2022-09-10 05:10:31,958 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-09-10 05:10:32,598 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-09-10 05:10:33.123  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Sep 10, 2022 5:10:34 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Sep 10, 2022 5:10:34 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Sep 10, 2022 5:10:34 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Sep 10, 2022 5:10:34 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-09-10 05:10:34.622 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-09-10 05:10:34.794  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-09-10 05:10:34.891  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-09-10 05:10:35.324 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-09-10 05:10:35.325 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-09-10 05:10:35.326 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-09-10 05:10:35.328 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-09-10 05:10:35.354 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-09-10 05:10:35.356 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-09-10 05:10:35.426 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-09-10 05:10:35.785 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Sep 10, 2022 5:10:36 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-09-10 05:10:36.464  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 4.992 seconds (JVM running for 5.87) Sep 10, 2022 5:11:00 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-09-10 05:15:21.183  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-10 05:15:21.190 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-10 05:15:21.259 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-09-10 05:15:21.262 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-10 05:15:21.271  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-09-10 05:15:21.273  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-10 05:15:21.274  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-10 05:15:21.274 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 05:15:21.274 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 05:15:21.277 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 05:15:21.280 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-10 05:15:21.282 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-10 05:15:21.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-10 05:15:21.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 05:15:21.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 05:15:21.311 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 05:15:22.274  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-10 05:15:22.276  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-10 05:15:22.276 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-10 05:15:22.277 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 05:15:22.282  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-10 05:15:22.283  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-10 05:15:22.283 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 05:15:22.284 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 05:15:22.284 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 05:15:22.291 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 05:15:22.291 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 05:15:22.291 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 05:15:22.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 05:15:22.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 05:15:22.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 05:15:22.296 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-10 05:15:22.313 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42174110481649479155600662499698993563733490702 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 10 05:04:22 UTC 2022 Final Date: Thu Sep 09 05:04:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:30:9c:6f:b9:5e:2d:9f:ec:95:77:d2:1a:13:24:6b:4c:cc:dc:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 607828680cd82c5eb49bc89fc53f22f1af5182d0 665312ea4176f6602e8140d6d9fe6d6b258aeb47 a38162bb0e0970b1a4bc232d1e520be8ba6047d0 0095e85c844f9fd3197dc6e8a9811d90b4509423 f06427dc0612132a9e0027c9dc8faafc26c6d38d ea5a9b58ab921918dd85c5361bb59e1e1e310796 df1584210cc753654a76add6a0087d09d8108f29 82663b2a1f91ffab79407e8db32cbdf9b9bca2ea 0466635bb80f58006175f9ee8e5906233374ebd2 c4b10976d99ba6d498bc659265f791f70536b701 3b1d804a6f37b2b7c1a33d2b15cec57f3ed18a37 d55c72f3838ca35e9f98b079353f3d4cf62959a5 d5e48e59edccef94ca3b29085af7fe8e4db29772 78bcbff19f6ee2de76ce9b7fe658e9cd5a741af5 571cb6768f860cc793b535a3ef05bda2cf81ccd1 195f83a3436966c719acb44f85df053dc7231c80 e3550810046ffb13ccc97a3dea12e28b18da32f2 e48f6f05cc22210e3c64cace266dd3afc486ba9c f3960f714e39a104db6f89858933610d2b80432d e2473e6e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [21:5a:f4:02:a7:d3:46:8f:e2:a2:8f:06:5e:7d:26:e5:16:d3:6a:d0] modulus: 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 public exponent: 10001 ] 2022-09-10 06:23:13.266  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-10 06:23:13.270 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-10 06:23:13.272 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 06:23:13.273 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-10 06:23:13.274  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 06:23:13.275  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-10 06:23:13.275  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-10 06:23:13.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 06:23:13.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-10 06:23:13.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-10 06:23:13.285 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-10 06:23:13.286 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:23:13.287 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:23:13.287 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:23:14.031  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-10 06:23:14.032  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-10 06:23:14.033 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-10 06:23:14.033 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:23:14.039  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-10 06:23:14.045  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-10 06:23:14.045 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:23:14.045 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:23:14.045 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:23:14.046 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:23:14.046 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:23:14.047 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:23:14.048 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:23:14.048 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:23:14.048 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:23:14.049 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-10 06:23:14.052 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42174110481649479155600662499698993563733490702 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 10 05:04:22 UTC 2022 Final Date: Thu Sep 09 05:04:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:30:9c:6f:b9:5e:2d:9f:ec:95:77:d2:1a:13:24:6b:4c:cc:dc:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 607828680cd82c5eb49bc89fc53f22f1af5182d0 665312ea4176f6602e8140d6d9fe6d6b258aeb47 a38162bb0e0970b1a4bc232d1e520be8ba6047d0 0095e85c844f9fd3197dc6e8a9811d90b4509423 f06427dc0612132a9e0027c9dc8faafc26c6d38d ea5a9b58ab921918dd85c5361bb59e1e1e310796 df1584210cc753654a76add6a0087d09d8108f29 82663b2a1f91ffab79407e8db32cbdf9b9bca2ea 0466635bb80f58006175f9ee8e5906233374ebd2 c4b10976d99ba6d498bc659265f791f70536b701 3b1d804a6f37b2b7c1a33d2b15cec57f3ed18a37 d55c72f3838ca35e9f98b079353f3d4cf62959a5 d5e48e59edccef94ca3b29085af7fe8e4db29772 78bcbff19f6ee2de76ce9b7fe658e9cd5a741af5 571cb6768f860cc793b535a3ef05bda2cf81ccd1 195f83a3436966c719acb44f85df053dc7231c80 e3550810046ffb13ccc97a3dea12e28b18da32f2 e48f6f05cc22210e3c64cace266dd3afc486ba9c f3960f714e39a104db6f89858933610d2b80432d e2473e6e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dd:28:23:46:23:2e:0c:2a:93:9c:03:53:48:a5:ae:2a:6c:a6:9e:bf] modulus: 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 public exponent: 10001 ] 2022-09-10 06:26:37.228  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-10 