2021-11-17 09:30:22,906 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-17 09:30:23,678 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-17 09:30:24.574  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-11-17 09:30:27.672 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-17 09:30:27.993  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-11-17 09:30:28.144  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-17 09:30:30.370  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.178 seconds (JVM running for 9.976) 2021-11-17 09:31:19.332  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-17 09:31:19.373 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-17 09:31:19.433 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-17 09:31:19.439 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-17 09:31:19.457  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-17 09:31:19.460  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-17 09:31:19.461  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-17 09:31:19.464 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-17 09:31:19.464 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 09:31:19.469 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-17 09:31:19.476 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-17 09:31:19.480 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-17 09:31:19.522 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-17 09:31:19.531 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 09:31:19.532 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 09:31:19.537 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 09:31:20.194  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-17 09:31:20.198  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-17 09:31:20.199 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-17 09:31:20.204 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 09:31:20.216  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-17 09:31:20.217  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-17 09:31:20.218 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 09:31:20.219 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 09:31:20.219 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 09:31:20.234 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 09:31:20.234 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 09:31:20.235 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 09:31:20.242 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 09:31:20.242 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 09:31:20.243 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 09:31:20.245 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-17 09:31:20.278 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495406649795683432921659497421169766613986348825 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 17 09:23:09 UTC 2021 Final Date: Mon Nov 17 09:23:08 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:78:3a:64:9e:fd:12:5b:32:55:47:19:6e:74:be:b0:d1:1c:68:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89c71d843dac2d2a12ada1726b4d92e66e24d4c7 5551fa14d550e52d576cc06acfb3c3b496b60bf8 d68901a9c5b3eb5352d6d5b22c3cceea3f5a10b9 87ae4f12b6719193d46842e4dba6b0e7aef9cce2 5a61013a66b79706b54c75f144fc5d00b0f05dc9 a1f96ee494f4d42d16f9dd92dc0742c7956345d5 52ac2ab30e50a8a520b8fc7892adec9729fdb603 ba1f2ca8ab05da113f05cbdefe05d0db016bfa43 43dd60d65439b9abfdee54e3fed4cd14aee97816 7c1196666489e0595188bb372e1cf6941cb103c4 e4138a986d2c8563d437d07afa0c9c003a4096ef f62d1229ee37f638a8ba6f035426aba312aeddfb ba8749583884576528914f0e496421fb85491845 2edc06062a3c95edbe74f75b40b4adf54945fa23 ac14e1315d02f7405f5edce6b6d49fbce7bdfb01 9a798bdd45a3278978b1137a6ef3ff26eee05067 b0bf853069013e54c9506c784314158f17ed9bd5 56ee0112b873594dab26d177cea6fd90985418a1 454970fa6a165c21228fc634ae00094a0f81763d f0d5d95e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [89:54:95:53:01:bb:e0:c2:c1:f7:50:ae:49:d3:83:5e:ec:b1:92:3b] modulus: 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 public exponent: 10001 ] 2021-11-17 11:19:22.063  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-17 11:19:22.069 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-17 11:19:22.075 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-17 11:19:22.077 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-17 11:19:22.078  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-17 11:19:22.080  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-17 11:19:22.081  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-17 11:19:22.082 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-17 11:19:22.083 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-17 11:19:22.084 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-17 11:19:22.098 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-17 11:19:22.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:19:22.101 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:19:22.102 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:19:22.284  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-17 11:19:22.285  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-17 11:19:22.286 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-17 11:19:22.286 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:19:22.290  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-17 11:19:22.291  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-17 11:19:22.292 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:19:22.292 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:19:22.293 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:19:22.296 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:19:22.296 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:19:22.296 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:19:22.298 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:19:22.299 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:19:22.299 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:19:22.301 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-17 11:19:22.310 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495406649795683432921659497421169766613986348825 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 17 09:23:09 UTC 2021 Final Date: Mon Nov 17 09:23:08 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:78:3a:64:9e:fd:12:5b:32:55:47:19:6e:74:be:b0:d1:1c:68:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89c71d843dac2d2a12ada1726b4d92e66e24d4c7 5551fa14d550e52d576cc06acfb3c3b496b60bf8 d68901a9c5b3eb5352d6d5b22c3cceea3f5a10b9 87ae4f12b6719193d46842e4dba6b0e7aef9cce2 5a61013a66b79706b54c75f144fc5d00b0f05dc9 a1f96ee494f4d42d16f9dd92dc0742c7956345d5 52ac2ab30e50a8a520b8fc7892adec9729fdb603 ba1f2ca8ab05da113f05cbdefe05d0db016bfa43 43dd60d65439b9abfdee54e3fed4cd14aee97816 7c1196666489e0595188bb372e1cf6941cb103c4 e4138a986d2c8563d437d07afa0c9c003a4096ef f62d1229ee37f638a8ba6f035426aba312aeddfb ba8749583884576528914f0e496421fb85491845 2edc06062a3c95edbe74f75b40b4adf54945fa23 ac14e1315d02f7405f5edce6b6d49fbce7bdfb01 9a798bdd45a3278978b1137a6ef3ff26eee05067 b0bf853069013e54c9506c784314158f17ed9bd5 