcdd631ddad7a6633b91422303f97ff5392358a2a190852cedec6b36da20f28022f6691c0bc2492361c153c5abeeee3c2aa3cf59af07a76ca0ce1d122b9f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62199fb375017271002e6c55e7e99de96716182d 8a111e8c36f1a2f0c15312bb2a1ed3c4006ba162 f13dd257137e3eb157b1fe385fc5c49e13a99a78 4556884ac6155f27141c6ddab23c9bccfffb46d4 65f16171ab68385fa0dee1ec5777ee8e0febca28 8c65c0153d6a152c4ae3c757b60f2348cc8dbebc a5f2ef697bb2450eb08d1182ee51a598f784ada7 a7d11058df4f86daae0991c30c157ffacbf0c393 d91b5a546b53cbdf6cb7bd251d2634a75ce16aa9 b70a4d929e9b5ed59845da870dace516c008bc21 bf4ece8c758dd26b75b50ec9f80df88b31f9609d 96362545e7bc0016f8e1891e8f6597180e3d2852 7059e84c7da796353d2a4e765b6592c512a4d8c6 721e92f19cbab8c319a691b80b324113b8e0bdff b7515d6367367a27eb3dba373632eadac9a188a3 dabe55b9066e06b94e6071dc7fee1917e5ca0c10 99bf3c4df20405ba2c7fdb5cc7a2f226c5504af1 67b84cc7ef22d9e5ced5d3f8e04fc4127d240a8e 4b7cb51d172d141b0b75c3538f71cc365e104970 247aa82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [07:9a:ce:35:09:7a:a1:92:b9:c6:29:e6:3f:a1:1c:ff:cd:82:90:8b] modulus: 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 public exponent: 10001 ] 2022-06-18 06:36:16.875  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-18 06:36:16.882 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-18 06:36:16.893 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 06:36:16.897 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-18 06:36:16.900  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 06:36:16.905  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-18 06:36:16.907  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-18 06:36:16.908 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 06:36:16.911 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-18 06:36:16.914 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-18 06:36:16.924 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-18 06:36:16.927 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 06:36:16.927 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 06:36:16.928 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 06:36:17.223  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-18 06:36:17.224  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-18 06:36:17.225 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-18 06:36:17.226 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 06:36:17.235  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-18 06:36:17.237  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-18 06:36:17.238 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:36:17.239 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:36:17.239 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:36:17.241 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:36:17.242 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:36:17.243 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:36:17.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:36:17.252 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:36:17.255 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:36:17.264 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-18 06:36:17.282 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 275058944418273362647737992161968215412570186337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 18 05:07:13 UTC 2022 Final Date: Thu Jun 17 05:07:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c7:d9:64:58:c3:44:61:61:98:0a:ff:57:d7:19:78:25:b1:1c:55:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62199fb375017271002e6c55e7e99de96716182d 8a111e8c36f1a2f0c15312bb2a1ed3c4006ba162 f13dd257137e3eb157b1fe385fc5c49e13a99a78 4556884ac6155f27141c6ddab23c9bccfffb46d4 65f16171ab68385fa0dee1ec5777ee8e0febca28 8c65c0153d6a152c4ae3c757b60f2348cc8dbebc a5f2ef697bb2450eb08d1182ee51a598f784ada7 a7d11058df4f86daae0991c30c157ffacbf0c393 d91b5a546b53cbdf6cb7bd251d2634a75ce16aa9 b70a4d929e9b5ed59845da870dace516c008bc21 bf4ece8c758dd26b75b50ec9f80df88b31f9609d 96362545e7bc0016f8e1891e8f6597180e3d2852 7059e84c7da796353d2a4e765b6592c512a4d8c6 721e92f19cbab8c319a691b80b324113b8e0bdff b7515d6367367a27eb3dba373632eadac9a188a3 dabe55b9066e06b94e6071dc7fee1917e5ca0c10 99bf3c4df20405ba2c7fdb5cc7a2f226c5504af1 67b84cc7ef22d9e5ced5d3f8e04fc4127d240a8e 4b7cb51d172d141b0b75c3538f71cc365e104970 247aa82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4e:79:de:b6:c7:14:de:2d:9a:f0:c5:22:08:db:72:fa:a8:35:85:9e] modulus: b45edb21d00404d09de9bbb2b165a21be19fe44123df042078efe25da9ff2ff9f4e332424bc94179ab63a428f36e7e47af85cea05578347592a3b0a1bfa48e96c39633fa43958090a1be97bb16b9456cb47c34c435ecbce30796a9200274d4e44263f24f4f7eed0e6ead695e2e102556bd6270206fa4fdb436c83deb964f81574756d84a65f6802892ff32291d3fed1be8f51d2786800511a01cdef03dab8987c848fced35c3db8289abcfd43a3fc1a6d841bb184f969a6a60a66fe0efb39900c0f5801c87e4148c91e8a65e2878962362921876968a3a82ab896c0da1ce2d9057e13598158c3a240dadf663c6266c5361dde5fb8a53b136eb1fc958b60119bf public exponent: 10001 ] 2022-06-18 06:39:17.716  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-18 06:39:17.718 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-18 06:39:17.722 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 06:39:17.725 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-18 06:39:17.726  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 06:39:17.730  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-18 06:39:17.731  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-18 06:39:17.735 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 06:39:17.736 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-18 06:39:17.738 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-18 06:39:17.767 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-18 06:39:17.770 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 06:39:17.771 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 06:39:17.772 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 06:39:17.980  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-18 06:39:17.981  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-18 06:39:17.982 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-18 06:39:17.983 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 06:39:17.990  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-18 06:39:17.991  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-18 06:39:17.992 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:39:17.992 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:39:17.992 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:39:17.994 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:39:17.994 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:39:17.995 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:39:17.997 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:39:17.997 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:39:17.998 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:39:18.001 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-18 06:39:18.009 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 275058944418273362647737992161968215412570186337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 18 05:07:13 UTC 2022 Final Date: Thu Jun 17 05:07:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c7:d9:64:58:c3:44:61:61:98:0a:ff:57:d7:19:78:25:b1:1c:55:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62199fb375017271002e6c55e7e99de96716182d 8a111e8c36f1a2f0c15312bb2a1ed3c4006ba162 f13dd257137e3eb157b1fe385fc5c49e13a99a78 4556884ac6155f27141c6ddab23c9bccfffb46d4 65f16171ab68385fa0dee1ec5777ee8e0febca28 8c65c0153d6a152c4ae3c757b60f2348cc8dbebc a5f2ef697bb2450eb08d1182ee51a598f784ada7 a7d11058df4f86daae0991c30c157ffacbf0c393 d91b5a546b53cbdf6cb7bd251d2634a75ce16aa9 b70a4d929e9b5ed59845da870dace516c008bc21 