06:26:37.231 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-10 06:26:37.233 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 06:26:37.234 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-10 06:26:37.235  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 06:26:37.235  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-10 06:26:37.236  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-10 06:26:37.236 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 06:26:37.236 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-10 06:26:37.237 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-10 06:26:37.242 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-10 06:26:37.243 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:26:37.243 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:26:37.243 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:26:37.642  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-10 06:26:37.644  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-10 06:26:37.644 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-10 06:26:37.645 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:26:37.649  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-10 06:26:37.650  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-10 06:26:37.651 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:26:37.652 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:26:37.652 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:26:37.654 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:26:37.654 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:26:37.654 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:26:37.655 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:26:37.655 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:26:37.655 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:26:37.656 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-10 06:26:37.659 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42174110481649479155600662499698993563733490702 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 10 05:04:22 UTC 2022 Final Date: Thu Sep 09 05:04:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:30:9c:6f:b9:5e:2d:9f:ec:95:77:d2:1a:13:24:6b:4c:cc:dc:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 607828680cd82c5eb49bc89fc53f22f1af5182d0 665312ea4176f6602e8140d6d9fe6d6b258aeb47 a38162bb0e0970b1a4bc232d1e520be8ba6047d0 0095e85c844f9fd3197dc6e8a9811d90b4509423 f06427dc0612132a9e0027c9dc8faafc26c6d38d ea5a9b58ab921918dd85c5361bb59e1e1e310796 df1584210cc753654a76add6a0087d09d8108f29 82663b2a1f91ffab79407e8db32cbdf9b9bca2ea 0466635bb80f58006175f9ee8e5906233374ebd2 c4b10976d99ba6d498bc659265f791f70536b701 3b1d804a6f37b2b7c1a33d2b15cec57f3ed18a37 d55c72f3838ca35e9f98b079353f3d4cf62959a5 d5e48e59edccef94ca3b29085af7fe8e4db29772 78bcbff19f6ee2de76ce9b7fe658e9cd5a741af5 571cb6768f860cc793b535a3ef05bda2cf81ccd1 195f83a3436966c719acb44f85df053dc7231c80 e3550810046ffb13ccc97a3dea12e28b18da32f2 e48f6f05cc22210e3c64cace266dd3afc486ba9c f3960f714e39a104db6f89858933610d2b80432d e2473e6e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:95:58:bc:71:15:61:81:be:d2:a6:b5:58:74:dc:3a:3a:63:4e:03] modulus: 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 public exponent: 10001 ] 2022-09-10 06:28:26.937  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-10 06:28:26.939 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-10 06:28:26.941 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-09-10 06:28:26.942 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-10 06:28:26.943  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-09-10 06:28:26.944  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-10 06:28:26.945  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-10 06:28:26.945 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 06:28:26.946 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-10 06:28:26.946 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-10 06:28:26.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-10 06:28:26.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:28:26.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:28:26.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:28:27.422  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-10 06:28:27.423  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-10 06:28:27.424 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-10 06:28:27.424 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:28:27.426  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-10 06:28:27.427  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-10 06:28:27.427 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:28:27.428 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:28:27.428 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:28:27.429 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:28:27.429 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:28:27.429 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:28:27.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:28:27.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:28:27.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:28:27.431 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-10 06:28:27.434 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42174110481649479155600662499698993563733490702 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 10 05:04:22 UTC 2022 Final Date: Thu Sep 09 05:04:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:30:9c:6f:b9:5e:2d:9f:ec:95:77:d2:1a:13:24:6b:4c:cc:dc:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 607828680cd82c5eb49bc89fc53f22f1af5182d0 665312ea4176f6602e8140d6d9fe6d6b258aeb47 a38162bb0e0970b1a4bc232d1e520be8ba6047d0 0095e85c844f9fd3197dc6e8a9811d90b4509423 f06427dc0612132a9e0027c9dc8faafc26c6d38d ea5a9b58ab921918dd85c5361bb59e1e1e310796 df1584210cc753654a76add6a0087d09d8108f29 82663b2a1f91ffab79407e8db32cbdf9b9bca2ea 0466635bb80f58006175f9ee8e5906233374ebd2 c4b10976d99ba6d498bc659265f791f70536b701 3b1d804a6f37b2b7c1a33d2b15cec57f3ed18a37 d55c72f3838ca35e9f98b079353f3d4cf62959a5 d5e48e59edccef94ca3b29085af7fe8e4db29772 78bcbff19f6ee2de76ce9b7fe658e9cd5a741af5 571cb6768f860cc793b535a3ef05bda2cf81ccd1 195f83a3436966c719acb44f85df053dc7231c80 e3550810046ffb13ccc97a3dea12e28b18da32f2 e48f6f05cc22210e3c64cace266dd3afc486ba9c f3960f714e39a104db6f89858933610d2b80432d e2473e6e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e9:f5:93:a6:da:ad:1e:be:ce:13:91:0c:f0:95:1e:ae:46:d2:78:9b] modulus: dd5f88c796ead20f3fb6fcbe036dc85c3576067a00b08e8aa727337f0c998bcf6ad356a1e68a092ce6e00602465401b3b448809216133b1928d582d94a28ca563545207e52cfbe91386496046f4f69118edd7de6478684fb4de12a9bfd07863e10c44ac3e0ef211680f53a9e2e56f0c9fec9281c464bd18ac240db682d2e367fee8b5cd74540d3f4cf07313e56a8a395ef45c7940517e09b99ebef5d3b6f528639f71eece9753a3f4946a44f310f3bcf2ec03c1e5421bcb0c2f8e1706594d3796bcabc339ee909554eee53a369b7f4ec6e5016312997dd00ca8e7702fc6661ab7bb5ebd855177d148eed0e67050d7241dfc4dca16afa37d62300e2b472db4cd7 public exponent: 10001 ] 2022-09-10 06:31:12.620  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-10 06:31:12.622 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-10 06:31:12.625 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 06:31:12.626 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-10 06:31:12.626  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 06:31:12.627  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-10 06:31:12.627  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-10 06:31:12.628 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 06:31:12.628 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-10 06:31:12.628 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-10 06:31:12.