2022-04-27 17:19:21,991 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-27 17:19:26,001 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-27 17:19:28.578  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Apr 27, 2022 5:19:36 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 27, 2022 5:19:36 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 27, 2022 5:19:36 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 27, 2022 5:19:37 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-27 17:19:38.789 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-27 17:19:40.085  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-04-27 17:19:40.691  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-27 17:19:43.387 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-27 17:19:43.390 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-04-27 17:19:43.391 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-27 17:19:43.393 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-27 17:19:43.578 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-04-27 17:19:43.583 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-04-27 17:19:43.988 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-04-27 17:19:48.192 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 27, 2022 5:19:50 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-27 17:19:51.995  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 33.084 seconds (JVM running for 39.243) Apr 27, 2022 5:19:56 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-27 17:21:13.887  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-27 17:21:13.893 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-27 17:21:13.997 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-27 17:21:14.000 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-27 17:21:14.090  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-27 17:21:14.092  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-27 17:21:14.092  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-27 17:21:14.093 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-27 17:21:14.094 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 17:21:14.097 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-27 17:21:14.183 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-27 17:21:14.186 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-27 17:21:14.303 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-27 17:21:14.379 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 17:21:14.380 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 17:21:14.383 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 17:21:15.514  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-27 17:21:15.516  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-27 17:21:15.517 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-27 17:21:15.518 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 17:21:15.526  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-27 17:21:15.527  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-27 17:21:15.528 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 17:21:15.528 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 17:21:15.529 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 17:21:15.588 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 17:21:15.588 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 17:21:15.589 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 17:21:15.593 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 17:21:15.594 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 17:21:15.594 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 17:21:15.595 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-27 17:21:15.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 180704689180240944350702683362360537068461271754 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 27 17:15:30 UTC 2022 Final Date: Mon Apr 26 17:15:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:8b:90:a9:05:95:8c:84:2e:a8:25:21:09:24:c4:c0:a8:84:97:12] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e1a19bdb41fced775e1caae5774fbc5c7eb4a533 d7e3044d57eb01657acdc5a20fc9114e5b1c9984 c18d64eb52be1933fd4f4d2556fef6546c888cf0 794867df394d0d54ed5d6b53a62595e14b0e4f5e 062f10761a79411175ebbbf518f40bab94f8da89 b3ce34dcf94ee485702eba3d4c8f0d90c6559d32 84283971abb135a9ce7accc415bcb08f65e77ce4 2890b46752820c9f2ff39e99a64d0caa8adfbf3e 53862317c8f55b72f5382752e76e811096e8fa3b 3c2b172df40b941cf9f815e75e83d883bc8ccdfa 38a822b19c0a86de7971f573f71311d2fe2b0a00 a4ab713f8a1521f723f92c806b4136857f94a577 4cd2404d6f8f99390e6d3ca501ba6069097e3724 847a6c24abc5e0de6cab7186dc15ef720f117035 33996b08c2438643e463509dd0fb0061a6be7c98 e1fb940ac9c9d8733aae94cf300a225efde9b982 ff3699e462971322ed4a50c71974c14a696e0655 cba0c85194477d23659fb8bfb0606110aea8571e 689933399930b452562a82213cfcc60348630937 