bf4ece8c758dd26b75b50ec9f80df88b31f9609d 96362545e7bc0016f8e1891e8f6597180e3d2852 7059e84c7da796353d2a4e765b6592c512a4d8c6 721e92f19cbab8c319a691b80b324113b8e0bdff b7515d6367367a27eb3dba373632eadac9a188a3 dabe55b9066e06b94e6071dc7fee1917e5ca0c10 99bf3c4df20405ba2c7fdb5cc7a2f226c5504af1 67b84cc7ef22d9e5ced5d3f8e04fc4127d240a8e 4b7cb51d172d141b0b75c3538f71cc365e104970 247aa82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2f:28:86:ed:d1:0a:b0:ef:ab:5b:81:08:d1:ae:eb:5e:03:c8:c0:9d] modulus: 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 public exponent: 10001 ] 2022-06-18 06:40:36.350  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-18 06:40:36.353 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-18 06:40:36.356 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-18 06:40:36.357 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-18 06:40:36.358  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-18 06:40:36.360  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-18 06:40:36.362  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-18 06:40:36.364 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 06:40:36.365 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-18 06:40:36.366 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-18 06:40:36.376 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-18 06:40:36.377 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 06:40:36.378 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 06:40:36.379 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 06:40:36.546  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-18 06:40:36.547  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-18 06:40:36.548 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-18 06:40:36.548 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 06:40:36.556  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-18 06:40:36.557  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-18 06:40:36.572 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:40:36.574 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:40:36.575 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:40:36.578 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:40:36.578 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:40:36.579 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:40:36.580 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:40:36.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:40:36.582 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:40:36.583 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-18 06:40:36.591 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 275058944418273362647737992161968215412570186337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 18 05:07:13 UTC 2022 Final Date: Thu Jun 17 05:07:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c7:d9:64:58:c3:44:61:61:98:0a:ff:57:d7:19:78:25:b1:1c:55:67] modulus: 830060dd9e8f2e1d02ea71c2c000163229f4dc7de5c0ad501363278a50b7c7c43edfce48ccf499252ce3514edf0c5d1e08ada856fc9d50ad5a31f4fed7acef978df1b0816e8b70f396b4e9622b72f6bab7bcd03516516449b070b92edcda5197e423e245f79c8d3fc9e69b49770099ecfcf8f3511aed0e1ee366b85a5dcd46865a5484238832bfd269c9a684436629f6f37a296369a4f48dac84c3f48ca676557fba3122aa0b2ef30a769684e5824de172ba8a116aed439d136d3cf49ed942e3b78baed9a6e5d916437bf78a925298bb6fb89d3e11935806a3fc1366b8080e72ae865cfff0bffd323ecf474dfc3793225b33948902294cb2b5a918d762b0180d945411f7a4e7030a8f38eac2f8554a575d980eae9a95cadc0fa0e0275f2d034654ead6abc7eeef38c28de02f63a783a858c6a05c7d80b689aa289391120acad61dfbdcdd631ddad7a6633b91422303f97ff5392358a2a190852cedec6b36da20f28022f6691c0bc2492361c153c5abeeee3c2aa3cf59af07a76ca0ce1d122b9f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62199fb375017271002e6c55e7e99de96716182d 8a111e8c36f1a2f0c15312bb2a1ed3c4006ba162 f13dd257137e3eb157b1fe385fc5c49e13a99a78 4556884ac6155f27141c6ddab23c9bccfffb46d4 65f16171ab68385fa0dee1ec5777ee8e0febca28 8c65c0153d6a152c4ae3c757b60f2348cc8dbebc a5f2ef697bb2450eb08d1182ee51a598f784ada7 a7d11058df4f86daae0991c30c157ffacbf0c393 d91b5a546b53cbdf6cb7bd251d2634a75ce16aa9 b70a4d929e9b5ed59845da870dace516c008bc21 bf4ece8c758dd26b75b50ec9f80df88b31f9609d 96362545e7bc0016f8e1891e8f6597180e3d2852 7059e84c7da796353d2a4e765b6592c512a4d8c6 721e92f19cbab8c319a691b80b324113b8e0bdff b7515d6367367a27eb3dba373632eadac9a188a3 dabe55b9066e06b94e6071dc7fee1917e5ca0c10 99bf3c4df20405ba2c7fdb5cc7a2f226c5504af1 67b84cc7ef22d9e5ced5d3f8e04fc4127d240a8e 4b7cb51d172d141b0b75c3538f71cc365e104970 247aa82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ae:73:b2:21:d8:bc:ad:2e:9f:8d:67:52:be:78:3b:95:19:cc:ff:50] modulus: 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 public exponent: 10001 ] 2022-06-18 06:43:03.542  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-18 06:43:03.545 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-18 06:43:03.548 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-18 06:43:03.549 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-18 06:43:03.549  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-18 06:43:03.571  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-18 06:43:03.572  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-18 06:43:03.573 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 06:43:03.573 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-18 06:43:03.574 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-18 06:43:03.592 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-18 06:43:03.594 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 06:43:03.594 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 06:43:03.595 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 06:43:03.818  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-18 06:43:03.819  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-18 06:43:03.820 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-18 06:43:03.820 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 06:43:03.826  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-18 06:43:03.827  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-18 06:43:03.828 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:43:03.828 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:43:03.829 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:43:03.830 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:43:03.831 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:43:03.831 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:43:03.833 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:43:03.834 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:43:03.834 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:43:03.836 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-18 06:43:03.842 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 275058944418273362647737992161968215412570186337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 18 05:07:13 UTC 2022 Final Date: Thu Jun 17 05:07:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c7:d9:64:58:c3:44:61:61:98:0a:ff:57:d7:19:78:25:b1:1c:55:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62199fb375017271002e6c55e7e99de96716182d 8a111e8c36f1a2f0c15312bb2a1ed3c4006ba162 f13dd257137e3eb157b1fe385fc5c49e13a99a78 4556884ac6155f27141c6ddab23c9bccfffb46d4 65f16171ab68385fa0dee1ec5777ee8e0febca28 8c65c0153d6a152c4ae3c757b60f2348cc8dbebc a5f2ef697bb2450eb08d1182ee51a598f784ada7 a7d11058df4f86daae0991c30c157ffacbf0c393 d91b5a546b53cbdf6cb7bd251d2634a75ce16aa9 b70a4d929e9b5ed59845da870dace516c008bc21 bf4ece8c758dd26b75b50ec9f80df88b31f9609d 96362545e7bc0016f8e1891e8f6597180e3d2852 7059e84c7da796353d2a4e765b6592c512a4d8c6 721e92f19cbab8c319a691b80b324113b8e0bdff b7515d6367367a27eb3dba373632eadac9a188a3 dabe55b9066e06b94e6071dc7fee1917e5ca0c10 