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-10 06:31:12.633 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:31:12.633 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:31:12.633 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:31:13.116  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-10 06:31:13.117  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-10 06:31:13.118 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-10 06:31:13.118 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:31:13.120  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-10 06:31:13.121  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-10 06:31:13.121 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:31:13.121 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:31:13.122 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:31:13.123 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:31:13.123 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:31:13.123 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:31:13.124 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:31:13.124 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:31:13.124 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:31:13.125 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-10 06:31:13.128 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42174110481649479155600662499698993563733490702 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 10 05:04:22 UTC 2022 Final Date: Thu Sep 09 05:04:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:30:9c:6f:b9:5e:2d:9f:ec:95:77:d2:1a:13:24:6b:4c:cc:dc:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 607828680cd82c5eb49bc89fc53f22f1af5182d0 665312ea4176f6602e8140d6d9fe6d6b258aeb47 a38162bb0e0970b1a4bc232d1e520be8ba6047d0 0095e85c844f9fd3197dc6e8a9811d90b4509423 f06427dc0612132a9e0027c9dc8faafc26c6d38d ea5a9b58ab921918dd85c5361bb59e1e1e310796 df1584210cc753654a76add6a0087d09d8108f29 82663b2a1f91ffab79407e8db32cbdf9b9bca2ea 0466635bb80f58006175f9ee8e5906233374ebd2 c4b10976d99ba6d498bc659265f791f70536b701 3b1d804a6f37b2b7c1a33d2b15cec57f3ed18a37 d55c72f3838ca35e9f98b079353f3d4cf62959a5 d5e48e59edccef94ca3b29085af7fe8e4db29772 78bcbff19f6ee2de76ce9b7fe658e9cd5a741af5 571cb6768f860cc793b535a3ef05bda2cf81ccd1 195f83a3436966c719acb44f85df053dc7231c80 e3550810046ffb13ccc97a3dea12e28b18da32f2 e48f6f05cc22210e3c64cace266dd3afc486ba9c f3960f714e39a104db6f89858933610d2b80432d e2473e6e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c7:ff:e6:17:9b:55:cc:9d:79:9a:a3:db:26:ac:42:a0:0d:ce:f8:85] modulus: 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 public exponent: 10001 ] 2022-09-10 06:36:17.502  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-10 06:36:17.505 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-10 06:36:17.506 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-09-10 06:36:17.507 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-10 06:36:17.507  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-09-10 06:36:17.508  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-10 06:36:17.508  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-10 06:36:17.508 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 06:36:17.509 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-10 06:36:17.509 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-10 06:36:17.515 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-10 06:36:17.516 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:36:17.516 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:36:17.517 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:36:18.022  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-10 06:36:18.023  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-10 06:36:18.023 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-10 06:36:18.024 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:36:18.026  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-10 06:36:18.027  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-10 06:36:18.027 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:36:18.027 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:36:18.027 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:36:18.028 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:36:18.028 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:36:18.028 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:36:18.029 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:36:18.029 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:36:18.029 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:36:18.030 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-10 06:36:18.033 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42174110481649479155600662499698993563733490702 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 10 05:04:22 UTC 2022 Final Date: Thu Sep 09 05:04:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:30:9c:6f:b9:5e:2d:9f:ec:95:77:d2:1a:13:24:6b:4c:cc:dc:8e] modulus: c69e95dbe8d5ac7f3ad91a558e7af68f72e63ffb9e4d5d7090d7235d4a91700269d125199e7e970421dc0d405f5f918d448edc19cec9c7b6611d6606ea72a8a9d50d5d1158f2b2641ac4885080bdebc9c2cd7a8e67bef1a455396220299704a46fa02c7b739fd60ca386939609b1a6fec63dafdfd03041288ab62eb4ea98f02c2929e6c23833a93cdd4d7b9e0920c5d6b1609840823e59657804292857edf5d09f20d4cdec7e038ada83085109b0387b49e71e84bbcfe2b76f1d3d08d3569f85fcf4021c3c7c940659d0fb90b86b62c861cc06f7d1b446b179158ec908dd9381bd1d0cd839edb27a46b09563083432bee08fc8f1d0d16f504cf642c50f1ae5e26551fda102173e8f02f40bf9f87f9b7a72d7728fa97b68f1c10d8d3bb095c4476783d6c2802b1b733394078946768fbc3016bb8272488d11de97fccacc3487313bed840f578d214ebafb43aefea1ef7b44d28db48c0c5c1b8f6597d3489f9c066264d4acd28b83180fddc68f44ae85c44505358fa9fbc1fa01dd0c9c3bf9b58d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 607828680cd82c5eb49bc89fc53f22f1af5182d0 665312ea4176f6602e8140d6d9fe6d6b258aeb47 a38162bb0e0970b1a4bc232d1e520be8ba6047d0 0095e85c844f9fd3197dc6e8a9811d90b4509423 f06427dc0612132a9e0027c9dc8faafc26c6d38d ea5a9b58ab921918dd85c5361bb59e1e1e310796 df1584210cc753654a76add6a0087d09d8108f29 82663b2a1f91ffab79407e8db32cbdf9b9bca2ea 0466635bb80f58006175f9ee8e5906233374ebd2 c4b10976d99ba6d498bc659265f791f70536b701 3b1d804a6f37b2b7c1a33d2b15cec57f3ed18a37 d55c72f3838ca35e9f98b079353f3d4cf62959a5 d5e48e59edccef94ca3b29085af7fe8e4db29772 78bcbff19f6ee2de76ce9b7fe658e9cd5a741af5 571cb6768f860cc793b535a3ef05bda2cf81ccd1 195f83a3436966c719acb44f85df053dc7231c80 e3550810046ffb13ccc97a3dea12e28b18da32f2 e48f6f05cc22210e3c64cace266dd3afc486ba9c f3960f714e39a104db6f89858933610d2b80432d e2473e6e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7b:65:74:c5:77:2d:c9:5e:38:fa:6b:4f:76:35:9c:a2:5b:32:23:bd] modulus: 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 public exponent: 10001 ] 2022-09-10 06:38:26.837  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-10 06:38:26.838 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-10 06:38:26.840 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 06:38:26.841 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-10 06:38:26.841  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 06:38:26.842  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-10 06:38:26.842  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-10 06:38:26.842 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 06:38:26.842 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-10 06:38:26.843 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-10 06:38:26.847 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-10 06:38:26.848 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:38:26.848 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:38:26.848 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:38:27.125  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-10 06:38:27.126  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-10 06:38:27.126 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-10 06:38:27.126 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:38:27.128  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-10 06:38:27.129  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-10 06:38:27.129 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:38:27.130 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:38:27.130 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:38:27.131 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:38:27.131 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:38:27.132 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:38:27.132 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:38:27.133 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:38:27.133 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:38:27.133 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-10 06:38:27.136 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42174110481649479155600662499698993563733490702 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 10 05:04:22 UTC 2022 Final Date: Thu Sep 09 05:04:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:30:9c:6f:b9:5e:2d:9f:ec:95:77:d2:1a:13:24:6b:4c:cc:dc:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 607828680cd82c5eb49bc89fc53f22f1af5182d0 665312ea4176f6602e8140d6d9fe6d6b258aeb47 