5ce9eaac Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:aa:14:3e:7e:50:fe:46:20:6e:3b:2c:26:dc:6f:4b:e8:fb:aa:f0] modulus: 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 public exponent: 10001 ] 2022-04-27 18:52:25.337  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-27 18:52:25.338 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-27 18:52:25.340 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-27 18:52:25.341 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-27 18:52:25.342  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-27 18:52:25.343  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-27 18:52:25.343  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-27 18:52:25.344 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-27 18:52:25.344 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-27 18:52:25.345 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-27 18:52:25.351 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-27 18:52:25.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 18:52:25.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 18:52:25.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 18:52:25.503  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-27 18:52:25.503  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-27 18:52:25.503 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-27 18:52:25.504 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 18:52:25.506  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-27 18:52:25.507  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-27 18:52:25.507 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 18:52:25.507 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 18:52:25.508 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 18:52:25.508 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 18:52:25.509 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 18:52:25.509 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 18:52:25.510 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 18:52:25.510 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 18:52:25.510 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 18:52:25.578 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-27 18:52:25.582 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 180704689180240944350702683362360537068461271754 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 27 17:15:30 UTC 2022 Final Date: Mon Apr 26 17:15:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:8b:90:a9:05:95:8c:84:2e:a8:25:21:09:24:c4:c0:a8:84:97:12] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e1a19bdb41fced775e1caae5774fbc5c7eb4a533 d7e3044d57eb01657acdc5a20fc9114e5b1c9984 c18d64eb52be1933fd4f4d2556fef6546c888cf0 794867df394d0d54ed5d6b53a62595e14b0e4f5e 062f10761a79411175ebbbf518f40bab94f8da89 b3ce34dcf94ee485702eba3d4c8f0d90c6559d32 84283971abb135a9ce7accc415bcb08f65e77ce4 2890b46752820c9f2ff39e99a64d0caa8adfbf3e 53862317c8f55b72f5382752e76e811096e8fa3b 3c2b172df40b941cf9f815e75e83d883bc8ccdfa 38a822b19c0a86de7971f573f71311d2fe2b0a00 a4ab713f8a1521f723f92c806b4136857f94a577 4cd2404d6f8f99390e6d3ca501ba6069097e3724 847a6c24abc5e0de6cab7186dc15ef720f117035 33996b08c2438643e463509dd0fb0061a6be7c98 e1fb940ac9c9d8733aae94cf300a225efde9b982 ff3699e462971322ed4a50c71974c14a696e0655 cba0c85194477d23659fb8bfb0606110aea8571e 689933399930b452562a82213cfcc60348630937 5ce9eaac Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:3f:7a:31:50:a2:ba:13:bd:37:94:9a:5f:d0:14:33:85:14:75:30] modulus: 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 public exponent: 10001 ] 2022-04-27 18:55:30.815  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-27 18:55:30.816 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-27 18:55:30.818 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-27 18:55:30.818 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-27 18:55:30.819  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-27 18:55:30.820  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-27 18:55:30.820  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-27 18:55:30.821 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-27 18:55:30.821 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-27 18:55:30.