2021-11-13 10:51:50,210 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-13 10:51:53,915 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-13 10:51:56.503  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-11-13 10:52:08.402 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-13 10:52:09.711  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-11-13 10:52:10.397  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-13 10:52:20.112  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 31.89 seconds (JVM running for 37.932) 2021-11-13 10:58:52.193  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-13 10:58:52.202 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-13 10:58:52.397 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-13 10:58:52.400 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 10:58:52.494  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-13 10:58:52.498  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-13 10:58:52.498  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-13 10:58:52.500 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 10:58:52.501 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 10:58:52.504 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 10:58:52.510 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-13 10:58:52.513 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-13 10:58:52.707 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-13 10:58:52.712 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 10:58:52.712 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 10:58:52.795 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 10:58:54.008  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-13 10:58:54.012  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-13 10:58:54.012 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-13 10:58:54.014 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 10:58:54.100  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-13 10:58:54.101  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-13 10:58:54.102 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 10:58:54.102 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 10:58:54.103 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 10:58:54.193 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 10:58:54.194 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 10:58:54.195 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 10:58:54.203 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 10:58:54.204 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 10:58:54.204 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 10:58:54.206 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 10:58:54.304 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 463281850052294147440380009953693881036776565913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 10:47:59 UTC 2021 Final Date: Thu Nov 13 10:47:58 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [07:8a:3e:1a:58:9c:c9:d9:2b:28:f2:01:3d:20:9e:e9:46:1c:a6:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0eb23297f61547bee491a3f07d33a7a56eeb05a 5ecfeb241951a3ec14b8542302953eaead7faafa 3cddbdab774edbcc4af62451f901f6271cfbd70b 9b8cbe12139ec475163769f45dcf2b22dbb56b6f c2c9071eca91f775fd7bbaf3a90c9b715be39619 855e50f0176e619c5ca413ee9c0aafa91606f5ba dcae56378eb5b95a6b41c8b872e8b7626e7175e3 f5a44d483e5d3f86aa4e0d5305a481c9e1e14b13 d5b435ab0fb12ab7309901597a28294b6875cc8d e759f66bd9d72420920bfc8185709aad8359c8a8 a3992d776fd8f268d3c052410227ce4ff04a8587 5771327fac14146d594c162fb91517c77569eef8 79d5748f88e82b9818dd8bc5b38de117b1fd8315 6d9d167871722cd0c78da87706c6a584312c9c6f 8d8e5cf34983aa1f27875cfb5f3c76d6a53677b9 9ced9ff8af1813d7feb9001943d6c629550c5343 627964ee0c5eb3d270d35918b49aab39efe3175c abf53ea0a0df12c71ec01a7d392df707705679e6 db1cf188e93fb2c7e795bf68162a8a8868c60968 dde231e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0f:a5:0e:18:e5:b1:e0:de:5b:f6:78:34:8a:90:5e:ac:3b:5d:7e:1d] modulus: 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 public exponent: 10001 ] 2021-11-13 13:07:03.710  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-13 13:07:03.712 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-13 13:07:03.716 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-13 13:07:03.717 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 13:07:03.719  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-13 13:07:03.720  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-13 13:07:03.721  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-13 13:07:03.722 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 13:07:03.722 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-13 13:07:03.725 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-13 13:07:03.803 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-13 13:07:03.805 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:07:03.805 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:07:03.810 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:07:04.097  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-13 13:07:04.097  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-13 13:07:04.098 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-13 13:07:04.100 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:07:04.111  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-13 13:07:04.112  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-13 13:07:04.194 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:07:04.195 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:07:04.195 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:07:04.198 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:07:04.199 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:07:04.200 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:07:04.