99bf3c4df20405ba2c7fdb5cc7a2f226c5504af1 67b84cc7ef22d9e5ced5d3f8e04fc4127d240a8e 4b7cb51d172d141b0b75c3538f71cc365e104970 247aa82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8a:45:90:b6:8f:99:7c:42:e6:44:f4:ea:44:1a:0d:e5:fc:cd:73:ec] modulus: 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 public exponent: 10001 ] 2022-06-18 06:45:00.398  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-18 06:45:00.402 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-18 06:45:00.407 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 06:45:00.414 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-18 06:45:00.415  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 06:45:00.417  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-18 06:45:00.417  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-18 06:45:00.418 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 06:45:00.419 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-18 06:45:00.421 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-18 06:45:00.434 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-18 06:45:00.439 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 06:45:00.440 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 06:45:00.445 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 06:45:00.643  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-18 06:45:00.644  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-18 06:45:00.646 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-18 06:45:00.646 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 06:45:00.650  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-18 06:45:00.651  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-18 06:45:00.652 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:45:00.653 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:45:00.654 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:45:00.655 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:45:00.656 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:45:00.656 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:45:00.658 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:45:00.658 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:45:00.659 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:45:00.660 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-18 06:45:00.667 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 275058944418273362647737992161968215412570186337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 18 05:07:13 UTC 2022 Final Date: Thu Jun 17 05:07:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c7:d9:64:58:c3:44:61:61:98:0a:ff:57:d7:19:78:25:b1:1c:55:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62199fb375017271002e6c55e7e99de96716182d 8a111e8c36f1a2f0c15312bb2a1ed3c4006ba162 f13dd257137e3eb157b1fe385fc5c49e13a99a78 4556884ac6155f27141c6ddab23c9bccfffb46d4 65f16171ab68385fa0dee1ec5777ee8e0febca28 8c65c0153d6a152c4ae3c757b60f2348cc8dbebc a5f2ef697bb2450eb08d1182ee51a598f784ada7 a7d11058df4f86daae0991c30c157ffacbf0c393 d91b5a546b53cbdf6cb7bd251d2634a75ce16aa9 b70a4d929e9b5ed59845da870dace516c008bc21 bf4ece8c758dd26b75b50ec9f80df88b31f9609d 96362545e7bc0016f8e1891e8f6597180e3d2852 7059e84c7da796353d2a4e765b6592c512a4d8c6 721e92f19cbab8c319a691b80b324113b8e0bdff b7515d6367367a27eb3dba373632eadac9a188a3 dabe55b9066e06b94e6071dc7fee1917e5ca0c10 99bf3c4df20405ba2c7fdb5cc7a2f226c5504af1 67b84cc7ef22d9e5ced5d3f8e04fc4127d240a8e 4b7cb51d172d141b0b75c3538f71cc365e104970 247aa82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f9:e7:28:6b:34:d6:5b:54:a2:46:98:92:7a:1a:27:69:e6:58:d5:68] modulus: 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 public exponent: 10001 ] 2022-06-18 06:50:39.668  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-18 06:50:39.675 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-18 06:50:39.681 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 06:50:39.684 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-18 06:50:39.685  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 06:50:39.691  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-18 06:50:39.692  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-18 06:50:39.693 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 06:50:39.693 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-18 06:50:39.695 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-18 06:50:39.716 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-18 06:50:39.722 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 06:50:39.723 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 06:50:39.724 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 06:50:39.908  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-18 06:50:39.909  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-18 06:50:39.910 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-18 06:50:39.911 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 06:50:39.915  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-18 06:50:39.917  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-18 06:50:39.917 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:50:39.934 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:50:39.935 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:50:39.936 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:50:39.936 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:50:39.937 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:50:39.939 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:50:39.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:50:39.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:50:39.944 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-18 06:50:39.952 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 275058944418273362647737992161968215412570186337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 18 05:07:13 UTC 2022 Final Date: Thu Jun 17 05:07:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c7:d9:64:58:c3:44:61:61:98:0a:ff:57:d7:19:78:25:b1:1c:55:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62199fb375017271002e6c55e7e99de96716182d 8a111e8c36f1a2f0c15312bb2a1ed3c4006ba162 f13dd257137e3eb157b1fe385fc5c49e13a99a78 4556884ac6155f27141c6ddab23c9bccfffb46d4 65f16171ab68385fa0dee1ec5777ee8e0febca28 8c65c0153d6a152c4ae3c757b60f2348cc8dbebc a5f2ef697bb2450eb08d1182ee51a598f784ada7 a7d11058df4f86daae0991c30c157ffacbf0c393 d91b5a546b53cbdf6cb7bd251d2634a75ce16aa9 b70a4d929e9b5ed59845da870dace516c008bc21 bf4ece8c758dd26b75b50ec9f80df88b31f9609d 96362545e7bc0016f8e1891e8f6597180e3d2852 7059e84c7da796353d2a4e765b6592c512a4d8c6 721e92f19cbab8c319a691b80b324113b8e0bdff b7515d6367367a27eb3dba373632eadac9a188a3 dabe55b9066e06b94e6071dc7fee1917e5ca0c10 99bf3c4df20405ba2c7fdb5cc7a2f226c5504af1 67b84cc7ef22d9e5ced5d3f8e04fc4127d240a8e 4b7cb51d172d141b0b75c3538f71cc365e104970 247aa82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [76:84:62:dc:2c:46:cb:6d:5f:a1:34:f9:e7:f4:ae:80:e8:82:4a:f1] modulus: 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 public exponent: 10001 ] 2022-06-18 06:54:49.397  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-18 06:54:49.407 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-18 06:54:49.411 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 06:54:49.412 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-18 06:54:49.413  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 06:54:49.414  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-18 06:54:49.414  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-18 06:54:49.415 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 06:54:49.415 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-18 06:54:49.416 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-18 06:54:49.426 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-18 06:54:49.428 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 06:54:49.429 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 06:54:49.