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-27 18:55:30.827 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-27 18:55:30.828 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 18:55:30.828 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 18:55:30.828 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 18:55:30.969  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-27 18:55:30.978  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-27 18:55:30.979 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-27 18:55:30.979 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 18:55:30.981  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-27 18:55:30.981  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-27 18:55:30.982 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 18:55:30.982 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 18:55:30.982 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 18:55:30.983 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 18:55:30.983 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 18:55:30.983 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 18:55:30.984 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 18:55:30.984 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 18:55:30.984 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 18:55:30.985 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-27 18:55:30.988 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 180704689180240944350702683362360537068461271754 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 27 17:15:30 UTC 2022 Final Date: Mon Apr 26 17:15:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:8b:90:a9:05:95:8c:84:2e:a8:25:21:09:24:c4:c0:a8:84:97:12] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e1a19bdb41fced775e1caae5774fbc5c7eb4a533 d7e3044d57eb01657acdc5a20fc9114e5b1c9984 c18d64eb52be1933fd4f4d2556fef6546c888cf0 794867df394d0d54ed5d6b53a62595e14b0e4f5e 062f10761a79411175ebbbf518f40bab94f8da89 b3ce34dcf94ee485702eba3d4c8f0d90c6559d32 84283971abb135a9ce7accc415bcb08f65e77ce4 2890b46752820c9f2ff39e99a64d0caa8adfbf3e 53862317c8f55b72f5382752e76e811096e8fa3b 3c2b172df40b941cf9f815e75e83d883bc8ccdfa 38a822b19c0a86de7971f573f71311d2fe2b0a00 a4ab713f8a1521f723f92c806b4136857f94a577 4cd2404d6f8f99390e6d3ca501ba6069097e3724 847a6c24abc5e0de6cab7186dc15ef720f117035 33996b08c2438643e463509dd0fb0061a6be7c98 e1fb940ac9c9d8733aae94cf300a225efde9b982 ff3699e462971322ed4a50c71974c14a696e0655 cba0c85194477d23659fb8bfb0606110aea8571e 689933399930b452562a82213cfcc60348630937 5ce9eaac Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [51:60:54:fb:3d:e4:36:36:20:d3:30:af:3b:e9:62:df:9e:85:01:1a] modulus: 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 public exponent: 10001 ] 2022-04-27 18:57:39.856  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-27 18:57:39.857 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-27 18:57:39.858 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-27 18:57:39.859 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-27 18:57:39.859  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-27 18:57:39.860  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-27 18:57:39.860  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-27 18:57:39.861 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-27 18:57:39.861 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-27 18:57:39.862 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-27 18:57:39.869 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-27 18:57:39.870 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 18:57:39.870 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 18:57:39.870 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 18:57:40.005  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-27 18:57:40.005  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-27 18:57:40.006 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-27 18:57:40.006 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 18:57:40.007  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-27 18:57:40.008  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-27 18:57:40.008 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 18:57:40.009 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 18:57:40.009 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 18:57:40.009 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 18:57:40.010 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 18:57:40.010 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 18:57:40.011 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 18:57:40.011 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 18:57:40.011 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 18:57:40.012 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-27 18:57:40.014 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 180704689180240944350702683362360537068461271754 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 27 17:15:30 UTC 2022 Final Date: Mon Apr 26 17:15:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:8b:90:a9:05:95:8c:84:2e:a8:25:21:09:24:c4:c0:a8:84:97:12] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e1a19bdb41fced775e1caae5774fbc5c7eb4a533 d7e3044d57eb01657acdc5a20fc9114e5b1c9984 c18d64eb52be1933fd4f4d2556fef6546c888cf0 794867df394d0d54ed5d6b53a62595e14b0e4f5e 062f10761a79411175ebbbf518f40bab94f8da89 b3ce34dcf94ee485702eba3d4c8f0d90c6559d32 84283971abb135a9ce7accc415bcb08f65e77ce4 2890b46752820c9f2ff39e99a64d0caa8adfbf3e 