a38162bb0e0970b1a4bc232d1e520be8ba6047d0 0095e85c844f9fd3197dc6e8a9811d90b4509423 f06427dc0612132a9e0027c9dc8faafc26c6d38d ea5a9b58ab921918dd85c5361bb59e1e1e310796 df1584210cc753654a76add6a0087d09d8108f29 82663b2a1f91ffab79407e8db32cbdf9b9bca2ea 0466635bb80f58006175f9ee8e5906233374ebd2 c4b10976d99ba6d498bc659265f791f70536b701 3b1d804a6f37b2b7c1a33d2b15cec57f3ed18a37 d55c72f3838ca35e9f98b079353f3d4cf62959a5 d5e48e59edccef94ca3b29085af7fe8e4db29772 78bcbff19f6ee2de76ce9b7fe658e9cd5a741af5 571cb6768f860cc793b535a3ef05bda2cf81ccd1 195f83a3436966c719acb44f85df053dc7231c80 e3550810046ffb13ccc97a3dea12e28b18da32f2 e48f6f05cc22210e3c64cace266dd3afc486ba9c f3960f714e39a104db6f89858933610d2b80432d e2473e6e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fe:12:73:c5:0b:89:cd:2c:9b:26:c5:50:cc:3f:3d:92:19:35:88:7d] modulus: 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 public exponent: 10001 ] 2022-09-10 06:42:17.658  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-10 06:42:17.662 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-10 06:42:17.666 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 06:42:17.669 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-10 06:42:17.669  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 06:42:17.670  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-10 06:42:17.670  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-10 06:42:17.670 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 06:42:17.671 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-10 06:42:17.671 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-10 06:42:17.677 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-10 06:42:17.678 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:42:17.678 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:42:17.678 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:42:18.151  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-10 06:42:18.152  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-10 06:42:18.153 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-10 06:42:18.154 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:42:18.156  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-10 06:42:18.157  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-10 06:42:18.158 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:42:18.158 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:42:18.159 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:42:18.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:42:18.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:42:18.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:42:18.162 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:42:18.162 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:42:18.162 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:42:18.163 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-10 06:42:18.166 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42174110481649479155600662499698993563733490702 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 10 05:04:22 UTC 2022 Final Date: Thu Sep 09 05:04:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:30:9c:6f:b9:5e:2d:9f:ec:95:77:d2:1a:13:24:6b:4c:cc:dc:8e] modulus: c69e95dbe8d5ac7f3ad91a558e7af68f72e63ffb9e4d5d7090d7235d4a91700269d125199e7e970421dc0d405f5f918d448edc19cec9c7b6611d6606ea72a8a9d50d5d1158f2b2641ac4885080bdebc9c2cd7a8e67bef1a455396220299704a46fa02c7b739fd60ca386939609b1a6fec63dafdfd03041288ab62eb4ea98f02c2929e6c23833a93cdd4d7b9e0920c5d6b1609840823e59657804292857edf5d09f20d4cdec7e038ada83085109b0387b49e71e84bbcfe2b76f1d3d08d3569f85fcf4021c3c7c940659d0fb90b86b62c861cc06f7d1b446b179158ec908dd9381bd1d0cd839edb27a46b09563083432bee08fc8f1d0d16f504cf642c50f1ae5e26551fda102173e8f02f40bf9f87f9b7a72d7728fa97b68f1c10d8d3bb095c4476783d6c2802b1b733394078946768fbc3016bb8272488d11de97fccacc3487313bed840f578d214ebafb43aefea1ef7b44d28db48c0c5c1b8f6597d3489f9c066264d4acd28b83180fddc68f44ae85c44505358fa9fbc1fa01dd0c9c3bf9b58d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 607828680cd82c5eb49bc89fc53f22f1af5182d0 665312ea4176f6602e8140d6d9fe6d6b258aeb47 a38162bb0e0970b1a4bc232d1e520be8ba6047d0 0095e85c844f9fd3197dc6e8a9811d90b4509423 f06427dc0612132a9e0027c9dc8faafc26c6d38d ea5a9b58ab921918dd85c5361bb59e1e1e310796 df1584210cc753654a76add6a0087d09d8108f29 82663b2a1f91ffab79407e8db32cbdf9b9bca2ea 0466635bb80f58006175f9ee8e5906233374ebd2 c4b10976d99ba6d498bc659265f791f70536b701 3b1d804a6f37b2b7c1a33d2b15cec57f3ed18a37 d55c72f3838ca35e9f98b079353f3d4cf62959a5 d5e48e59edccef94ca3b29085af7fe8e4db29772 78bcbff19f6ee2de76ce9b7fe658e9cd5a741af5 571cb6768f860cc793b535a3ef05bda2cf81ccd1 195f83a3436966c719acb44f85df053dc7231c80 e3550810046ffb13ccc97a3dea12e28b18da32f2 e48f6f05cc22210e3c64cace266dd3afc486ba9c f3960f714e39a104db6f89858933610d2b80432d e2473e6e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f1:d7:d9:32:69:a0:f9:3f:5e:81:2e:6a:a2:62:dd:c7:3d:7b:f0:9e] modulus: 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 public exponent: 10001 ] 2022-09-10 06:43:51.127  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-10 06:43:51.129 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-10 06:43:51.131 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-09-10 06:43:51.132 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-10 06:43:51.133  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-09-10 06:43:51.134  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-10 06:43:51.134  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-10 06:43:51.134 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 06:43:51.135 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-10 06:43:51.135 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-10 06:43:51.139 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-10 06:43:51.139 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:43:51.140 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:43:51.140 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:43:51.756  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-10 06:43:51.756  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-10 06:43:51.757 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-10 06:43:51.757 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:43:51.759  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-10 06:43:51.759  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-10 06:43:51.760 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:43:51.761 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:43:51.761 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:43:51.763 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:43:51.763 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:43:51.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:43:51.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:43:51.765 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:43:51.765 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:43:51.766 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-10 06:43:51.768 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42174110481649479155600662499698993563733490702 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 10 05:04:22 UTC 2022 Final Date: Thu Sep 09 05:04:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:30:9c:6f:b9:5e:2d:9f:ec:95:77:d2:1a:13:24:6b:4c:cc:dc:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 607828680cd82c5eb49bc89fc53f22f1af5182d0 665312ea4176f6602e8140d6d9fe6d6b258aeb47 a38162bb0e0970b1a4bc232d1e520be8ba6047d0 0095e85c844f9fd3197dc6e8a9811d90b4509423 f06427dc0612132a9e0027c9dc8faafc26c6d38d ea5a9b58ab921918dd85c5361bb59e1e1e310796 df1584210cc753654a76add6a0087d09d8108f29 82663b2a1f91ffab79407e8db32cbdf9b9bca2ea 0466635bb80f58006175f9ee8e5906233374ebd2 c4b10976d99ba6d498bc659265f791f70536b701 3b1d804a6f37b2b7c1a33d2b15cec57f3ed18a37 d55c72f3838ca35e9f98b079353f3d4cf62959a5 d5e48e59edccef94ca3b29085af7fe8e4db29772 78bcbff19f6ee2de76ce9b7fe658e9cd5a741af5 571cb6768f860cc793b535a3ef05bda2cf81ccd1 195f83a3436966c719acb44f85df053dc7231c80 e3550810046ffb13ccc97a3dea12e28b18da32f2 e48f6f05cc22210e3c64cace266dd3afc486ba9c f3960f714e39a104db6f89858933610d2b80432d e2473e6e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2f:6c:d8:08:5d:cd:20:90:2a:0a:e9:79:2b:15:b3:48:b4:a2:03:d8] modulus: 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 public exponent: 10001 ] 2022-09-10 06:48:21.986  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-10 06:48:21.989 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-10 06:48:21.992 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-10 06:48:21.993 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-10 06:48:21.994  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-10 06:48:21.994  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-10 06:48:21.996  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-10 06:48:21.997 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 06:48:21.998 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-10 06:48:21.998 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-10 06:48:22.