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 06:54:49.710  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-18 06:54:49.711  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-18 06:54:49.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-18 06:54:49.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 06:54:49.715  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-18 06:54:49.716  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-18 06:54:49.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:54:49.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:54:49.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:54:49.719 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:54:49.719 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:54:49.720 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:54:49.721 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 06:54:49.729 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 06:54:49.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 06:54:49.732 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-18 06:54:49.742 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 275058944418273362647737992161968215412570186337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 18 05:07:13 UTC 2022 Final Date: Thu Jun 17 05:07:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c7:d9:64:58:c3:44:61:61:98:0a:ff:57:d7:19:78:25:b1:1c:55:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62199fb375017271002e6c55e7e99de96716182d 8a111e8c36f1a2f0c15312bb2a1ed3c4006ba162 f13dd257137e3eb157b1fe385fc5c49e13a99a78 4556884ac6155f27141c6ddab23c9bccfffb46d4 65f16171ab68385fa0dee1ec5777ee8e0febca28 8c65c0153d6a152c4ae3c757b60f2348cc8dbebc a5f2ef697bb2450eb08d1182ee51a598f784ada7 a7d11058df4f86daae0991c30c157ffacbf0c393 d91b5a546b53cbdf6cb7bd251d2634a75ce16aa9 b70a4d929e9b5ed59845da870dace516c008bc21 bf4ece8c758dd26b75b50ec9f80df88b31f9609d 96362545e7bc0016f8e1891e8f6597180e3d2852 7059e84c7da796353d2a4e765b6592c512a4d8c6 721e92f19cbab8c319a691b80b324113b8e0bdff b7515d6367367a27eb3dba373632eadac9a188a3 dabe55b9066e06b94e6071dc7fee1917e5ca0c10 99bf3c4df20405ba2c7fdb5cc7a2f226c5504af1 67b84cc7ef22d9e5ced5d3f8e04fc4127d240a8e 4b7cb51d172d141b0b75c3538f71cc365e104970 247aa82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:f4:29:73:17:73:cf:f4:6e:c5:25:88:27:45:1e:9a:a8:9c:63:69] modulus: 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 public exponent: 10001 ] 2022-06-18 07:00:12.149  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-18 07:00:12.159 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-18 07:00:12.169 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 07:00:12.175 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-18 07:00:12.176  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 07:00:12.177  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-18 07:00:12.177  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-18 07:00:12.178 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 07:00:12.179 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-18 07:00:12.180 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-18 07:00:12.187 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-18 07:00:12.189 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:00:12.190 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:00:12.190 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:00:12.428  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-18 07:00:12.429  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-18 07:00:12.430 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-18 07:00:12.431 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:00:12.433  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-18 07:00:12.433  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-18 07:00:12.434 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:00:12.434 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:00:12.435 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:00:12.436 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:00:12.436 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:00:12.436 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:00:12.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:00:12.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:00:12.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:00:12.440 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-18 07:00:12.447 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 275058944418273362647737992161968215412570186337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 18 05:07:13 UTC 2022 Final Date: Thu Jun 17 05:07:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c7:d9:64:58:c3:44:61:61:98:0a:ff:57:d7:19:78:25:b1:1c:55:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62199fb375017271002e6c55e7e99de96716182d 8a111e8c36f1a2f0c15312bb2a1ed3c4006ba162 f13dd257137e3eb157b1fe385fc5c49e13a99a78 4556884ac6155f27141c6ddab23c9bccfffb46d4 65f16171ab68385fa0dee1ec5777ee8e0febca28 8c65c0153d6a152c4ae3c757b60f2348cc8dbebc a5f2ef697bb2450eb08d1182ee51a598f784ada7 a7d11058df4f86daae0991c30c157ffacbf0c393 d91b5a546b53cbdf6cb7bd251d2634a75ce16aa9 b70a4d929e9b5ed59845da870dace516c008bc21 bf4ece8c758dd26b75b50ec9f80df88b31f9609d 96362545e7bc0016f8e1891e8f6597180e3d2852 7059e84c7da796353d2a4e765b6592c512a4d8c6 721e92f19cbab8c319a691b80b324113b8e0bdff b7515d6367367a27eb3dba373632eadac9a188a3 dabe55b9066e06b94e6071dc7fee1917e5ca0c10 99bf3c4df20405ba2c7fdb5cc7a2f226c5504af1 67b84cc7ef22d9e5ced5d3f8e04fc4127d240a8e 4b7cb51d172d141b0b75c3538f71cc365e104970 247aa82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0d:5c:c4:ed:4d:c8:70:ac:d4:de:37:cf:05:66:c3:25:22:31:2c:37] modulus: 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 public exponent: 10001 ] 2022-06-18 07:01:31.984  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-18 07:01:31.991 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-18 07:01:31.995 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-18 07:01:31.998 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-18 07:01:31.999  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-18 07:01:32.004  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-18 07:01:32.005  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-18 07:01:32.011 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 07:01:32.012 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-18 07:01:32.022 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-18 07:01:32.033 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-18 07:01:32.035 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:01:32.036 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:01:32.036 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:01:32.234  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-18 07:01:32.235  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-18 07:01:32.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-18 07:01:32.