53862317c8f55b72f5382752e76e811096e8fa3b 3c2b172df40b941cf9f815e75e83d883bc8ccdfa 38a822b19c0a86de7971f573f71311d2fe2b0a00 a4ab713f8a1521f723f92c806b4136857f94a577 4cd2404d6f8f99390e6d3ca501ba6069097e3724 847a6c24abc5e0de6cab7186dc15ef720f117035 33996b08c2438643e463509dd0fb0061a6be7c98 e1fb940ac9c9d8733aae94cf300a225efde9b982 ff3699e462971322ed4a50c71974c14a696e0655 cba0c85194477d23659fb8bfb0606110aea8571e 689933399930b452562a82213cfcc60348630937 5ce9eaac Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [93:43:c1:6e:91:83:d3:ec:d6:32:9b:95:68:ad:6d:26:eb:51:17:32] modulus: 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 public exponent: 10001 ] 2022-04-27 18:59:49.998  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-27 18:59:49.998 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-27 18:59:50.000 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-27 18:59:50.000 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-27 18:59:50.000  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-27 18:59:50.001  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-27 18:59:50.001  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-27 18:59:50.001 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-27 18:59:50.002 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-27 18:59:50.002 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-27 18:59:50.006 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-27 18:59:50.007 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 18:59:50.007 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 18:59:50.007 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 18:59:50.189  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-27 18:59:50.190  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-27 18:59:50.190 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-27 18:59:50.190 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 18:59:50.191  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-27 18:59:50.192  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-27 18:59:50.192 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 18:59:50.192 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 18:59:50.192 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 18:59:50.193 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 18:59:50.193 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 18:59:50.193 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 18:59:50.194 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 18:59:50.194 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 18:59:50.195 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 18:59:50.195 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-27 18:59:50.198 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 180704689180240944350702683362360537068461271754 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 27 17:15:30 UTC 2022 Final Date: Mon Apr 26 17:15:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:8b:90:a9:05:95:8c:84:2e:a8:25:21:09:24:c4:c0:a8:84:97:12] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e1a19bdb41fced775e1caae5774fbc5c7eb4a533 d7e3044d57eb01657acdc5a20fc9114e5b1c9984 c18d64eb52be1933fd4f4d2556fef6546c888cf0 794867df394d0d54ed5d6b53a62595e14b0e4f5e 062f10761a79411175ebbbf518f40bab94f8da89 b3ce34dcf94ee485702eba3d4c8f0d90c6559d32 84283971abb135a9ce7accc415bcb08f65e77ce4 2890b46752820c9f2ff39e99a64d0caa8adfbf3e 53862317c8f55b72f5382752e76e811096e8fa3b 3c2b172df40b941cf9f815e75e83d883bc8ccdfa 38a822b19c0a86de7971f573f71311d2fe2b0a00 a4ab713f8a1521f723f92c806b4136857f94a577 4cd2404d6f8f99390e6d3ca501ba6069097e3724 847a6c24abc5e0de6cab7186dc15ef720f117035 33996b08c2438643e463509dd0fb0061a6be7c98 e1fb940ac9c9d8733aae94cf300a225efde9b982 ff3699e462971322ed4a50c71974c14a696e0655 cba0c85194477d23659fb8bfb0606110aea8571e 689933399930b452562a82213cfcc60348630937 5ce9eaac Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [17:b5:4e:53:09:dc:de:54:38:4e:65:70:a1:0b:8b:05:57:cf:fd:7e] modulus: bba2adf2f8dca30a3540aa864fd587273f9e4ab8bbee7a29839be43ef7aa956749c6efa6150864681c12492802082edc7822ab729e81cb63641a9f0871ef11910b244dcfd41557908337b646282cbb4868bb3c7212155d804544d7a71c6f55813e50631372c76ff5c4fdd3cf4bed2896d726eaf03e4ae6dfda5d652c21a121aea176917c39a3ee2ad22a88c5ee58b020a62d0ae6308cf7b62fe6aaf3a07d74b692b580d66f371a285980f86880409f7dfff91eafccb7db07e79971cf9d97b5cde6ec5b7eccf4cc202100e435cc0d113e89d42e4f903da201497628b61c7968cc35e50541c1b4efd14582a71544ab00be6ec55ea8d35ed2d7f1026c052df05da5 public exponent: 10001 ] 2022-04-27 19:04:41.511  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-27 19:04:41.512 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-27 19:04:41.514 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-27 19:04:41.514 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-27 19:04:41.514  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-27 19:04:41.515  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-27 19:04:41.515  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-27 19:04:41.515 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-27 19:04:41.