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-10 06:48:22.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:48:22.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:48:22.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:48:22.897  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-10 06:48:22.898  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-10 06:48:22.899 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-10 06:48:22.899 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:48:22.901  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-10 06:48:22.901  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-10 06:48:22.902 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:48:22.902 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:48:22.902 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:48:22.903 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:48:22.903 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:48:22.903 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:48:22.904 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:48:22.904 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:48:22.904 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:48:22.905 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-10 06:48:22.908 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42174110481649479155600662499698993563733490702 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 10 05:04:22 UTC 2022 Final Date: Thu Sep 09 05:04:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:30:9c:6f:b9:5e:2d:9f:ec:95:77:d2:1a:13:24:6b:4c:cc:dc:8e] modulus: c69e95dbe8d5ac7f3ad91a558e7af68f72e63ffb9e4d5d7090d7235d4a91700269d125199e7e970421dc0d405f5f918d448edc19cec9c7b6611d6606ea72a8a9d50d5d1158f2b2641ac4885080bdebc9c2cd7a8e67bef1a455396220299704a46fa02c7b739fd60ca386939609b1a6fec63dafdfd03041288ab62eb4ea98f02c2929e6c23833a93cdd4d7b9e0920c5d6b1609840823e59657804292857edf5d09f20d4cdec7e038ada83085109b0387b49e71e84bbcfe2b76f1d3d08d3569f85fcf4021c3c7c940659d0fb90b86b62c861cc06f7d1b446b179158ec908dd9381bd1d0cd839edb27a46b09563083432bee08fc8f1d0d16f504cf642c50f1ae5e26551fda102173e8f02f40bf9f87f9b7a72d7728fa97b68f1c10d8d3bb095c4476783d6c2802b1b733394078946768fbc3016bb8272488d11de97fccacc3487313bed840f578d214ebafb43aefea1ef7b44d28db48c0c5c1b8f6597d3489f9c066264d4acd28b83180fddc68f44ae85c44505358fa9fbc1fa01dd0c9c3bf9b58d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 607828680cd82c5eb49bc89fc53f22f1af5182d0 665312ea4176f6602e8140d6d9fe6d6b258aeb47 a38162bb0e0970b1a4bc232d1e520be8ba6047d0 0095e85c844f9fd3197dc6e8a9811d90b4509423 f06427dc0612132a9e0027c9dc8faafc26c6d38d ea5a9b58ab921918dd85c5361bb59e1e1e310796 df1584210cc753654a76add6a0087d09d8108f29 82663b2a1f91ffab79407e8db32cbdf9b9bca2ea 0466635bb80f58006175f9ee8e5906233374ebd2 c4b10976d99ba6d498bc659265f791f70536b701 3b1d804a6f37b2b7c1a33d2b15cec57f3ed18a37 d55c72f3838ca35e9f98b079353f3d4cf62959a5 d5e48e59edccef94ca3b29085af7fe8e4db29772 78bcbff19f6ee2de76ce9b7fe658e9cd5a741af5 571cb6768f860cc793b535a3ef05bda2cf81ccd1 195f83a3436966c719acb44f85df053dc7231c80 e3550810046ffb13ccc97a3dea12e28b18da32f2 e48f6f05cc22210e3c64cace266dd3afc486ba9c f3960f714e39a104db6f89858933610d2b80432d e2473e6e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:5a:6a:19:55:b8:67:53:8f:0b:22:88:a7:b4:4d:e9:59:c9:05:a7] modulus: c79c71355dca43a7df433bbdb7f900125bf8bd39774b37ee30b90cd49677762cc909b45cd49f3dc38f2f6744f07fffe99cc5d1f91001280019037815493e8a3efc887ec50dc373797d106f62913c6288fb47a76b3e85f442b8c5f805133597896e95c518573dd10bc7235033f079081a02957d5b8a14db6195ccee2f57ed85f82e064fd3fd863e517403ded3d490c3f24bb020c234027d3a7181806bef70f9358e859503dd2a3c203955add1a909c92871d977d9a5e7e5367846c42f62b966adbfa792c28ff5945f37d07b72ac9f668e27f652c01c3a8d70bc81e72c04184c98397edec25c46b5235dbb9988dac053a86d2178dc1e1c3eea694eba4e75d438e1 public exponent: 10001 ] 2022-09-10 06:48:37.754  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-10 06:48:37.756 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-10 06:48:37.758 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-10 06:48:37.758 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-10 06:48:37.759  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-10 06:48:37.759  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-10 06:48:37.760  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-10 06:48:37.760 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 06:48:37.760 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-10 06:48:37.761 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-10 06:48:37.765 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-10 06:48:37.765 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:48:37.765 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:48:37.765 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:48:38.117  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-10 06:48:38.117  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-10 06:48:38.118 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-10 06:48:38.118 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:48:38.120  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-10 06:48:38.120  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-10 06:48:38.121 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:48:38.121 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:48:38.121 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:48:38.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:48:38.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:48:38.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:48:38.123 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:48:38.123 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:48:38.124 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:48:38.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-10 06:48:38.129 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42174110481649479155600662499698993563733490702 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 10 05:04:22 UTC 2022 Final Date: Thu Sep 09 05:04:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:30:9c:6f:b9:5e:2d:9f:ec:95:77:d2:1a:13:24:6b:4c:cc:dc:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 607828680cd82c5eb49bc89fc53f22f1af5182d0 665312ea4176f6602e8140d6d9fe6d6b258aeb47 a38162bb0e0970b1a4bc232d1e520be8ba6047d0 0095e85c844f9fd3197dc6e8a9811d90b4509423 f06427dc0612132a9e0027c9dc8faafc26c6d38d ea5a9b58ab921918dd85c5361bb59e1e1e310796 df1584210cc753654a76add6a0087d09d8108f29 82663b2a1f91ffab79407e8db32cbdf9b9bca2ea 0466635bb80f58006175f9ee8e5906233374ebd2 c4b10976d99ba6d498bc659265f791f70536b701 3b1d804a6f37b2b7c1a33d2b15cec57f3ed18a37 d55c72f3838ca35e9f98b079353f3d4cf62959a5 d5e48e59edccef94ca3b29085af7fe8e4db29772 78bcbff19f6ee2de76ce9b7fe658e9cd5a741af5 571cb6768f860cc793b535a3ef05bda2cf81ccd1 195f83a3436966c719acb44f85df053dc7231c80 e3550810046ffb13ccc97a3dea12e28b18da32f2 e48f6f05cc22210e3c64cace266dd3afc486ba9c f3960f714e39a104db6f89858933610d2b80432d e2473e6e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1a:17:e9:e0:75:e6:d0:09:7f:81:b8:c0:36:a6:43:a3:d4:a4:4a:98] modulus: b5b317e6eb5d74e7c5213cbb1a9af9775c54900029ac75e00163de5bf01678bc9b5034872c4dfbe1ead67727122fa8280543472917c85ae6d5f50bd233f9f959d5edd5892130d5192c35a926448dcf0da80702585f8b4c7cd3cd598cc1827f42cb36497749045e2cce38c157062578230f396e72528fbf3cbff3e16da7b630b1eef6daf8f05cc4f9e6b14a7ffe09ab9e0fd402e8a3855ffca97d3eb0dffcadf3434f5853feb68d26cec7817d3d20aa59e6095ac22c6508441624ebbdeb952581ef7c129374afec63c505d317e9ecbc04fa9d3780d1ed74a299bf5a03d0626d4bfe251c2e6ed5073c3f74d5892d6379ef8cb9f1a35130c0ab5391b84f63fb54e1 public exponent: 10001 ] 2022-09-10 06:49:58.682  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-10 06:49:58.683 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-10 06:49:58.686 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 06:49:58.686 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-10 06:49:58.687  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 06:49:58.687  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-10 06:49:58.687  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-10 06:49:58.687 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 06:49:58.