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:01:32.239  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-18 07:01:32.240  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-18 07:01:32.240 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:01:32.241 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:01:32.241 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:01:32.242 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:01:32.242 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:01:32.243 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:01:32.244 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:01:32.245 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:01:32.245 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:01:32.246 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-18 07:01:32.254 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 275058944418273362647737992161968215412570186337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 18 05:07:13 UTC 2022 Final Date: Thu Jun 17 05:07:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c7:d9:64:58:c3:44:61:61:98:0a:ff:57:d7:19:78:25:b1:1c:55:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62199fb375017271002e6c55e7e99de96716182d 8a111e8c36f1a2f0c15312bb2a1ed3c4006ba162 f13dd257137e3eb157b1fe385fc5c49e13a99a78 4556884ac6155f27141c6ddab23c9bccfffb46d4 65f16171ab68385fa0dee1ec5777ee8e0febca28 8c65c0153d6a152c4ae3c757b60f2348cc8dbebc a5f2ef697bb2450eb08d1182ee51a598f784ada7 a7d11058df4f86daae0991c30c157ffacbf0c393 d91b5a546b53cbdf6cb7bd251d2634a75ce16aa9 b70a4d929e9b5ed59845da870dace516c008bc21 bf4ece8c758dd26b75b50ec9f80df88b31f9609d 96362545e7bc0016f8e1891e8f6597180e3d2852 7059e84c7da796353d2a4e765b6592c512a4d8c6 721e92f19cbab8c319a691b80b324113b8e0bdff b7515d6367367a27eb3dba373632eadac9a188a3 dabe55b9066e06b94e6071dc7fee1917e5ca0c10 99bf3c4df20405ba2c7fdb5cc7a2f226c5504af1 67b84cc7ef22d9e5ced5d3f8e04fc4127d240a8e 4b7cb51d172d141b0b75c3538f71cc365e104970 247aa82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [17:62:36:05:04:0b:0d:e6:36:b6:9c:b9:fa:a3:1b:fa:76:1f:7f:45] modulus: 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 public exponent: 10001 ] 2022-06-18 07:04:23.904  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-18 07:04:23.906 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-18 07:04:23.909 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 07:04:23.910 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-18 07:04:23.910  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 07:04:23.911  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-18 07:04:23.911  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-18 07:04:23.912 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 07:04:23.912 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-18 07:04:23.913 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-18 07:04:23.922 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-18 07:04:23.924 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:04:23.924 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:04:23.925 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:04:24.119  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-18 07:04:24.120  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-18 07:04:24.120 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-18 07:04:24.121 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:04:24.123  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-18 07:04:24.123  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-18 07:04:24.124 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:04:24.124 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:04:24.125 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:04:24.162 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:04:24.163 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:04:24.164 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:04:24.165 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:04:24.166 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:04:24.166 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:04:24.167 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-18 07:04:24.177 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 275058944418273362647737992161968215412570186337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 18 05:07:13 UTC 2022 Final Date: Thu Jun 17 05:07:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c7:d9:64:58:c3:44:61:61:98:0a:ff:57:d7:19:78:25:b1:1c:55:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62199fb375017271002e6c55e7e99de96716182d 8a111e8c36f1a2f0c15312bb2a1ed3c4006ba162 f13dd257137e3eb157b1fe385fc5c49e13a99a78 4556884ac6155f27141c6ddab23c9bccfffb46d4 65f16171ab68385fa0dee1ec5777ee8e0febca28 8c65c0153d6a152c4ae3c757b60f2348cc8dbebc a5f2ef697bb2450eb08d1182ee51a598f784ada7 a7d11058df4f86daae0991c30c157ffacbf0c393 d91b5a546b53cbdf6cb7bd251d2634a75ce16aa9 b70a4d929e9b5ed59845da870dace516c008bc21 bf4ece8c758dd26b75b50ec9f80df88b31f9609d 96362545e7bc0016f8e1891e8f6597180e3d2852 7059e84c7da796353d2a4e765b6592c512a4d8c6 721e92f19cbab8c319a691b80b324113b8e0bdff b7515d6367367a27eb3dba373632eadac9a188a3 dabe55b9066e06b94e6071dc7fee1917e5ca0c10 99bf3c4df20405ba2c7fdb5cc7a2f226c5504af1 67b84cc7ef22d9e5ced5d3f8e04fc4127d240a8e 4b7cb51d172d141b0b75c3538f71cc365e104970 247aa82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:2d:50:1a:04:c3:51:93:86:b0:2d:16:70:85:e2:40:23:2b:21:c1] modulus: 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 public exponent: 10001 ] 2022-06-18 07:08:02.067  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-18 07:08:02.071 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-18 07:08:02.075 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-18 07:08:02.079 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-18 07:08:02.082  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-18 07:08:02.083  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-18 07:08:02.084  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-18 07:08:02.085 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 07:08:02.086 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-18 07:08:02.087 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-18 07:08:02.110 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-18 07:08:02.112 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:08:02.113 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:08:02.113 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:08:02.326  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-18 07:08:02.327  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-18 07:08:02.328 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-18 07:08:02.328 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:08:02.330  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-18 07:08:02.331  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-18 07:08:02.332 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:08:02.333 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:08:02.334 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:08:02.335 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:08:02.336 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:08:02.337 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:08:02.339 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:08:02.339 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:08:02.340 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:08:02.342 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-18 07:08:02.349 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 275058944418273362647737992161968215412570186337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 18 05:07:13 UTC 2022 Final Date: Thu Jun 17 05:07:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c7:d9:64:58:c3:44:61:61:98:0a:ff:57:d7:19:78:25:b1:1c:55:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62199fb375017271002e6c55e7e99de96716182d 8a111e8c36f1a2f0c15312bb2a1ed3c4006ba162 f13dd257137e3eb157b1fe385fc5c49e13a99a78 4556884ac6155f27141c6ddab23c9bccfffb46d4 65f16171ab68385fa0dee1ec5777ee8e0febca28 8c65c0153d6a152c4ae3c757b60f2348cc8dbebc a5f2ef697bb2450eb08d1182ee51a598f784ada7 a7d11058df4f86daae0991c30c157ffacbf0c393 d91b5a546b53cbdf6cb7bd251d2634a75ce16aa9 b70a4d929e9b5ed59845da870dace516c008bc21 bf4ece8c758dd26b75b50ec9f80df88b31f9609d 