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-27 19:04:41.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-27 19:04:41.521 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-27 19:04:41.522 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 19:04:41.523 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 19:04:41.524 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 19:04:41.672  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-27 19:04:41.672  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-27 19:04:41.672 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-27 19:04:41.673 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 19:04:41.674  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-27 19:04:41.674  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-27 19:04:41.674 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 19:04:41.674 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 19:04:41.675 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 19:04:41.675 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 19:04:41.675 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 19:04:41.676 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 19:04:41.676 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 19:04:41.676 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 19:04:41.676 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 19:04:41.677 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-27 19:04:41.679 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 180704689180240944350702683362360537068461271754 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 27 17:15:30 UTC 2022 Final Date: Mon Apr 26 17:15:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:8b:90:a9:05:95:8c:84:2e:a8:25:21:09:24:c4:c0:a8:84:97:12] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e1a19bdb41fced775e1caae5774fbc5c7eb4a533 d7e3044d57eb01657acdc5a20fc9114e5b1c9984 c18d64eb52be1933fd4f4d2556fef6546c888cf0 794867df394d0d54ed5d6b53a62595e14b0e4f5e 062f10761a79411175ebbbf518f40bab94f8da89 b3ce34dcf94ee485702eba3d4c8f0d90c6559d32 84283971abb135a9ce7accc415bcb08f65e77ce4 2890b46752820c9f2ff39e99a64d0caa8adfbf3e 53862317c8f55b72f5382752e76e811096e8fa3b 3c2b172df40b941cf9f815e75e83d883bc8ccdfa 38a822b19c0a86de7971f573f71311d2fe2b0a00 a4ab713f8a1521f723f92c806b4136857f94a577 4cd2404d6f8f99390e6d3ca501ba6069097e3724 847a6c24abc5e0de6cab7186dc15ef720f117035 33996b08c2438643e463509dd0fb0061a6be7c98 e1fb940ac9c9d8733aae94cf300a225efde9b982 ff3699e462971322ed4a50c71974c14a696e0655 cba0c85194477d23659fb8bfb0606110aea8571e 689933399930b452562a82213cfcc60348630937 5ce9eaac Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [93:a9:89:ea:2d:b0:f4:5d:17:2a:76:c6:7f:e1:b3:f1:96:67:de:17] modulus: e026b205ae28d6bf042073c2ca6f710da75f460f2eb001d44d5e66e26489bc955a64689d0665b180417303175d2357d6e99c694aae8229d7daa398bb531cb9cab3bb809d2b6be2e2201b8f1d07e3558ea5ac132aac9ec6eca23fd4b9f89f1a9a9bf5e57188a400e9a1390ae30b1f3268a7d6cac6efe1010fecea3135efb7df7fc3056f62dffd279bdc30e140e5b2ac991511654c8e691ee14688b9631741f3910f262535c79b0fe1fccc64d68a64afe75b31e4835d50a26444c33a554662027fe945b7f366e6c52e5b5234bf89fbaddac9e766abde8f414980c0b28728c448b8a10b631ff83593ed7ee4150be565cede8ed242524bd860ca6991caf64f7be9bb public exponent: 10001 ] 2022-04-27 19:08:31.260  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-27 19:08:31.261 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-27 19:08:31.262 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-27 19:08:31.263 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-27 19:08:31.263  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-27 19:08:31.263  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-27 19:08:31.264  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-27 19:08:31.264 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-27 19:08:31.264 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-27 19:08:31.264 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-27 19:08:31.268 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-27 19:08:31.269 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 19:08:31.269 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 19:08:31.269 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 19:08:31.369  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-27 19:08:31.369  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-27 19:08:31.369 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-27 19:08:31.370 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 19:08:31.373  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-27 19:08:31.373  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-27 19:08:31.373 