56ee0112b873594dab26d177cea6fd90985418a1 454970fa6a165c21228fc634ae00094a0f81763d f0d5d95e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:7f:6c:89:b3:5a:e0:66:dd:a1:d2:dc:e5:22:7d:9c:62:17:fb:38] modulus: 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 public exponent: 10001 ] 2021-11-17 11:23:33.001  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-17 11:23:33.007 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-17 11:23:33.010 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-17 11:23:33.011 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-17 11:23:33.013  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-17 11:23:33.014  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-17 11:23:33.015  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-17 11:23:33.015 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-17 11:23:33.016 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-17 11:23:33.017 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-17 11:23:33.023 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-17 11:23:33.024 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:23:33.024 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:23:33.025 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:23:33.190  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-17 11:23:33.191  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-17 11:23:33.192 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-17 11:23:33.192 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:23:33.196  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-17 11:23:33.196  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-17 11:23:33.197 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:23:33.197 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:23:33.198 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:23:33.200 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:23:33.201 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:23:33.201 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:23:33.202 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:23:33.202 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:23:33.203 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:23:33.208 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-17 11:23:33.217 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495406649795683432921659497421169766613986348825 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 17 09:23:09 UTC 2021 Final Date: Mon Nov 17 09:23:08 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:78:3a:64:9e:fd:12:5b:32:55:47:19:6e:74:be:b0:d1:1c:68:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89c71d843dac2d2a12ada1726b4d92e66e24d4c7 5551fa14d550e52d576cc06acfb3c3b496b60bf8 d68901a9c5b3eb5352d6d5b22c3cceea3f5a10b9 87ae4f12b6719193d46842e4dba6b0e7aef9cce2 5a61013a66b79706b54c75f144fc5d00b0f05dc9 a1f96ee494f4d42d16f9dd92dc0742c7956345d5 52ac2ab30e50a8a520b8fc7892adec9729fdb603 ba1f2ca8ab05da113f05cbdefe05d0db016bfa43 43dd60d65439b9abfdee54e3fed4cd14aee97816 7c1196666489e0595188bb372e1cf6941cb103c4 e4138a986d2c8563d437d07afa0c9c003a4096ef f62d1229ee37f638a8ba6f035426aba312aeddfb ba8749583884576528914f0e496421fb85491845 2edc06062a3c95edbe74f75b40b4adf54945fa23 ac14e1315d02f7405f5edce6b6d49fbce7bdfb01 9a798bdd45a3278978b1137a6ef3ff26eee05067 b0bf853069013e54c9506c784314158f17ed9bd5 56ee0112b873594dab26d177cea6fd90985418a1 454970fa6a165c21228fc634ae00094a0f81763d f0d5d95e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [74:fb:54:84:a1:44:2d:48:80:a2:d1:79:f1:6c:cc:21:ff:f7:53:31] modulus: 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 public exponent: 10001 ] 2021-11-17 11:24:56.677  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-17 11:24:56.680 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-17 11:24:56.682 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-17 11:24:56.684 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-17 11:24:56.685  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-17 11:24:56.686  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-17 11:24:56.687  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-17 11:24:56.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-17 11:24:56.688 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-17 11:24:56.688 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-17 11:24:56.693 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-17 11:24:56.694 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:24:56.695 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:24:56.695 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:24:56.832  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-17 11:24:56.833  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-17 11:24:56.833 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-17 11:24:56.833 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:24:56.841  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-17 11:24:56.842  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-17 11:24:56.842 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:24:56.843 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:24:56.843 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:24:56.845 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:24:56.845 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:24:56.846 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:24:56.847 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:24:56.848 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:24:56.848 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:24:56.849 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-17 11:24:56.855 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495406649795683432921659497421169766613986348825 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 17 09:23:09 UTC 2021 Final Date: Mon Nov 17 09:23:08 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:78:3a:64:9e:fd:12:5b:32:55:47:19:6e:74:be:b0:d1:1c:68:0e] modulus: 91e1e25186f7427dc3738dda91913744eaa362813c5cd2c86c77de8455e067dd1d078aed924902412d868ad18223e7ee15b9d90f197dad62d6bfe5acb943cc834efee0c4509e21b0864ba90ec92c1f1a6cf8d636217dd4b5f17b15f8dd56086fd2c60823635c9fea6dc99a5294f261b2c5a208b1a6f8863e04e5a20ba00f24735b198c427ed2115b382f7c732ea176e6e2a20aabe85e14ab4bb7118c90b62bd5836abd6830eec59822029261fa14bdefcc7b4cc1f76ed7556b4d309a25d050f0ebac464fef78e82d30ca854af4792f31c68a75d31afa6366e402c686d64a1be2a16c8bfd3a722c2016b0259f1d6c8af5e1cb4c342dbdcc7b068ddcbb528fe1f999601b040d795183c13648bb04c78b11c29c150e7b3b7c16074c764a10b4847010579b61bc1d86cd490eb93cedbc5f5e0f39462eac5abdd82dc39723799584a687c84778dad8f5e87cb325f4b09e4cf8f4c330571acfbbf8829d8b0e6ffcf878071e8d9b7f1bc7e19ca9b3d745a7741e79099b155e79a2d676fb673f9a912d15 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89c71d843dac2d2a12ada1726b4d92e66e24d4c7 5551fa14d550e52d576cc06acfb3c3b496b60bf8 d68901a9c5b3eb5352d6d5b22c3cceea3f5a10b9 87ae4f12b6719193d46842e4dba6b0e7aef9cce2 5a61013a66b79706b54c75f144fc5d00b0f05dc9 a1f96ee494f4d42d16f9dd92dc0742c7956345d5 52ac2ab30e50a8a520b8fc7892adec9729fdb603 ba1f2ca8ab05da113f05cbdefe05d0db016bfa43 43dd60d65439b9abfdee54e3fed4cd14aee97816 