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-10 06:49:58.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-10 06:49:58.694 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-10 06:49:58.694 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:49:58.695 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:49:58.695 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:49:59.450  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-10 06:49:59.451  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-10 06:49:59.452 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-10 06:49:59.452 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:49:59.454  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-10 06:49:59.454  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-10 06:49:59.455 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:49:59.456 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:49:59.456 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:49:59.457 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:49:59.458 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:49:59.458 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:49:59.459 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:49:59.459 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:49:59.459 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:49:59.460 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-10 06:49:59.463 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42174110481649479155600662499698993563733490702 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 10 05:04:22 UTC 2022 Final Date: Thu Sep 09 05:04:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:30:9c:6f:b9:5e:2d:9f:ec:95:77:d2:1a:13:24:6b:4c:cc:dc:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 607828680cd82c5eb49bc89fc53f22f1af5182d0 665312ea4176f6602e8140d6d9fe6d6b258aeb47 a38162bb0e0970b1a4bc232d1e520be8ba6047d0 0095e85c844f9fd3197dc6e8a9811d90b4509423 f06427dc0612132a9e0027c9dc8faafc26c6d38d ea5a9b58ab921918dd85c5361bb59e1e1e310796 df1584210cc753654a76add6a0087d09d8108f29 82663b2a1f91ffab79407e8db32cbdf9b9bca2ea 0466635bb80f58006175f9ee8e5906233374ebd2 c4b10976d99ba6d498bc659265f791f70536b701 3b1d804a6f37b2b7c1a33d2b15cec57f3ed18a37 d55c72f3838ca35e9f98b079353f3d4cf62959a5 d5e48e59edccef94ca3b29085af7fe8e4db29772 78bcbff19f6ee2de76ce9b7fe658e9cd5a741af5 571cb6768f860cc793b535a3ef05bda2cf81ccd1 195f83a3436966c719acb44f85df053dc7231c80 e3550810046ffb13ccc97a3dea12e28b18da32f2 e48f6f05cc22210e3c64cace266dd3afc486ba9c f3960f714e39a104db6f89858933610d2b80432d e2473e6e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:1b:67:ef:17:19:69:6a:22:d4:b7:0c:db:25:0b:b9:fd:41:3e:a5] modulus: cec5eb359ae64648654268fc313cba89acbc91f15ed4aea31e659eb5a2315aed886a626e20e4e1f29e61394681443fa4cc379f1a586018c2ee26ef0cd6ec0019a50aa3d0d96aeb5cb72894cad4b57256e8172c80136d6c1b6921af589ff6159c590d198a1363a8dddb58548a85c7a871793cd11448889444ce126efca16076a90c9470aaa4bef87298bf543235417d1854b8bb2b8a28f3f0610a8edd3916c680bfd556e1fb313685518312f019087849b8b9498fa430cdff7c0ff3c0c3a4f3a7386d22a6400e8e3a307e9440768097d51f462782e32b0a43ee7e47d0ed36b8d55cb3d3c9f34db46af8d606d4e6e2de9443c0ddc9fc0f58adf13f197eb5ac765f public exponent: 10001 ] 2022-09-10 06:54:14.582  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-10 06:54:14.584 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-10 06:54:14.586 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 06:54:14.587 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-10 06:54:14.587  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 06:54:14.588  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-10 06:54:14.588  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-10 06:54:14.588 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 06:54:14.588 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-10 06:54:14.589 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-10 06:54:14.592 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-10 06:54:14.592 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:54:14.593 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 06:54:14.593 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:54:15.248  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-10 06:54:15.249  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-10 06:54:15.249 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-10 06:54:15.249 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 06:54:15.251  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-10 06:54:15.253  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-10 06:54:15.253 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:54:15.253 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:54:15.253 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:54:15.254 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:54:15.254 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:54:15.255 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:54:15.256 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 06:54:15.256 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 06:54:15.256 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 06:54:15.257 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-10 06:54:15.261 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42174110481649479155600662499698993563733490702 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 10 05:04:22 UTC 2022 Final Date: Thu Sep 09 05:04:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:30:9c:6f:b9:5e:2d:9f:ec:95:77:d2:1a:13:24:6b:4c:cc:dc:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 607828680cd82c5eb49bc89fc53f22f1af5182d0 665312ea4176f6602e8140d6d9fe6d6b258aeb47 a38162bb0e0970b1a4bc232d1e520be8ba6047d0 0095e85c844f9fd3197dc6e8a9811d90b4509423 f06427dc0612132a9e0027c9dc8faafc26c6d38d ea5a9b58ab921918dd85c5361bb59e1e1e310796 df1584210cc753654a76add6a0087d09d8108f29 82663b2a1f91ffab79407e8db32cbdf9b9bca2ea 0466635bb80f58006175f9ee8e5906233374ebd2 c4b10976d99ba6d498bc659265f791f70536b701 3b1d804a6f37b2b7c1a33d2b15cec57f3ed18a37 d55c72f3838ca35e9f98b079353f3d4cf62959a5 d5e48e59edccef94ca3b29085af7fe8e4db29772 78bcbff19f6ee2de76ce9b7fe658e9cd5a741af5 571cb6768f860cc793b535a3ef05bda2cf81ccd1 195f83a3436966c719acb44f85df053dc7231c80 e3550810046ffb13ccc97a3dea12e28b18da32f2 e48f6f05cc22210e3c64cace266dd3afc486ba9c f3960f714e39a104db6f89858933610d2b80432d e2473e6e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [41:79:bc:ea:af:e0:22:f5:4f:79:dc:b9:82:26:8d:69:d0:f2:94:1f] modulus: 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 public exponent: 10001 ] 2022-09-10 07:00:54.256  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-10 07:00:54.258 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-10 07:00:54.260 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 07:00:54.263 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-10 07:00:54.263  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 07:00:54.264  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-10 07:00:54.264  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-10 07:00:54.265 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 07:00:54.265 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-10 07:00:54.266 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-10 07:00:54.272 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-10 07:00:54.272 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 07:00:54.272 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 07:00:54.273 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 07:00:54.988  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-10 07:00:54.989  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-10 07:00:54.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-10 07:00:54.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 07:00:54.992  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-10 07:00:54.992  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-10 07:00:54.992 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 07:00:54.993 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 07:00:54.993 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 07:00:54.994 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 07:00:54.994 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 07:00:54.994 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 07:00:54.