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 19:08:31.373 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 19:08:31.374 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 19:08:31.374 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 19:08:31.374 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 19:08:31.374 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 19:08:31.375 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 19:08:31.375 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 19:08:31.375 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 19:08:31.376 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-27 19:08:31.378 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 180704689180240944350702683362360537068461271754 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 27 17:15:30 UTC 2022 Final Date: Mon Apr 26 17:15:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:8b:90:a9:05:95:8c:84:2e:a8:25:21:09:24:c4:c0:a8:84:97:12] modulus: e60aab267c6dfb5f99a20527c26b4c50a4cb053c5d630909dce49f24139ecaa72ee8f568d5c4035bc2f04ac6e4fa0f5a53b2034673d8c1d0def0887e0dbbf3eddb2a20acd68563180b658759153440847e956d3b4c9d7f372d692ce7513ae1266ca231ce047395a0abe16ba7bc173f86ff5ad5719da23aed98af58c4ffaa533cc1cbfe916e998db91c9883b3e10b199c2543935aa53c26910b1df6b60a1595f53e2f22f1399346047a1120b762ba01eafdf15f266b23428c1527e92057920a889c6d734ddaaf468ac2d95a37f31f9792ced708ac9afcb30fb537fb1db6459055b70be97c6d015c38de84bf166f69acb95ba1ca0ae6a97613c096e2bb86360dec7b2336e8403459ea3ce6d24e74da3b3c7363ad76b671d8b93cbf1678da5ef5bacd835bbdd7cc037e57fea1c975d5469c9cad5f588bf7cf7ea3c49d1094cf3e67e7bb4f9257c34be5949f22471690886aa14f55650e9680c92b783ca8187a3e9480286ffe27a9ab1f2580b1da6bfd4987bd4c834056543b27f8e545e0efdeddd3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e1a19bdb41fced775e1caae5774fbc5c7eb4a533 d7e3044d57eb01657acdc5a20fc9114e5b1c9984 c18d64eb52be1933fd4f4d2556fef6546c888cf0 794867df394d0d54ed5d6b53a62595e14b0e4f5e 062f10761a79411175ebbbf518f40bab94f8da89 b3ce34dcf94ee485702eba3d4c8f0d90c6559d32 84283971abb135a9ce7accc415bcb08f65e77ce4 2890b46752820c9f2ff39e99a64d0caa8adfbf3e 53862317c8f55b72f5382752e76e811096e8fa3b 3c2b172df40b941cf9f815e75e83d883bc8ccdfa 38a822b19c0a86de7971f573f71311d2fe2b0a00 a4ab713f8a1521f723f92c806b4136857f94a577 4cd2404d6f8f99390e6d3ca501ba6069097e3724 847a6c24abc5e0de6cab7186dc15ef720f117035 33996b08c2438643e463509dd0fb0061a6be7c98 e1fb940ac9c9d8733aae94cf300a225efde9b982 ff3699e462971322ed4a50c71974c14a696e0655 cba0c85194477d23659fb8bfb0606110aea8571e 689933399930b452562a82213cfcc60348630937 5ce9eaac Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:1f:38:43:02:4e:ff:24:79:f4:02:0f:19:2c:5c:0f:da:de:17:6c] modulus: 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 public exponent: 10001 ] 2022-04-27 19:08:53.440  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-27 19:08:53.440 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-27 19:08:53.441 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-27 19:08:53.442 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-27 19:08:53.442  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-27 19:08:53.443  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-27 19:08:53.443  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-27 19:08:53.443 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-27 19:08:53.443 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-27 19:08:53.443 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-27 19:08:53.447 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-27 19:08:53.448 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 19:08:53.448 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 19:08:53.448 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 19:08:53.544  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-27 19:08:53.545  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-27 19:08:53.545 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-27 19:08:53.545 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 19:08:53.547  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-27 19:08:53.547  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-27 19:08:53.548 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 19:08:53.548 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 19:08:53.549 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 19:08:53.549 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 19:08:53.550 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 19:08:53.550 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 19:08:53.551 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 19:08:53.551 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 19:08:53.551 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 19:08:53.552 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-27 19:08:53.556 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 