7c1196666489e0595188bb372e1cf6941cb103c4 e4138a986d2c8563d437d07afa0c9c003a4096ef f62d1229ee37f638a8ba6f035426aba312aeddfb ba8749583884576528914f0e496421fb85491845 2edc06062a3c95edbe74f75b40b4adf54945fa23 ac14e1315d02f7405f5edce6b6d49fbce7bdfb01 9a798bdd45a3278978b1137a6ef3ff26eee05067 b0bf853069013e54c9506c784314158f17ed9bd5 56ee0112b873594dab26d177cea6fd90985418a1 454970fa6a165c21228fc634ae00094a0f81763d f0d5d95e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ac:70:10:fc:99:bc:48:93:32:a3:5b:ce:0b:a6:52:2f:f7:cb:51:07] modulus: a33da3b3b89633f538759ba6d0a871d20545eae0e676922dc7cae0cfa048eb7d2f50a49bc63ddf4b17957e5fe7f33b14b3636bf51dcbecb4a2ed0acdbf8e5f9ba5bcc1acfa84929e94e27463ff1e7fa8963158f9b3fe46184579be27fcc77d01d2da843f04ddfe876edc0ce601c64cf78aedf2e4a7a088473ec299681a9c0aa2bd2084ccb0022668dd77b1939d85197229de38833771a117c5f61fdf6cc73886d7ce231003af2323098cc37dcbb8a4dc737b6ae65ca2ecafbeee70c60a6fcb777c4b72c3e047f67927e9d8a89e559c29d194c1773951c4800fde42b4450d910be8e35af030c88b4e91406690918e40f57d614c2f5f91b2161ca562b7fdf47557 public exponent: 10001 ] 2021-11-17 11:25:29.134  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-17 11:25:29.136 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-17 11:25:29.138 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-17 11:25:29.139 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-17 11:25:29.139  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-17 11:25:29.140  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-17 11:25:29.140  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-17 11:25:29.141 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-17 11:25:29.141 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-17 11:25:29.142 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-17 11:25:29.147 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-17 11:25:29.148 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:25:29.148 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:25:29.149 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:25:29.302  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-17 11:25:29.302  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-17 11:25:29.303 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-17 11:25:29.303 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:25:29.306  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-17 11:25:29.308  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-17 11:25:29.309 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:25:29.310 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:25:29.310 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:25:29.311 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:25:29.312 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:25:29.312 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:25:29.313 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:25:29.313 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:25:29.314 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:25:29.315 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-17 11:25:29.318 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495406649795683432921659497421169766613986348825 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 17 09:23:09 UTC 2021 Final Date: Mon Nov 17 09:23:08 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:78:3a:64:9e:fd:12:5b:32:55:47:19:6e:74:be:b0:d1:1c:68:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89c71d843dac2d2a12ada1726b4d92e66e24d4c7 5551fa14d550e52d576cc06acfb3c3b496b60bf8 d68901a9c5b3eb5352d6d5b22c3cceea3f5a10b9 87ae4f12b6719193d46842e4dba6b0e7aef9cce2 5a61013a66b79706b54c75f144fc5d00b0f05dc9 a1f96ee494f4d42d16f9dd92dc0742c7956345d5 52ac2ab30e50a8a520b8fc7892adec9729fdb603 ba1f2ca8ab05da113f05cbdefe05d0db016bfa43 43dd60d65439b9abfdee54e3fed4cd14aee97816 7c1196666489e0595188bb372e1cf6941cb103c4 e4138a986d2c8563d437d07afa0c9c003a4096ef f62d1229ee37f638a8ba6f035426aba312aeddfb ba8749583884576528914f0e496421fb85491845 2edc06062a3c95edbe74f75b40b4adf54945fa23 ac14e1315d02f7405f5edce6b6d49fbce7bdfb01 9a798bdd45a3278978b1137a6ef3ff26eee05067 b0bf853069013e54c9506c784314158f17ed9bd5 56ee0112b873594dab26d177cea6fd90985418a1 454970fa6a165c21228fc634ae00094a0f81763d f0d5d95e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [30:4a:9c:15:ff:c8:4d:18:e6:fe:39:b7:a1:99:1d:0e:e1:0c:cd:23] modulus: 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 public exponent: 10001 ] 2021-11-17 11:26:03.162  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-17 11:26:03.165 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-17 11:26:03.171 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-17 11:26:03.175 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-17 11:26:03.175  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-17 11:26:03.177  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-17 11:26:03.177  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-17 11:26:03.191 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-17 11:26:03.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-17 11:26:03.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-17 11:26:03.202 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-17 11:26:03.204 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:26:03.204 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:26:03.204 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:26:03.366  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-17 11:26:03.366  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-17 11:26:03.367 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-17 11:26:03.367 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:26:03.368  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-17 11:26:03.369  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-17 11:26:03.369 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:26:03.370 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:26:03.370 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:26:03.371 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:26:03.371 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:26:03.372 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:26:03.372 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:26:03.373 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:26:03.373 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:26:03.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-17 11:26:03.