96362545e7bc0016f8e1891e8f6597180e3d2852 7059e84c7da796353d2a4e765b6592c512a4d8c6 721e92f19cbab8c319a691b80b324113b8e0bdff b7515d6367367a27eb3dba373632eadac9a188a3 dabe55b9066e06b94e6071dc7fee1917e5ca0c10 99bf3c4df20405ba2c7fdb5cc7a2f226c5504af1 67b84cc7ef22d9e5ced5d3f8e04fc4127d240a8e 4b7cb51d172d141b0b75c3538f71cc365e104970 247aa82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4b:8c:32:48:9b:b2:3d:80:4b:38:29:b9:20:35:00:42:8e:00:4b:a5] modulus: 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 public exponent: 10001 ] 2022-06-18 07:08:21.476  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-18 07:08:21.480 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-18 07:08:21.482 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-18 07:08:21.485 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-18 07:08:21.485  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-18 07:08:21.486  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-18 07:08:21.487  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-18 07:08:21.487 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 07:08:21.487 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-18 07:08:21.488 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-18 07:08:21.496 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-18 07:08:21.498 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:08:21.498 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:08:21.499 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:08:21.661  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-18 07:08:21.662  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-18 07:08:21.663 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-18 07:08:21.663 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:08:21.665  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-18 07:08:21.666  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-18 07:08:21.667 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:08:21.667 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:08:21.667 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:08:21.668 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:08:21.668 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:08:21.668 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:08:21.669 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:08:21.669 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:08:21.669 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:08:21.670 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-18 07:08:21.675 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 275058944418273362647737992161968215412570186337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 18 05:07:13 UTC 2022 Final Date: Thu Jun 17 05:07:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c7:d9:64:58:c3:44:61:61:98:0a:ff:57:d7:19:78:25:b1:1c:55:67] modulus: 830060dd9e8f2e1d02ea71c2c000163229f4dc7de5c0ad501363278a50b7c7c43edfce48ccf499252ce3514edf0c5d1e08ada856fc9d50ad5a31f4fed7acef978df1b0816e8b70f396b4e9622b72f6bab7bcd03516516449b070b92edcda5197e423e245f79c8d3fc9e69b49770099ecfcf8f3511aed0e1ee366b85a5dcd46865a5484238832bfd269c9a684436629f6f37a296369a4f48dac84c3f48ca676557fba3122aa0b2ef30a769684e5824de172ba8a116aed439d136d3cf49ed942e3b78baed9a6e5d916437bf78a925298bb6fb89d3e11935806a3fc1366b8080e72ae865cfff0bffd323ecf474dfc3793225b33948902294cb2b5a918d762b0180d945411f7a4e7030a8f38eac2f8554a575d980eae9a95cadc0fa0e0275f2d034654ead6abc7eeef38c28de02f63a783a858c6a05c7d80b689aa289391120acad61dfbdcdd631ddad7a6633b91422303f97ff5392358a2a190852cedec6b36da20f28022f6691c0bc2492361c153c5abeeee3c2aa3cf59af07a76ca0ce1d122b9f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62199fb375017271002e6c55e7e99de96716182d 8a111e8c36f1a2f0c15312bb2a1ed3c4006ba162 f13dd257137e3eb157b1fe385fc5c49e13a99a78 4556884ac6155f27141c6ddab23c9bccfffb46d4 65f16171ab68385fa0dee1ec5777ee8e0febca28 8c65c0153d6a152c4ae3c757b60f2348cc8dbebc a5f2ef697bb2450eb08d1182ee51a598f784ada7 a7d11058df4f86daae0991c30c157ffacbf0c393 d91b5a546b53cbdf6cb7bd251d2634a75ce16aa9 b70a4d929e9b5ed59845da870dace516c008bc21 bf4ece8c758dd26b75b50ec9f80df88b31f9609d 96362545e7bc0016f8e1891e8f6597180e3d2852 7059e84c7da796353d2a4e765b6592c512a4d8c6 721e92f19cbab8c319a691b80b324113b8e0bdff b7515d6367367a27eb3dba373632eadac9a188a3 dabe55b9066e06b94e6071dc7fee1917e5ca0c10 99bf3c4df20405ba2c7fdb5cc7a2f226c5504af1 67b84cc7ef22d9e5ced5d3f8e04fc4127d240a8e 4b7cb51d172d141b0b75c3538f71cc365e104970 247aa82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ba:81:1d:eb:7b:9a:c9:b9:ac:c1:d5:37:d9:3c:de:ba:b4:53:55:eb] modulus: c40add967a9554cfe2da7dda6ffaf8d9aaed20c6347970a8ce206967830e56b07f3179b32a5bd4ed7801aa0f18baacb36de69f341e1b8550bf64727fb1e0828f959fad4ffcaa94dd8d6b2401b4848ce3e9c1eb7b0863b793df3ef8b30ade87bf1c7c9bff0a0b0c60406fb373bd7c6a66796f94f5e85a30549b86092a5bcebeb8d14737e45c5315fb3231769104bb3f32703b24250c2de6fda5ed7528294772ce35300d7148783e2ad2d29d036c10418812c63496724359df03f966d2228fc4507f3b96e096f4e9ddaf4b89f452f98bd59be523f7870983206149665edb4c4f0d8265d9b8d125d79e6f6f1fe55851d89e82eb72531f7732a2414b0bb11c97f123 public exponent: 10001 ] 2022-06-18 07:09:47.283  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-18 07:09:47.285 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-18 07:09:47.288 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 07:09:47.289 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-18 07:09:47.290  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 07:09:47.291  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-18 07:09:47.291  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-18 07:09:47.292 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 07:09:47.292 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-18 07:09:47.293 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-18 07:09:47.300 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-18 07:09:47.302 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:09:47.302 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:09:47.303 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:09:47.644  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-18 07:09:47.645  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-18 07:09:47.645 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-18 07:09:47.645 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:09:47.647  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-18 07:09:47.647  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-18 07:09:47.648 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:09:47.649 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:09:47.649 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:09:47.650 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:09:47.650 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:09:47.650 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:09:47.651 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:09:47.652 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:09:47.652 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:09:47.653 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-18 07:09:47.657 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 275058944418273362647737992161968215412570186337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 18 05:07:13 UTC 2022 Final Date: Thu Jun 17 05:07:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c7:d9:64:58:c3:44:61:61:98:0a:ff:57:d7:19:78:25:b1:1c:55:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62199fb375017271002e6c55e7e99de96716182d 8a111e8c36f1a2f0c15312bb2a1ed3c4006ba162 f13dd257137e3eb157b1fe385fc5c49e13a99a78 4556884ac6155f27141c6ddab23c9bccfffb46d4 65f16171ab68385fa0dee1ec5777ee8e0febca28 8c65c0153d6a152c4ae3c757b60f2348cc8dbebc