180704689180240944350702683362360537068461271754 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 27 17:15:30 UTC 2022 Final Date: Mon Apr 26 17:15:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:8b:90:a9:05:95:8c:84:2e:a8:25:21:09:24:c4:c0:a8:84:97:12] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e1a19bdb41fced775e1caae5774fbc5c7eb4a533 d7e3044d57eb01657acdc5a20fc9114e5b1c9984 c18d64eb52be1933fd4f4d2556fef6546c888cf0 794867df394d0d54ed5d6b53a62595e14b0e4f5e 062f10761a79411175ebbbf518f40bab94f8da89 b3ce34dcf94ee485702eba3d4c8f0d90c6559d32 84283971abb135a9ce7accc415bcb08f65e77ce4 2890b46752820c9f2ff39e99a64d0caa8adfbf3e 53862317c8f55b72f5382752e76e811096e8fa3b 3c2b172df40b941cf9f815e75e83d883bc8ccdfa 38a822b19c0a86de7971f573f71311d2fe2b0a00 a4ab713f8a1521f723f92c806b4136857f94a577 4cd2404d6f8f99390e6d3ca501ba6069097e3724 847a6c24abc5e0de6cab7186dc15ef720f117035 33996b08c2438643e463509dd0fb0061a6be7c98 e1fb940ac9c9d8733aae94cf300a225efde9b982 ff3699e462971322ed4a50c71974c14a696e0655 cba0c85194477d23659fb8bfb0606110aea8571e 689933399930b452562a82213cfcc60348630937 5ce9eaac Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:20:9a:25:ba:e6:b9:8c:88:3c:be:32:6f:f4:52:08:40:ac:7b:53] modulus: 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 public exponent: 10001 ] 2022-04-27 19:17:55.994  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-27 19:17:55.994 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-27 19:17:55.996 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-27 19:17:55.996 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-27 19:17:55.997  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-27 19:17:55.997  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-27 19:17:55.997  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-27 19:17:55.997 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-27 19:17:55.998 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-27 19:17:55.998 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-27 19:17:56.002 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-27 19:17:56.002 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 19:17:56.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 19:17:56.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 19:17:56.158  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-27 19:17:56.159  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-27 19:17:56.159 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-27 19:17:56.159 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 19:17:56.160  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-27 19:17:56.161  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-27 19:17:56.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 19:17:56.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 19:17:56.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 19:17:56.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 19:17:56.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 19:17:56.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 19:17:56.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 19:17:56.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 19:17:56.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 19:17:56.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-27 19:17:56.167 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 180704689180240944350702683362360537068461271754 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 27 17:15:30 UTC 2022 Final Date: Mon Apr 26 17:15:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:8b:90:a9:05:95:8c:84:2e:a8:25:21:09:24:c4:c0:a8:84:97:12] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e1a19bdb41fced775e1caae5774fbc5c7eb4a533 d7e3044d57eb01657acdc5a20fc9114e5b1c9984 c18d64eb52be1933fd4f4d2556fef6546c888cf0 794867df394d0d54ed5d6b53a62595e14b0e4f5e 062f10761a79411175ebbbf518f40bab94f8da89 b3ce34dcf94ee485702eba3d4c8f0d90c6559d32 84283971abb135a9ce7accc415bcb08f65e77ce4 2890b46752820c9f2ff39e99a64d0caa8adfbf3e 53862317c8f55b72f5382752e76e811096e8fa3b 3c2b172df40b941cf9f815e75e83d883bc8ccdfa 38a822b19c0a86de7971f573f71311d2fe2b0a00 a4ab713f8a1521f723f92c806b4136857f94a577 4cd2404d6f8f99390e6d3ca501ba6069097e3724 847a6c24abc5e0de6cab7186dc15ef720f117035 33996b08c2438643e463509dd0fb0061a6be7c98 e1fb940ac9c9d8733aae94cf300a225efde9b982 ff3699e462971322ed4a50c71974c14a696e0655 cba0c85194477d23659fb8bfb0606110aea8571e 689933399930b452562a82213cfcc60348630937 5ce9eaac Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ad:2d:e2:21:34:41:31:53:1b:c1:13:66:35:a2:c2:0e:cd:13:b7:9c] modulus: cd736ee7609a5a91eb88beb00f4d51176b019ced26f983eb8720d5b8cd2da1750538fde1519165ba87f4bfd082b349a284b93bbd48d40a3459d187bd4597ee7a7c6dc08c3dcc0a623a0f40651f5255d18f4d1fb8b6241825543490d5e10ce98559264377aaa77c5207a763b35dd338bfc650acab8da353a15209480d49bcecf3077ede02f4fc80f6064e3cc4a96009c855ca07a2002fcf8125704aebd2e128e5b9ad115127baa332a082fcfe6067dcc62764c40a51992f9075eff68d16efa0f5e259e58fdf88be7e7c783ce000ee0bf46fc3705c4b7629780f96047941359d2aa245d662cc37beedbafa58828eb4b65cbb3d62efb5d53e53821b4eaf295f4fd1 