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495406649795683432921659497421169766613986348825 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 17 09:23:09 UTC 2021 Final Date: Mon Nov 17 09:23:08 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:78:3a:64:9e:fd:12:5b:32:55:47:19:6e:74:be:b0:d1:1c:68:0e] modulus: 91e1e25186f7427dc3738dda91913744eaa362813c5cd2c86c77de8455e067dd1d078aed924902412d868ad18223e7ee15b9d90f197dad62d6bfe5acb943cc834efee0c4509e21b0864ba90ec92c1f1a6cf8d636217dd4b5f17b15f8dd56086fd2c60823635c9fea6dc99a5294f261b2c5a208b1a6f8863e04e5a20ba00f24735b198c427ed2115b382f7c732ea176e6e2a20aabe85e14ab4bb7118c90b62bd5836abd6830eec59822029261fa14bdefcc7b4cc1f76ed7556b4d309a25d050f0ebac464fef78e82d30ca854af4792f31c68a75d31afa6366e402c686d64a1be2a16c8bfd3a722c2016b0259f1d6c8af5e1cb4c342dbdcc7b068ddcbb528fe1f999601b040d795183c13648bb04c78b11c29c150e7b3b7c16074c764a10b4847010579b61bc1d86cd490eb93cedbc5f5e0f39462eac5abdd82dc39723799584a687c84778dad8f5e87cb325f4b09e4cf8f4c330571acfbbf8829d8b0e6ffcf878071e8d9b7f1bc7e19ca9b3d745a7741e79099b155e79a2d676fb673f9a912d15 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89c71d843dac2d2a12ada1726b4d92e66e24d4c7 5551fa14d550e52d576cc06acfb3c3b496b60bf8 d68901a9c5b3eb5352d6d5b22c3cceea3f5a10b9 87ae4f12b6719193d46842e4dba6b0e7aef9cce2 5a61013a66b79706b54c75f144fc5d00b0f05dc9 a1f96ee494f4d42d16f9dd92dc0742c7956345d5 52ac2ab30e50a8a520b8fc7892adec9729fdb603 ba1f2ca8ab05da113f05cbdefe05d0db016bfa43 43dd60d65439b9abfdee54e3fed4cd14aee97816 7c1196666489e0595188bb372e1cf6941cb103c4 e4138a986d2c8563d437d07afa0c9c003a4096ef f62d1229ee37f638a8ba6f035426aba312aeddfb ba8749583884576528914f0e496421fb85491845 2edc06062a3c95edbe74f75b40b4adf54945fa23 ac14e1315d02f7405f5edce6b6d49fbce7bdfb01 9a798bdd45a3278978b1137a6ef3ff26eee05067 b0bf853069013e54c9506c784314158f17ed9bd5 56ee0112b873594dab26d177cea6fd90985418a1 454970fa6a165c21228fc634ae00094a0f81763d f0d5d95e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e4:83:8b:5c:f2:90:9e:19:97:1d:77:95:bf:0b:a9:e6:de:8c:f3:ad] modulus: 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 public exponent: 10001 ] 2021-11-17 11:28:04.197  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-17 11:28:04.201 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-17 11:28:04.203 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-17 11:28:04.204 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-17 11:28:04.205  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-17 11:28:04.206  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-17 11:28:04.207  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-17 11:28:04.210 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-17 11:28:04.211 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-17 11:28:04.213 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-17 11:28:04.219 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-17 11:28:04.220 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:28:04.221 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:28:04.221 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:28:04.373  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-17 11:28:04.373  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-17 11:28:04.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-17 11:28:04.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:28:04.376  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-17 11:28:04.376  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-17 11:28:04.377 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:28:04.377 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:28:04.377 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:28:04.378 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:28:04.379 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:28:04.379 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:28:04.380 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:28:04.380 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:28:04.381 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:28:04.382 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-17 11:28:04.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495406649795683432921659497421169766613986348825 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 17 09:23:09 UTC 2021 Final Date: Mon Nov 17 09:23:08 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:78:3a:64:9e:fd:12:5b:32:55:47:19:6e:74:be:b0:d1:1c:68:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89c71d843dac2d2a12ada1726b4d92e66e24d4c7 5551fa14d550e52d576cc06acfb3c3b496b60bf8 d68901a9c5b3eb5352d6d5b22c3cceea3f5a10b9 87ae4f12b6719193d46842e4dba6b0e7aef9cce2 5a61013a66b79706b54c75f144fc5d00b0f05dc9 a1f96ee494f4d42d16f9dd92dc0742c7956345d5 52ac2ab30e50a8a520b8fc7892adec9729fdb603 ba1f2ca8ab05da113f05cbdefe05d0db016bfa43 43dd60d65439b9abfdee54e3fed4cd14aee97816 7c1196666489e0595188bb372e1cf6941cb103c4 e4138a986d2c8563d437d07afa0c9c003a4096ef f62d1229ee37f638a8ba6f035426aba312aeddfb ba8749583884576528914f0e496421fb85491845 2edc06062a3c95edbe74f75b40b4adf54945fa23 ac14e1315d02f7405f5edce6b6d49fbce7bdfb01 9a798bdd45a3278978b1137a6ef3ff26eee05067 b0bf853069013e54c9506c784314158f17ed9bd5 56ee0112b873594dab26d177cea6fd90985418a1 454970fa6a165c21228fc634ae00094a0f81763d f0d5d95e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [20:29:46:44:a0:07:e5:08:3b:00:57:2b:4c:56:b8:86:fb:07:00:8e] modulus: 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 public exponent: 10001 ] 2021-11-17 11:28:10.016  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-17 11:28:10.017 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-17 11:28:10.019 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-17 11:28:10.020 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-17 11:28:10.020  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-17 11:28:10.021  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-17 11:28:10.021  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-17 11:28:10.022 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-17 11:28:10.022 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-17 11:28:10.023 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-17 11:28:10.027 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-17 11:28:10.029 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:28:10.029 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:28:10.029 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:28:10.160  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-17 11:28:10.161  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-17 11:28:10.162 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-17 11:28:10.162 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:28:10.164  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-17 11:28:10.165  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-17 11:28:10.165 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:28:10.166 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:28:10.166 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:28:10.168 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:28:10.168 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:28:10.168 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:28:10.169 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:28:10.170 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:28:10.170 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:28:10.171 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-17 11:28:10.176 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495406649795683432921659497421169766613986348825 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 17 09:23:09 UTC 2021 Final Date: Mon Nov 17 09:23:08 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:78:3a:64:9e:fd:12:5b:32:55:47:19:6e:74:be:b0:d1:1c:68:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89c71d843dac2d2a12ada1726b4d92e66e24d4c7 