a5f2ef697bb2450eb08d1182ee51a598f784ada7 a7d11058df4f86daae0991c30c157ffacbf0c393 d91b5a546b53cbdf6cb7bd251d2634a75ce16aa9 b70a4d929e9b5ed59845da870dace516c008bc21 bf4ece8c758dd26b75b50ec9f80df88b31f9609d 96362545e7bc0016f8e1891e8f6597180e3d2852 7059e84c7da796353d2a4e765b6592c512a4d8c6 721e92f19cbab8c319a691b80b324113b8e0bdff b7515d6367367a27eb3dba373632eadac9a188a3 dabe55b9066e06b94e6071dc7fee1917e5ca0c10 99bf3c4df20405ba2c7fdb5cc7a2f226c5504af1 67b84cc7ef22d9e5ced5d3f8e04fc4127d240a8e 4b7cb51d172d141b0b75c3538f71cc365e104970 247aa82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1b:81:9e:ab:b7:76:cc:c8:80:cb:73:e4:8e:b0:96:15:2e:b0:0f:f1] modulus: eafbae0cc206f1dccdb0bc9916a2382093b7aca4c8fcf777d7dce371f4bcc3bd0afc3f1380083088d1102ec39d43845d0f463bcdcb7144c7bd3ca0246b1fc9f9b034fef6c00d84a42225c23a2fc1e0e9bb8ae3f633f06993a371d7ca518fefaaeaa934817834a21b2823c439edd521fd47f4ea680ff3209b11db28c3841dfbaa4f791070a2f23ec40ac68bcd587e6976383c5710b9abdca82df44b45c33017accf7952ed72fb1a337d517bddfc64a4b483898c3c7ffa855550cc23ce40575988568f79cac7a916b84afe8a7ebcd6cda13fb4cfbdde33d3e34765d9a12c5499d33ed21f9212b6be0b6e8a4c762d73f5a1dde3b3055dcc4c8022161f4b1dd6328d public exponent: 10001 ] 2022-06-18 07:15:06.685  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-18 07:15:06.688 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-18 07:15:06.691 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 07:15:06.694 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-18 07:15:06.695  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 07:15:06.703  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-18 07:15:06.704  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-18 07:15:06.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 07:15:06.705 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-18 07:15:06.706 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-18 07:15:06.713 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-18 07:15:06.715 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:15:06.715 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:15:06.716 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:15:06.930  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-18 07:15:06.932  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-18 07:15:06.933 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-18 07:15:06.933 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:15:06.935  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-18 07:15:06.936  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-18 07:15:06.936 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:15:06.936 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:15:06.937 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:15:06.938 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:15:06.938 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:15:06.939 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:15:06.940 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:15:06.940 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:15:06.941 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:15:06.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-18 07:15:06.950 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 275058944418273362647737992161968215412570186337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 18 05:07:13 UTC 2022 Final Date: Thu Jun 17 05:07:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c7:d9:64:58:c3:44:61:61:98:0a:ff:57:d7:19:78:25:b1:1c:55:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62199fb375017271002e6c55e7e99de96716182d 8a111e8c36f1a2f0c15312bb2a1ed3c4006ba162 f13dd257137e3eb157b1fe385fc5c49e13a99a78 4556884ac6155f27141c6ddab23c9bccfffb46d4 65f16171ab68385fa0dee1ec5777ee8e0febca28 8c65c0153d6a152c4ae3c757b60f2348cc8dbebc a5f2ef697bb2450eb08d1182ee51a598f784ada7 a7d11058df4f86daae0991c30c157ffacbf0c393 d91b5a546b53cbdf6cb7bd251d2634a75ce16aa9 b70a4d929e9b5ed59845da870dace516c008bc21 bf4ece8c758dd26b75b50ec9f80df88b31f9609d 96362545e7bc0016f8e1891e8f6597180e3d2852 7059e84c7da796353d2a4e765b6592c512a4d8c6 721e92f19cbab8c319a691b80b324113b8e0bdff b7515d6367367a27eb3dba373632eadac9a188a3 dabe55b9066e06b94e6071dc7fee1917e5ca0c10 99bf3c4df20405ba2c7fdb5cc7a2f226c5504af1 67b84cc7ef22d9e5ced5d3f8e04fc4127d240a8e 4b7cb51d172d141b0b75c3538f71cc365e104970 247aa82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fb:02:d6:bd:2a:5b:dd:5e:45:b6:19:f3:be:df:3d:26:ac:1a:c0:fb] modulus: c5b61a87011f58d9823c322272252c53898b2f9783d83137fd67dae2ada0b484a04c2541dc26c48f58d1d32f9e53b3b52945fe6e3feef5f122a14ebfcc2740c9f339349c930877cdc2ef7aa4839cb48d022d9183ab50b9642d4ee789a3859da5f74474c15a5196b8ad783f92148f5773e36c1a36c057075b11a7a56b87245b2cc679592f05dae8e283ab79f7967f0ee624d7f6c774f4aa16af741d86d2b36582f6bbeb82316847e969d8a46d21c0731b3da9f4da252df291745342d2aae7f54890c9b01362fe479354c527d259f924510f47e62754f1dd1527c3a0267552c74029965f539ce7aaac071e54319fb1690c8a91d9e646d047123dcd746a9358e817 public exponent: 10001 ] 2022-06-18 07:20:23.118  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-18 07:20:23.122 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-18 07:20:23.146 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 07:20:23.149 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-18 07:20:23.150  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 07:20:23.151  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-18 07:20:23.151  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-18 07:20:23.152 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 07:20:23.153 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-18 07:20:23.153 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-18 07:20:23.170 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-18 07:20:23.172 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:20:23.172 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:20:23.173 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:20:23.414  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-18 07:20:23.415  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-18 07:20:23.416 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-18 07:20:23.417 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:20:23.421  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-18 07:20:23.422  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-18 07:20:23.423 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:20:23.423 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:20:23.424 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:20:23.426 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:20:23.427 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:20:23.427 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:20:23.429 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:20:23.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:20:23.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:20:23.431 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-18 07:20:23.