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 07:00:54.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 07:00:54.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 07:00:54.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-10 07:00:54.999 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42174110481649479155600662499698993563733490702 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 10 05:04:22 UTC 2022 Final Date: Thu Sep 09 05:04:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:30:9c:6f:b9:5e:2d:9f:ec:95:77:d2:1a:13:24:6b:4c:cc:dc:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 607828680cd82c5eb49bc89fc53f22f1af5182d0 665312ea4176f6602e8140d6d9fe6d6b258aeb47 a38162bb0e0970b1a4bc232d1e520be8ba6047d0 0095e85c844f9fd3197dc6e8a9811d90b4509423 f06427dc0612132a9e0027c9dc8faafc26c6d38d ea5a9b58ab921918dd85c5361bb59e1e1e310796 df1584210cc753654a76add6a0087d09d8108f29 82663b2a1f91ffab79407e8db32cbdf9b9bca2ea 0466635bb80f58006175f9ee8e5906233374ebd2 c4b10976d99ba6d498bc659265f791f70536b701 3b1d804a6f37b2b7c1a33d2b15cec57f3ed18a37 d55c72f3838ca35e9f98b079353f3d4cf62959a5 d5e48e59edccef94ca3b29085af7fe8e4db29772 78bcbff19f6ee2de76ce9b7fe658e9cd5a741af5 571cb6768f860cc793b535a3ef05bda2cf81ccd1 195f83a3436966c719acb44f85df053dc7231c80 e3550810046ffb13ccc97a3dea12e28b18da32f2 e48f6f05cc22210e3c64cace266dd3afc486ba9c f3960f714e39a104db6f89858933610d2b80432d e2473e6e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cb:94:1d:03:a7:05:14:27:b2:ec:8b:38:e7:22:ce:ea:2d:1c:c0:ea] modulus: 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 public exponent: 10001 ] 2022-09-10 07:05:45.525  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-10 07:05:45.526 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-10 07:05:45.529 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 07:05:45.529 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-10 07:05:45.530  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 07:05:45.530  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-10 07:05:45.531  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-10 07:05:45.531 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 07:05:45.531 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-10 07:05:45.531 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-10 07:05:45.534 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-10 07:05:45.535 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 07:05:45.535 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 07:05:45.535 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 07:05:46.089  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-10 07:05:46.090  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-10 07:05:46.090 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-10 07:05:46.091 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 07:05:46.092  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-10 07:05:46.093  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-10 07:05:46.093 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 07:05:46.094 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 07:05:46.094 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 07:05:46.095 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 07:05:46.095 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 07:05:46.095 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 07:05:46.096 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 07:05:46.096 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 07:05:46.096 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 07:05:46.097 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-10 07:05:46.101 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42174110481649479155600662499698993563733490702 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 10 05:04:22 UTC 2022 Final Date: Thu Sep 09 05:04:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:30:9c:6f:b9:5e:2d:9f:ec:95:77:d2:1a:13:24:6b:4c:cc:dc:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 607828680cd82c5eb49bc89fc53f22f1af5182d0 665312ea4176f6602e8140d6d9fe6d6b258aeb47 a38162bb0e0970b1a4bc232d1e520be8ba6047d0 0095e85c844f9fd3197dc6e8a9811d90b4509423 f06427dc0612132a9e0027c9dc8faafc26c6d38d ea5a9b58ab921918dd85c5361bb59e1e1e310796 df1584210cc753654a76add6a0087d09d8108f29 82663b2a1f91ffab79407e8db32cbdf9b9bca2ea 0466635bb80f58006175f9ee8e5906233374ebd2 c4b10976d99ba6d498bc659265f791f70536b701 3b1d804a6f37b2b7c1a33d2b15cec57f3ed18a37 d55c72f3838ca35e9f98b079353f3d4cf62959a5 d5e48e59edccef94ca3b29085af7fe8e4db29772 78bcbff19f6ee2de76ce9b7fe658e9cd5a741af5 571cb6768f860cc793b535a3ef05bda2cf81ccd1 195f83a3436966c719acb44f85df053dc7231c80 e3550810046ffb13ccc97a3dea12e28b18da32f2 e48f6f05cc22210e3c64cace266dd3afc486ba9c f3960f714e39a104db6f89858933610d2b80432d e2473e6e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [51:c0:43:db:bb:23:ed:65:f3:5f:88:e3:83:fe:6f:9f:c9:95:43:cd] modulus: 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 public exponent: 10001 ] 2022-09-10 07:12:43.436  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-10 07:12:43.440 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-10 07:12:43.444 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 07:12:43.444 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-10 07:12:43.445  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-10 07:12:43.445  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-10 07:12:43.447  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-10 07:12:43.447 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 07:12:43.448 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-10 07:12:43.448 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-10 07:12:43.454 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-10 07:12:43.455 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 07:12:43.455 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 07:12:43.455 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 07:12:43.887  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-10 07:12:43.887  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-10 07:12:43.888 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-10 07:12:43.888 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 07:12:43.889  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-10 07:12:43.889  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-10 07:12:43.889 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 07:12:43.889 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 07:12:43.890 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 07:12:43.890 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 07:12:43.890 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 07:12:43.890 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 07:12:43.891 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 07:12:43.891 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 07:12:43.891 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 07:12:43.891 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-10 07:12:43.895 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42174110481649479155600662499698993563733490702 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 10 05:04:22 UTC 2022 Final Date: Thu Sep 09 05:04:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:30:9c:6f:b9:5e:2d:9f:ec:95:77:d2:1a:13:24:6b:4c:cc:dc:8e] modulus: c69e95dbe8d5ac7f3ad91a558e7af68f72e63ffb9e4d5d7090d7235d4a91700269d125199e7e970421dc0d405f5f918d448edc19cec9c7b6611d6606ea72a8a9d50d5d1158f2b2641ac4885080bdebc9c2cd7a8e67bef1a455396220299704a46fa02c7b739fd60ca386939609b1a6fec63dafdfd03041288ab62eb4ea98f02c2929e6c23833a93cdd4d7b9e0920c5d6b1609840823e59657804292857edf5d09f20d4cdec7e038ada83085109b0387b49e71e84bbcfe2b76f1d3d08d3569f85fcf4021c3c7c940659d0fb90b86b62c861cc06f7d1b446b179158ec908dd9381bd1d0cd839edb27a46b09563083432bee08fc8f1d0d16f504cf642c50f1ae5e26551fda102173e8f02f40bf9f87f9b7a72d7728fa97b68f1c10d8d3bb095c4476783d6c2802b1b733394078946768fbc3016bb8272488d11de97fccacc3487313bed840f578d214ebafb43aefea1ef7b44d28db48c0c5c1b8f6597d3489f9c066264d4acd28b83180fddc68f44ae85c44505358fa9fbc1fa01dd0c9c3bf9b58d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 607828680cd82c5eb49bc89fc53f22f1af5182d0 665312ea4176f6602e8140d6d9fe6d6b258aeb47 a38162bb0e0970b1a4bc232d1e520be8ba6047d0 