5551fa14d550e52d576cc06acfb3c3b496b60bf8 d68901a9c5b3eb5352d6d5b22c3cceea3f5a10b9 87ae4f12b6719193d46842e4dba6b0e7aef9cce2 5a61013a66b79706b54c75f144fc5d00b0f05dc9 a1f96ee494f4d42d16f9dd92dc0742c7956345d5 52ac2ab30e50a8a520b8fc7892adec9729fdb603 ba1f2ca8ab05da113f05cbdefe05d0db016bfa43 43dd60d65439b9abfdee54e3fed4cd14aee97816 7c1196666489e0595188bb372e1cf6941cb103c4 e4138a986d2c8563d437d07afa0c9c003a4096ef f62d1229ee37f638a8ba6f035426aba312aeddfb ba8749583884576528914f0e496421fb85491845 2edc06062a3c95edbe74f75b40b4adf54945fa23 ac14e1315d02f7405f5edce6b6d49fbce7bdfb01 9a798bdd45a3278978b1137a6ef3ff26eee05067 b0bf853069013e54c9506c784314158f17ed9bd5 56ee0112b873594dab26d177cea6fd90985418a1 454970fa6a165c21228fc634ae00094a0f81763d f0d5d95e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:4e:68:7c:5f:8e:33:4a:bb:2b:2c:89:47:4c:44:96:7c:dd:99:81] modulus: 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 public exponent: 10001 ] 2021-11-17 11:31:21.588  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-17 11:31:21.593 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-17 11:31:21.597 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-17 11:31:21.598 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-17 11:31:21.599  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-17 11:31:21.600  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-17 11:31:21.601  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-17 11:31:21.602 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-17 11:31:21.602 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-17 11:31:21.603 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-17 11:31:21.610 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-17 11:31:21.611 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:31:21.611 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:31:21.612 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:31:21.763  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-17 11:31:21.764  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-17 11:31:21.765 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-17 11:31:21.765 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:31:21.766  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-17 11:31:21.767  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-17 11:31:21.767 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:31:21.767 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:31:21.768 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:31:21.769 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:31:21.769 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:31:21.769 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:31:21.770 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:31:21.770 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:31:21.770 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:31:21.771 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-17 11:31:21.775 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495406649795683432921659497421169766613986348825 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 17 09:23:09 UTC 2021 Final Date: Mon Nov 17 09:23:08 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:78:3a:64:9e:fd:12:5b:32:55:47:19:6e:74:be:b0:d1:1c:68:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89c71d843dac2d2a12ada1726b4d92e66e24d4c7 5551fa14d550e52d576cc06acfb3c3b496b60bf8 d68901a9c5b3eb5352d6d5b22c3cceea3f5a10b9 87ae4f12b6719193d46842e4dba6b0e7aef9cce2 5a61013a66b79706b54c75f144fc5d00b0f05dc9 a1f96ee494f4d42d16f9dd92dc0742c7956345d5 52ac2ab30e50a8a520b8fc7892adec9729fdb603 ba1f2ca8ab05da113f05cbdefe05d0db016bfa43 43dd60d65439b9abfdee54e3fed4cd14aee97816 7c1196666489e0595188bb372e1cf6941cb103c4 e4138a986d2c8563d437d07afa0c9c003a4096ef f62d1229ee37f638a8ba6f035426aba312aeddfb ba8749583884576528914f0e496421fb85491845 2edc06062a3c95edbe74f75b40b4adf54945fa23 ac14e1315d02f7405f5edce6b6d49fbce7bdfb01 9a798bdd45a3278978b1137a6ef3ff26eee05067 b0bf853069013e54c9506c784314158f17ed9bd5 56ee0112b873594dab26d177cea6fd90985418a1 454970fa6a165c21228fc634ae00094a0f81763d f0d5d95e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d3:1b:c4:25:46:dc:43:d5:a4:c0:43:29:c2:3f:80:fb:42:3c:6a:6d] modulus: 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 public exponent: 10001 ] 2021-11-17 11:34:54.428  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-17 11:34:54.430 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-17 11:34:54.433 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-17 11:34:54.434 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-17 11:34:54.434  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-17 11:34:54.435  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-17 11:34:54.435  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-17 11:34:54.436 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-17 11:34:54.436 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-17 11:34:54.437 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-17 11:34:54.442 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-17 11:34:54.443 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:34:54.443 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:34:54.444 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:34:54.608  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-17 11:34:54.609  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-17 11:34:54.609 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-17 11:34:54.610 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:34:54.611  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-17 11:34:54.612  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-17 11:34:54.613 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:34:54.613 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:34:54.614 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:34:54.615 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:34:54.615 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:34:54.616 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:34:54.617 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:34:54.617 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:34:54.618 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:34:54.618 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-17 11:34:54.623 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495406649795683432921659497421169766613986348825 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 17 09:23:09 UTC 2021 Final Date: Mon Nov 17 09:23:08 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:78:3a:64:9e:fd:12:5b:32:55:47:19:6e:74:be:b0:d1:1c:68:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89c71d843dac2d2a12ada1726b4d92e66e24d4c7 5551fa14d550e52d576cc06acfb3c3b496b60bf8 d68901a9c5b3eb5352d6d5b22c3cceea3f5a10b9 87ae4f12b6719193d46842e4dba6b0e7aef9cce2 5a61013a66b79706b54c75f144fc5d00b0f05dc9 a1f96ee494f4d42d16f9dd92dc0742c7956345d5 52ac2ab30e50a8a520b8fc7892adec9729fdb603 ba1f2ca8ab05da113f05cbdefe05d0db016bfa43 43dd60d65439b9abfdee54e3fed4cd14aee97816 7c1196666489e0595188bb372e1cf6941cb103c4 e4138a986d2c8563d437d07afa0c9c003a4096ef