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 275058944418273362647737992161968215412570186337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 18 05:07:13 UTC 2022 Final Date: Thu Jun 17 05:07:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c7:d9:64:58:c3:44:61:61:98:0a:ff:57:d7:19:78:25:b1:1c:55:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62199fb375017271002e6c55e7e99de96716182d 8a111e8c36f1a2f0c15312bb2a1ed3c4006ba162 f13dd257137e3eb157b1fe385fc5c49e13a99a78 4556884ac6155f27141c6ddab23c9bccfffb46d4 65f16171ab68385fa0dee1ec5777ee8e0febca28 8c65c0153d6a152c4ae3c757b60f2348cc8dbebc a5f2ef697bb2450eb08d1182ee51a598f784ada7 a7d11058df4f86daae0991c30c157ffacbf0c393 d91b5a546b53cbdf6cb7bd251d2634a75ce16aa9 b70a4d929e9b5ed59845da870dace516c008bc21 bf4ece8c758dd26b75b50ec9f80df88b31f9609d 96362545e7bc0016f8e1891e8f6597180e3d2852 7059e84c7da796353d2a4e765b6592c512a4d8c6 721e92f19cbab8c319a691b80b324113b8e0bdff b7515d6367367a27eb3dba373632eadac9a188a3 dabe55b9066e06b94e6071dc7fee1917e5ca0c10 99bf3c4df20405ba2c7fdb5cc7a2f226c5504af1 67b84cc7ef22d9e5ced5d3f8e04fc4127d240a8e 4b7cb51d172d141b0b75c3538f71cc365e104970 247aa82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b1:46:aa:f4:9b:58:1c:20:c2:b5:2d:72:3d:65:85:02:d6:ff:86:3a] modulus: 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 public exponent: 10001 ] 2022-06-18 07:26:51.688  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-18 07:26:51.692 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-18 07:26:51.703 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 07:26:51.705 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-18 07:26:51.706  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 07:26:51.706  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-18 07:26:51.707  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-18 07:26:51.707 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 07:26:51.708 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-18 07:26:51.709 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-18 07:26:51.717 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-18 07:26:51.720 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:26:51.720 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:26:51.721 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:26:51.917  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-18 07:26:51.930  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-18 07:26:51.938 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-18 07:26:51.939 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:26:51.943  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-18 07:26:51.944  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-18 07:26:51.945 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:26:51.945 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:26:51.946 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:26:51.947 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:26:51.947 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:26:51.947 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:26:51.948 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:26:51.948 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:26:51.949 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:26:51.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-18 07:26:51.955 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 275058944418273362647737992161968215412570186337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 18 05:07:13 UTC 2022 Final Date: Thu Jun 17 05:07:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c7:d9:64:58:c3:44:61:61:98:0a:ff:57:d7:19:78:25:b1:1c:55:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62199fb375017271002e6c55e7e99de96716182d 8a111e8c36f1a2f0c15312bb2a1ed3c4006ba162 f13dd257137e3eb157b1fe385fc5c49e13a99a78 4556884ac6155f27141c6ddab23c9bccfffb46d4 65f16171ab68385fa0dee1ec5777ee8e0febca28 8c65c0153d6a152c4ae3c757b60f2348cc8dbebc a5f2ef697bb2450eb08d1182ee51a598f784ada7 a7d11058df4f86daae0991c30c157ffacbf0c393 d91b5a546b53cbdf6cb7bd251d2634a75ce16aa9 b70a4d929e9b5ed59845da870dace516c008bc21 bf4ece8c758dd26b75b50ec9f80df88b31f9609d 96362545e7bc0016f8e1891e8f6597180e3d2852 7059e84c7da796353d2a4e765b6592c512a4d8c6 721e92f19cbab8c319a691b80b324113b8e0bdff b7515d6367367a27eb3dba373632eadac9a188a3 dabe55b9066e06b94e6071dc7fee1917e5ca0c10 99bf3c4df20405ba2c7fdb5cc7a2f226c5504af1 67b84cc7ef22d9e5ced5d3f8e04fc4127d240a8e 4b7cb51d172d141b0b75c3538f71cc365e104970 247aa82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:14:d4:0a:b8:a8:7a:c8:16:de:ea:36:cb:6b:75:20:aa:2f:fd:b8] modulus: ef0a3d5a4c64a70b32d709cfb278e12aedb6e97927affcb244de84a36dff0b5d61709bba527256eec30c519b621abb436f83a50c85f81e9fd01d8c11b58c7a54f77626b466aeb706dc6d5f75aea528c1a7a0a140a31cd9a07e719e6857564e8fe1fb9ac90fe3c1c27ed88f7ecd51587fa65d66983c25a06dd1c3a403575a03f0163548a686522e7e07baf5330795f78636a1f7d6ccb9f5b67d81dc67bea436b7c3478d81bdba3108abdbcbee3eaa60524013528ccee104e8824fe2aae136fa892c529aea2f52412d4257b02d59ba33e179f7e2be95979e58ae03e122bd96f3848f510ca37d3cfd3460121769ac917a6f09ea1aa8add9ea8f6faac99aa4cc469d public exponent: 10001 ] 2022-06-18 07:31:54.977  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-18 07:31:54.979 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-18 07:31:54.982 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 07:31:54.983 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-18 07:31:54.984  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-18 07:31:54.984  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-18 07:31:54.985  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-18 07:31:54.985 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-18 07:31:54.986 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-18 07:31:54.986 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-18 07:31:54.996 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-18 07:31:54.997 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:31:54.998 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-18 07:31:54.998 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:31:55.270  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-18 07:31:55.270  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-18 07:31:55.271 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-18 07:31:55.271 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-18 07:31:55.274  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-18 07:31:55.275  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-18 07:31:55.276 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:31:55.276 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:31:55.277 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:31:55.278 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:31:55.278 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:31:55.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:31:55.280 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-18 07:31:55.281 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-18 07:31:55.283 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-18 07:31:55.285 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-18 07:31:55.305 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 275058944418273362647737992161968215412570186337 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 18 05:07:13 UTC 2022 Final Date: Thu Jun 17 05:07:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c7:d9:64:58:c3:44:61:61:98:0a:ff:57:d7:19:78:25:b1:1c:55:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62199fb375017271002e6c55e7e99de96716182d 8a111e8c36f1a2f0c15312bb2a1ed3c4006ba162 f13dd257137e3eb157b1fe385fc5c49e13a99a78 4556884ac6155f27141c6ddab23c9bccfffb46d4 65f16171ab68385fa0dee1ec5777ee8e0febca28 8c65c0153d6a152c4ae3c757b60f2348cc8dbebc a5f2ef697bb2450eb08d1182ee51a598f784ada7 a7d11058df4f86daae0991c30c157ffacbf0c393 d91b5a546b53cbdf6cb7bd251d2634a75ce16aa9 b70a4d929e9b5ed59845da870dace516c008bc21 bf4ece8c758dd26b75b50ec9f80df88b31f9609d 96362545e7bc0016f8e1891e8f6597180e3d2852 7059e84c7da796353d2a4e765b6592c512a4d8c6 721e92f19cbab8c319a691b80b324113b8e0bdff b7515d6367367a27eb3dba373632eadac9a188a3 dabe55b9066e06b94e6071dc7fee1917e5ca0c10 99bf3c4df20405ba2c7fdb5cc7a2f226c5504af1 67b84cc7ef22d9e5ced5d3f8e04fc4127d240a8e 4b7cb51d172d141b0b75c3538f71cc365e104970 247aa82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b0:a4:92:f8:75:ae:ad:05:f7:c1:22:5c:6f:b3:54:86:58:a3:49:3a] modulus: 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 public exponent: 10001 ]