public exponent: 10001 ] 2022-04-27 19:19:10.127  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-27 19:19:10.128 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-27 19:19:10.129 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-27 19:19:10.129 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-27 19:19:10.130  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-27 19:19:10.130  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-27 19:19:10.130  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-27 19:19:10.131 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-27 19:19:10.131 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-27 19:19:10.131 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-27 19:19:10.135 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-27 19:19:10.135 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 19:19:10.136 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-27 19:19:10.136 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 19:19:10.240  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-27 19:19:10.240  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-27 19:19:10.241 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-27 19:19:10.241 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-27 19:19:10.242  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-27 19:19:10.242  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-27 19:19:10.243 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 19:19:10.243 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 19:19:10.243 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 19:19:10.244 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 19:19:10.244 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 19:19:10.244 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 19:19:10.245 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-27 19:19:10.245 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-27 19:19:10.245 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-27 19:19:10.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-27 19:19:10.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 180704689180240944350702683362360537068461271754 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 27 17:15:30 UTC 2022 Final Date: Mon Apr 26 17:15:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:8b:90:a9:05:95:8c:84:2e:a8:25:21:09:24:c4:c0:a8:84:97:12] modulus: e60aab267c6dfb5f99a20527c26b4c50a4cb053c5d630909dce49f24139ecaa72ee8f568d5c4035bc2f04ac6e4fa0f5a53b2034673d8c1d0def0887e0dbbf3eddb2a20acd68563180b658759153440847e956d3b4c9d7f372d692ce7513ae1266ca231ce047395a0abe16ba7bc173f86ff5ad5719da23aed98af58c4ffaa533cc1cbfe916e998db91c9883b3e10b199c2543935aa53c26910b1df6b60a1595f53e2f22f1399346047a1120b762ba01eafdf15f266b23428c1527e92057920a889c6d734ddaaf468ac2d95a37f31f9792ced708ac9afcb30fb537fb1db6459055b70be97c6d015c38de84bf166f69acb95ba1ca0ae6a97613c096e2bb86360dec7b2336e8403459ea3ce6d24e74da3b3c7363ad76b671d8b93cbf1678da5ef5bacd835bbdd7cc037e57fea1c975d5469c9cad5f588bf7cf7ea3c49d1094cf3e67e7bb4f9257c34be5949f22471690886aa14f55650e9680c92b783ca8187a3e9480286ffe27a9ab1f2580b1da6bfd4987bd4c834056543b27f8e545e0efdeddd3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e1a19bdb41fced775e1caae5774fbc5c7eb4a533 d7e3044d57eb01657acdc5a20fc9114e5b1c9984 c18d64eb52be1933fd4f4d2556fef6546c888cf0 794867df394d0d54ed5d6b53a62595e14b0e4f5e 062f10761a79411175ebbbf518f40bab94f8da89 b3ce34dcf94ee485702eba3d4c8f0d90c6559d32 84283971abb135a9ce7accc415bcb08f65e77ce4 2890b46752820c9f2ff39e99a64d0caa8adfbf3e 53862317c8f55b72f5382752e76e811096e8fa3b 3c2b172df40b941cf9f815e75e83d883bc8ccdfa 38a822b19c0a86de7971f573f71311d2fe2b0a00 a4ab713f8a1521f723f92c806b4136857f94a577 4cd2404d6f8f99390e6d3ca501ba6069097e3724 847a6c24abc5e0de6cab7186dc15ef720f117035 33996b08c2438643e463509dd0fb0061a6be7c98 e1fb940ac9c9d8733aae94cf300a225efde9b982 ff3699e462971322ed4a50c71974c14a696e0655 cba0c85194477d23659fb8bfb0606110aea8571e 689933399930b452562a82213cfcc60348630937 5ce9eaac Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b1:46:9c:5d:e5:e4:0d:a9:53:d6:89:85:37:48:ed:0b:ef:28:ea:20] modulus: cb3af40b6517db2dbab166c5a16ccde3beafaa13cc0b1836d6c8fe617bde1a48a78334f9332cbf6d66320adb436d7b4129c33ae0e2956367d757c53898c5e8eee1d50396b31cf621eb6178ca953f3c131bd60da9779ba714655964bc810e588605637a4a2b0464260f67d6870b67dcd35d236854653f3b4e8e65437d5ebed4d7754f2b2e812b340807f93eb4b569184c4f424a7e662a5b543b0f794b4d0f2a37e76b66fc952c0de4df47494338bfcacc6f15caf00fa552b7903925bd4f78e7640b6faa5318a0e5be84e843fd8970ba83e11930fa776221834b0592a95eb98da3fcf3da8a56f08f97893fa3d09b2e5c50a95a9209813602420dc87ea7ecc4f509 public exponent: 10001 ]