f62d1229ee37f638a8ba6f035426aba312aeddfb ba8749583884576528914f0e496421fb85491845 2edc06062a3c95edbe74f75b40b4adf54945fa23 ac14e1315d02f7405f5edce6b6d49fbce7bdfb01 9a798bdd45a3278978b1137a6ef3ff26eee05067 b0bf853069013e54c9506c784314158f17ed9bd5 56ee0112b873594dab26d177cea6fd90985418a1 454970fa6a165c21228fc634ae00094a0f81763d f0d5d95e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f1:71:4d:c1:3b:c3:c5:9e:d1:ed:d5:7d:80:ac:bd:8d:7a:03:b7:1d] modulus: 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 public exponent: 10001 ] 2021-11-17 11:36:08.424  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-17 11:36:08.427 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-17 11:36:08.433 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-17 11:36:08.434 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-17 11:36:08.435  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-17 11:36:08.439  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-17 11:36:08.440  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-17 11:36:08.441 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-17 11:36:08.442 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-17 11:36:08.443 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-17 11:36:08.450 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-17 11:36:08.451 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:36:08.451 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:36:08.452 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:36:08.682  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-17 11:36:08.683  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-17 11:36:08.683 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-17 11:36:08.684 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:36:08.685  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-17 11:36:08.685  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-17 11:36:08.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:36:08.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:36:08.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:36:08.688 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:36:08.691 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:36:08.691 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:36:08.693 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:36:08.693 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:36:08.693 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:36:08.694 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-17 11:36:08.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495406649795683432921659497421169766613986348825 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 17 09:23:09 UTC 2021 Final Date: Mon Nov 17 09:23:08 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:78:3a:64:9e:fd:12:5b:32:55:47:19:6e:74:be:b0:d1:1c:68:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89c71d843dac2d2a12ada1726b4d92e66e24d4c7 5551fa14d550e52d576cc06acfb3c3b496b60bf8 d68901a9c5b3eb5352d6d5b22c3cceea3f5a10b9 87ae4f12b6719193d46842e4dba6b0e7aef9cce2 5a61013a66b79706b54c75f144fc5d00b0f05dc9 a1f96ee494f4d42d16f9dd92dc0742c7956345d5 52ac2ab30e50a8a520b8fc7892adec9729fdb603 ba1f2ca8ab05da113f05cbdefe05d0db016bfa43 43dd60d65439b9abfdee54e3fed4cd14aee97816 7c1196666489e0595188bb372e1cf6941cb103c4 e4138a986d2c8563d437d07afa0c9c003a4096ef f62d1229ee37f638a8ba6f035426aba312aeddfb ba8749583884576528914f0e496421fb85491845 2edc06062a3c95edbe74f75b40b4adf54945fa23 ac14e1315d02f7405f5edce6b6d49fbce7bdfb01 9a798bdd45a3278978b1137a6ef3ff26eee05067 b0bf853069013e54c9506c784314158f17ed9bd5 56ee0112b873594dab26d177cea6fd90985418a1 454970fa6a165c21228fc634ae00094a0f81763d f0d5d95e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ee:dd:ef:ed:f4:40:4c:e9:1d:7a:0f:19:2a:b5:31:45:8a:35:f0:96] modulus: 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 public exponent: 10001 ] 2021-11-17 11:37:40.741  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-17 11:37:40.744 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-17 11:37:40.746 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-17 11:37:40.747 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-17 11:37:40.748  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-17 11:37:40.749  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-17 11:37:40.749  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-17 11:37:40.749 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-17 11:37:40.750 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-17 11:37:40.750 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-17 11:37:40.755 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-17 11:37:40.756 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:37:40.756 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:37:40.757 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:37:40.911  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-17 11:37:40.911  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-17 11:37:40.912 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-17 11:37:40.912 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:37:40.913  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-17 11:37:40.913  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-17 11:37:40.914 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:37:40.914 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:37:40.914 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:37:40.915 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:37:40.915 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:37:40.915 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:37:40.916 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:37:40.916 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:37:40.916 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:37:40.918 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-17 11:37:40.921 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495406649795683432921659497421169766613986348825 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 17 09:23:09 UTC 2021 Final Date: Mon Nov 17 09:23:08 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:78:3a:64:9e:fd:12:5b:32:55:47:19:6e:74:be:b0:d1:1c:68:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89c71d843dac2d2a12ada1726b4d92e66e24d4c7 5551fa14d550e52d576cc06acfb3c3b496b60bf8 d68901a9c5b3eb5352d6d5b22c3cceea3f5a10b9 87ae4f12b6719193d46842e4dba6b0e7aef9cce2 5a61013a66b79706b54c75f144fc5d00b0f05dc9 a1f96ee494f4d42d16f9dd92dc0742c7956345d5 52ac2ab30e50a8a520b8fc7892adec9729fdb603 ba1f2ca8ab05da113f05cbdefe05d0db016bfa43 43dd60d65439b9abfdee54e3fed4cd14aee97816 7c1196666489e0595188bb372e1cf6941cb103c4 e4138a986d2c8563d437d07afa0c9c003a4096ef f62d1229ee37f638a8ba6f035426aba312aeddfb ba8749583884576528914f0e496421fb85491845 2edc06062a3c95edbe74f75b40b4adf54945fa23 ac14e1315d02f7405f5edce6b6d49fbce7bdfb01 9a798bdd45a3278978b1137a6ef3ff26eee05067 b0bf853069013e54c9506c784314158f17ed9bd5 56ee0112b873594dab26d177cea6fd90985418a1 454970fa6a165c21228fc634ae00094a0f81763d f0d5d95e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ee:94:36:9f:ea:69:10:a3:f6:37:bb:26:d2:6e:60:76:9d:99:91:e4] modulus: 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 public exponent: 10001 ] 2021-11-17 11:38:16.428  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-17 11:38:16.429 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-17 11:38:16.431 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-17 11:38:16.431 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-17 11:38:16.432  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-17 11:38:16.432  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-17 11:38:16.433  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-17 11:38:16.