0095e85c844f9fd3197dc6e8a9811d90b4509423 f06427dc0612132a9e0027c9dc8faafc26c6d38d ea5a9b58ab921918dd85c5361bb59e1e1e310796 df1584210cc753654a76add6a0087d09d8108f29 82663b2a1f91ffab79407e8db32cbdf9b9bca2ea 0466635bb80f58006175f9ee8e5906233374ebd2 c4b10976d99ba6d498bc659265f791f70536b701 3b1d804a6f37b2b7c1a33d2b15cec57f3ed18a37 d55c72f3838ca35e9f98b079353f3d4cf62959a5 d5e48e59edccef94ca3b29085af7fe8e4db29772 78bcbff19f6ee2de76ce9b7fe658e9cd5a741af5 571cb6768f860cc793b535a3ef05bda2cf81ccd1 195f83a3436966c719acb44f85df053dc7231c80 e3550810046ffb13ccc97a3dea12e28b18da32f2 e48f6f05cc22210e3c64cace266dd3afc486ba9c f3960f714e39a104db6f89858933610d2b80432d e2473e6e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:22:19:ff:b5:92:08:81:e9:c0:53:70:c2:a6:72:d6:8e:92:04:c9] modulus: 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 public exponent: 10001 ] 2022-09-10 07:15:01.627  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-10 07:15:01.628 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-10 07:15:01.629 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-10 07:15:01.630 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-10 07:15:01.630  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-10 07:15:01.630  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-10 07:15:01.630  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-10 07:15:01.630 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 07:15:01.631 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-10 07:15:01.631 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-10 07:15:01.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-10 07:15:01.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 07:15:01.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 07:15:01.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 07:15:02.160  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-10 07:15:02.160  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-10 07:15:02.160 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-10 07:15:02.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 07:15:02.161  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-10 07:15:02.162  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-10 07:15:02.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 07:15:02.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 07:15:02.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 07:15:02.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 07:15:02.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 07:15:02.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 07:15:02.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 07:15:02.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 07:15:02.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 07:15:02.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-10 07:15:02.165 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42174110481649479155600662499698993563733490702 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 10 05:04:22 UTC 2022 Final Date: Thu Sep 09 05:04:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:30:9c:6f:b9:5e:2d:9f:ec:95:77:d2:1a:13:24:6b:4c:cc:dc:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 607828680cd82c5eb49bc89fc53f22f1af5182d0 665312ea4176f6602e8140d6d9fe6d6b258aeb47 a38162bb0e0970b1a4bc232d1e520be8ba6047d0 0095e85c844f9fd3197dc6e8a9811d90b4509423 f06427dc0612132a9e0027c9dc8faafc26c6d38d ea5a9b58ab921918dd85c5361bb59e1e1e310796 df1584210cc753654a76add6a0087d09d8108f29 82663b2a1f91ffab79407e8db32cbdf9b9bca2ea 0466635bb80f58006175f9ee8e5906233374ebd2 c4b10976d99ba6d498bc659265f791f70536b701 3b1d804a6f37b2b7c1a33d2b15cec57f3ed18a37 d55c72f3838ca35e9f98b079353f3d4cf62959a5 d5e48e59edccef94ca3b29085af7fe8e4db29772 78bcbff19f6ee2de76ce9b7fe658e9cd5a741af5 571cb6768f860cc793b535a3ef05bda2cf81ccd1 195f83a3436966c719acb44f85df053dc7231c80 e3550810046ffb13ccc97a3dea12e28b18da32f2 e48f6f05cc22210e3c64cace266dd3afc486ba9c f3960f714e39a104db6f89858933610d2b80432d e2473e6e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ff:49:01:21:13:d3:fe:9a:f9:21:18:8c:89:21:9e:cd:b8:ea:b6:44] modulus: c20a33f9c6ce078ba60adc12a86351b3248b99531294845fa7dacef123b807b38a64c43dca7ffee90ace113f8f16387879161dd6bede6eb5af7c571b1d99203bb70c479166a42db5b9b8c43dc20875717082ea6eb5c8ee0dd2131a846ffa0f2cf6d72e03ac5a70a47241d5ef8c1ba048796b75d17b7f7592ea5c240986e25b313aeff31a52308dea2a6c2c894c4f85b3feaa5478c780f25caa1ca2419446c3641bf0fee378f188aafbe9402648ac87629262ef623cfa8ee059efd431859177e27e45745cb1aca990e0296aac802e1e3be05bbdf29f27fbcd8d8c453589828617dcd9eb59d83f389c957040bde6105fb432d739e89f5472e66a1b799fc7f5f7c3 public exponent: 10001 ] 2022-09-10 07:15:13.536  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-10 07:15:13.537 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-10 07:15:13.539 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-10 07:15:13.539 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-10 07:15:13.540  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-10 07:15:13.540  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-10 07:15:13.540  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-10 07:15:13.541 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-10 07:15:13.541 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-10 07:15:13.541 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-10 07:15:13.546 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-10 07:15:13.546 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 07:15:13.546 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-10 07:15:13.546 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 07:15:14.030  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-10 07:15:14.031  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-10 07:15:14.031 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-10 07:15:14.031 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-10 07:15:14.033  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-10 07:15:14.033  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-10 07:15:14.033 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 07:15:14.033 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 07:15:14.033 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 07:15:14.034 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 07:15:14.034 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 07:15:14.034 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 07:15:14.035 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-10 07:15:14.035 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-10 07:15:14.035 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-10 07:15:14.035 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-10 07:15:14.039 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42174110481649479155600662499698993563733490702 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 10 05:04:22 UTC 2022 Final Date: Thu Sep 09 05:04:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e8:30:9c:6f:b9:5e:2d:9f:ec:95:77:d2:1a:13:24:6b:4c:cc:dc:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 607828680cd82c5eb49bc89fc53f22f1af5182d0 665312ea4176f6602e8140d6d9fe6d6b258aeb47 a38162bb0e0970b1a4bc232d1e520be8ba6047d0 0095e85c844f9fd3197dc6e8a9811d90b4509423 f06427dc0612132a9e0027c9dc8faafc26c6d38d ea5a9b58ab921918dd85c5361bb59e1e1e310796 df1584210cc753654a76add6a0087d09d8108f29 82663b2a1f91ffab79407e8db32cbdf9b9bca2ea 0466635bb80f58006175f9ee8e5906233374ebd2 c4b10976d99ba6d498bc659265f791f70536b701 3b1d804a6f37b2b7c1a33d2b15cec57f3ed18a37 d55c72f3838ca35e9f98b079353f3d4cf62959a5 d5e48e59edccef94ca3b29085af7fe8e4db29772 78bcbff19f6ee2de76ce9b7fe658e9cd5a741af5 571cb6768f860cc793b535a3ef05bda2cf81ccd1 195f83a3436966c719acb44f85df053dc7231c80 e3550810046ffb13ccc97a3dea12e28b18da32f2 e48f6f05cc22210e3c64cace266dd3afc486ba9c f3960f714e39a104db6f89858933610d2b80432d e2473e6e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:ff:43:9e:b8:9d:02:f8:73:80:52:be:eb:01:64:a3:50:07:7c:69] modulus: bebf0d0824167627061486150105a8bef17e23461a0a70a4b39e21335d696d294a51627fd9f45b4c5fb5b271188545748235a8f956692deca1b013bdd98965b5115877c34997ce21c8b45f38057b7db8718256b543d726e46391e286e2b4901546737c510e62c30b5771e0c41a4e57805ab9cbfd7c3cd4c0cfb80bd24f4e92fb0dd9aba13efe9e43b1f7863d1e0eb674f3c6c4db5975e135f9e01cb40057498520375a6fb23f7dbd48453a4a7414d112010b61814804e71dcd6eab91867a1fe3179fc919bd549b4a8a91bc61d5f4b0cdcb3dd76e7a8cc57b5fe2bd6a74d3547f9fcbd02b8b79c973dbbb469b81c786c57bef686537a070dd417fbd6ce3e13193 public exponent: 10001 ]