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-17 11:38:16.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-17 11:38:16.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-17 11:38:16.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-17 11:38:16.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:38:16.440 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:38:16.440 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:38:16.564  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-17 11:38:16.565  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-17 11:38:16.565 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-17 11:38:16.565 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:38:16.566  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-17 11:38:16.567  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-17 11:38:16.567 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:38:16.567 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:38:16.568 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:38:16.569 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:38:16.569 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:38:16.569 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:38:16.570 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:38:16.570 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:38:16.570 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:38:16.571 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-17 11:38:16.574 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495406649795683432921659497421169766613986348825 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 17 09:23:09 UTC 2021 Final Date: Mon Nov 17 09:23:08 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:78:3a:64:9e:fd:12:5b:32:55:47:19:6e:74:be:b0:d1:1c:68:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89c71d843dac2d2a12ada1726b4d92e66e24d4c7 5551fa14d550e52d576cc06acfb3c3b496b60bf8 d68901a9c5b3eb5352d6d5b22c3cceea3f5a10b9 87ae4f12b6719193d46842e4dba6b0e7aef9cce2 5a61013a66b79706b54c75f144fc5d00b0f05dc9 a1f96ee494f4d42d16f9dd92dc0742c7956345d5 52ac2ab30e50a8a520b8fc7892adec9729fdb603 ba1f2ca8ab05da113f05cbdefe05d0db016bfa43 43dd60d65439b9abfdee54e3fed4cd14aee97816 7c1196666489e0595188bb372e1cf6941cb103c4 e4138a986d2c8563d437d07afa0c9c003a4096ef f62d1229ee37f638a8ba6f035426aba312aeddfb ba8749583884576528914f0e496421fb85491845 2edc06062a3c95edbe74f75b40b4adf54945fa23 ac14e1315d02f7405f5edce6b6d49fbce7bdfb01 9a798bdd45a3278978b1137a6ef3ff26eee05067 b0bf853069013e54c9506c784314158f17ed9bd5 56ee0112b873594dab26d177cea6fd90985418a1 454970fa6a165c21228fc634ae00094a0f81763d f0d5d95e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1a:e9:33:ac:dd:8c:9d:a4:b0:65:f5:c0:2c:87:8a:a2:92:2e:4d:43] modulus: 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 public exponent: 10001 ] 2021-11-17 11:41:53.858  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-17 11:41:53.860 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-17 11:41:53.863 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-17 11:41:53.863 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-17 11:41:53.864  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-17 11:41:53.865  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-17 11:41:53.865  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-17 11:41:53.865 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-17 11:41:53.866 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-17 11:41:53.866 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-17 11:41:53.871 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-17 11:41:53.872 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:41:53.872 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:41:53.873 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:41:54.035  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-17 11:41:54.036  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-17 11:41:54.036 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-17 11:41:54.037 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:41:54.038  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-17 11:41:54.038  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-17 11:41:54.039 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:41:54.039 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:41:54.039 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:41:54.040 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:41:54.040 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:41:54.040 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:41:54.041 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:41:54.042 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:41:54.042 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:41:54.043 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-17 11:41:54.048 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495406649795683432921659497421169766613986348825 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 17 09:23:09 UTC 2021 Final Date: Mon Nov 17 09:23:08 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:78:3a:64:9e:fd:12:5b:32:55:47:19:6e:74:be:b0:d1:1c:68:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89c71d843dac2d2a12ada1726b4d92e66e24d4c7 5551fa14d550e52d576cc06acfb3c3b496b60bf8 d68901a9c5b3eb5352d6d5b22c3cceea3f5a10b9 87ae4f12b6719193d46842e4dba6b0e7aef9cce2 5a61013a66b79706b54c75f144fc5d00b0f05dc9 a1f96ee494f4d42d16f9dd92dc0742c7956345d5 52ac2ab30e50a8a520b8fc7892adec9729fdb603 ba1f2ca8ab05da113f05cbdefe05d0db016bfa43 43dd60d65439b9abfdee54e3fed4cd14aee97816 7c1196666489e0595188bb372e1cf6941cb103c4 e4138a986d2c8563d437d07afa0c9c003a4096ef f62d1229ee37f638a8ba6f035426aba312aeddfb ba8749583884576528914f0e496421fb85491845 2edc06062a3c95edbe74f75b40b4adf54945fa23 ac14e1315d02f7405f5edce6b6d49fbce7bdfb01 9a798bdd45a3278978b1137a6ef3ff26eee05067 b0bf853069013e54c9506c784314158f17ed9bd5 56ee0112b873594dab26d177cea6fd90985418a1 454970fa6a165c21228fc634ae00094a0f81763d f0d5d95e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bd:fa:db:33:da:51:98:de:cf:2f:73:03:76:c9:42:55:07:73:d8:db] modulus: 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 public exponent: 10001 ] 2021-11-17 11:43:07.353  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-17 11:43:07.356 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-17 11:43:07.359 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-17 11:43:07.360 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-17 11:43:07.360  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-17 11:43:07.361  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-17 11:43:07.362  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-17 11:43:07.362 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-17 11:43:07.362 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-17 11:43:07.363 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-17 11:43:07.370 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-17 11:43:07.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:43:07.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:43:07.372 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:43:07.499  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-17 11:43:07.500  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-17 11:43:07.500 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-17 11:43:07.501 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:43:07.512  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-17 11:43:07.512  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-17 11:43:07.513 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:43:07.513 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:43:07.514 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:43:07.514 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:43:07.519 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:43:07.520 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:43:07.521 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:43:07.521 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:43:07.521 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:43:07.522 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-17 11:43:07.526 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495406649795683432921659497421169766613986348825 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 17 09:23:09 UTC 2021 Final Date: Mon Nov 17 09:23:08 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:78:3a:64:9e:fd:12:5b:32:55:47:19:6e:74:be:b0:d1:1c:68:0e] modulus: 91e1e25186f7427dc3738dda91913744eaa362813c5cd2c86c77de8455e067dd1d078aed924902412d868ad18223e7ee15b9d90f197dad62d6bfe5acb943cc834efee0c4509e21b0864ba90ec92c1f1a6cf8d636217dd4b5f17b15f8dd56086fd2c60823635c9fea6dc99a5294f261b2c5a208b1a6f8863e04e5a20ba00f24735b198c427ed2115b382f7c732ea176e6e2a20aabe85e14ab4bb7118c90b62bd5836abd6830eec59822029261fa14bdefcc7b4cc1f76ed7556b4d309a25d050f0ebac464fef78e82d30ca854af4792f31c68a75d31afa6366e402c686d64a1be2a16c8bfd3a722c2016b0259f1d6c8af5e1cb4c342dbdcc7b068ddcbb528fe1f999601b040d795183c13648bb04c78b11c29c150e7b3b7c16074c764a10b4847010579b61bc1d86cd490eb93cedbc5f5e0f39462eac5abdd82dc39723799584a687c84778dad8f5e87cb325f4b09e4cf8f4c330571acfbbf8829d8b0e6ffcf878071e8d9b7f1bc7e19ca9b3d745a7741e79099b155e79a2d676fb673f9a912d15 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89c71d843dac2d2a12ada1726b4d92e66e24d4c7 5551fa14d550e52d576cc06acfb3c3b496b60bf8 d68901a9c5b3eb5352d6d5b22c3cceea3f5a10b9 87ae4f12b6719193d46842e4dba6b0e7aef9cce2 5a61013a66b79706b54c75f144fc5d00b0f05dc9 a1f96ee494f4d42d16f9dd92dc0742c7956345d5 52ac2ab30e50a8a520b8fc7892adec9729fdb603 ba1f2ca8ab05da113f05cbdefe05d0db016bfa43 43dd60d65439b9abfdee54e3fed4cd14aee97816 7c1196666489e0595188bb372e1cf6941cb103c4 e4138a986d2c8563d437d07afa0c9c003a4096ef f62d1229ee37f638a8ba6f035426aba312aeddfb ba8749583884576528914f0e496421fb85491845 2edc06062a3c95edbe74f75b40b4adf54945fa23 ac14e1315d02f7405f5edce6b6d49fbce7bdfb01 9a798bdd45a3278978b1137a6ef3ff26eee05067 b0bf853069013e54c9506c784314158f17ed9bd5 56ee0112b873594dab26d177cea6fd90985418a1 454970fa6a165c21228fc634ae00094a0f81763d f0d5d95e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:f3:c8:57:51:0f:64:67:8f:71:f0:62:b8:e2:97:91:bf:0b:c2:f0] modulus: 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 public exponent: 10001 ] 2021-11-17 11:44:40.722  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-17 11:44:40.725 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-17 11:44:40.727 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-17 11:44:40.728 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-17 11:44:40.728  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-17 11:44:40.729  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-17 11:44:40.730  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-17 11:44:40.730 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-17 11:44:40.730 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-17 11:44:40.732 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-17 11:44:40.737 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-17 11:44:40.738 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:44:40.738 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-17 11:44:40.738 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:44:40.916  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-17 11:44:40.917  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-17 11:44:40.917 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-17 11:44:40.918 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-17 11:44:40.920  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-17 11:44:40.921  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-17 11:44:40.922 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:44:40.922 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:44:40.922 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:44:40.923 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:44:40.924 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:44:40.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:44:40.927 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-17 11:44:40.928 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-17 11:44:40.928 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-17 11:44:40.929 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-17 11:44:40.934 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495406649795683432921659497421169766613986348825 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 17 09:23:09 UTC 2021 Final Date: Mon Nov 17 09:23:08 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:78:3a:64:9e:fd:12:5b:32:55:47:19:6e:74:be:b0:d1:1c:68:0e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89c71d843dac2d2a12ada1726b4d92e66e24d4c7 5551fa14d550e52d576cc06acfb3c3b496b60bf8 d68901a9c5b3eb5352d6d5b22c3cceea3f5a10b9 87ae4f12b6719193d46842e4dba6b0e7aef9cce2 5a61013a66b79706b54c75f144fc5d00b0f05dc9 a1f96ee494f4d42d16f9dd92dc0742c7956345d5 52ac2ab30e50a8a520b8fc7892adec9729fdb603 ba1f2ca8ab05da113f05cbdefe05d0db016bfa43 43dd60d65439b9abfdee54e3fed4cd14aee97816 7c1196666489e0595188bb372e1cf6941cb103c4 e4138a986d2c8563d437d07afa0c9c003a4096ef f62d1229ee37f638a8ba6f035426aba312aeddfb ba8749583884576528914f0e496421fb85491845 2edc06062a3c95edbe74f75b40b4adf54945fa23 ac14e1315d02f7405f5edce6b6d49fbce7bdfb01 9a798bdd45a3278978b1137a6ef3ff26eee05067 b0bf853069013e54c9506c784314158f17ed9bd5 56ee0112b873594dab26d177cea6fd90985418a1 454970fa6a165c21228fc634ae00094a0f81763d f0d5d95e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:70:ff:be:15:9f:c4:93:2c:f7:e6:79:64:cd:ba:2c:ee:bc:0f:13] modulus: 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 public exponent: 10001 ]