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:07:04.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:07:04.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:07:04.203 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 13:07:04.207 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 463281850052294147440380009953693881036776565913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 10:47:59 UTC 2021 Final Date: Thu Nov 13 10:47:58 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [07:8a:3e:1a:58:9c:c9:d9:2b:28:f2:01:3d:20:9e:e9:46:1c:a6:62] modulus: b600a68033344f388ffae1794998047e3d8a0a5e6793655cc426228a0c678ecf0c40b2eb861e822833f1235cee635b364866d3461570ee726746c90ebf046983561318beded2a4363bb134b982a32e05296ec5becfc6e2137c00b7039ffc583fed13756703799be39b73be644684fe509a03b88d54e925fa0d0648e89f966f4e34e132c73f2ed06223e6907617302739f8b400599bb3d70b683ea6e81f4b9e4124362a456dbb7d10d6f8b75373eaa2c5f4c762984a0bf839aebfa4499787e8faa66e9f88ee021ee1cfa6baab7af208308e205feff2b734f86b67c4243712f9ba438df644ebb78b3d59cdddac8b8846dcbe60a5ba5ef9d497787fc756dd5ba2163999ee580a49fd9bb11d7545e05aff573c760eefd9fdb255dd9935537729fd8548366f9a60d024848f84f1f17f33a4108318ec6e6eac0285bfeac071d5d66c8381ecb9932a47202a1af34aa4847107753df9721ab6b63b91ad27da628f47dba280e2163f6430e5042fb2b5b370c7ff736493593ec51411099b74c42e21f10aad public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0eb23297f61547bee491a3f07d33a7a56eeb05a 5ecfeb241951a3ec14b8542302953eaead7faafa 3cddbdab774edbcc4af62451f901f6271cfbd70b 9b8cbe12139ec475163769f45dcf2b22dbb56b6f c2c9071eca91f775fd7bbaf3a90c9b715be39619 855e50f0176e619c5ca413ee9c0aafa91606f5ba dcae56378eb5b95a6b41c8b872e8b7626e7175e3 f5a44d483e5d3f86aa4e0d5305a481c9e1e14b13 d5b435ab0fb12ab7309901597a28294b6875cc8d e759f66bd9d72420920bfc8185709aad8359c8a8 a3992d776fd8f268d3c052410227ce4ff04a8587 5771327fac14146d594c162fb91517c77569eef8 79d5748f88e82b9818dd8bc5b38de117b1fd8315 6d9d167871722cd0c78da87706c6a584312c9c6f 8d8e5cf34983aa1f27875cfb5f3c76d6a53677b9 9ced9ff8af1813d7feb9001943d6c629550c5343 627964ee0c5eb3d270d35918b49aab39efe3175c abf53ea0a0df12c71ec01a7d392df707705679e6 db1cf188e93fb2c7e795bf68162a8a8868c60968 dde231e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:42:46:ad:2f:73:79:7b:5f:0a:22:15:00:72:3a:5c:31:15:5a:19] modulus: 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 public exponent: 10001 ] 2021-11-13 13:08:49.275  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-13 13:08:49.276 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-13 13:08:49.277 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-13 13:08:49.278 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 13:08:49.278  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-13 13:08:49.279  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-13 13:08:49.303  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-13 13:08:49.303 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 13:08:49.304 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-13 13:08:49.304 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-13 13:08:49.313 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-13 13:08:49.313 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:08:49.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:08:49.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:08:49.592  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-13 13:08:49.594  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-13 13:08:49.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-13 13:08:49.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:08:49.596  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-13 13:08:49.597  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-13 13:08:49.597 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:08:49.597 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:08:49.598 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:08:49.599 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:08:49.599 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:08:49.601 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:08:49.603 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:08:49.603 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:08:49.604 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:08:49.605 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 13:08:49.617 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 463281850052294147440380009953693881036776565913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 10:47:59 UTC 2021 Final Date: Thu Nov 13 10:47:58 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [07:8a:3e:1a:58:9c:c9:d9:2b:28:f2:01:3d:20:9e:e9:46:1c:a6:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0eb23297f61547bee491a3f07d33a7a56eeb05a 5ecfeb241951a3ec14b8542302953eaead7faafa 3cddbdab774edbcc4af62451f901f6271cfbd70b 9b8cbe12139ec475163769f45dcf2b22dbb56b6f c2c9071eca91f775fd7bbaf3a90c9b715be39619 855e50f0176e619c5ca413ee9c0aafa91606f5ba dcae56378eb5b95a6b41c8b872e8b7626e7175e3 f5a44d483e5d3f86aa4e0d5305a481c9e1e14b13 d5b435ab0fb12ab7309901597a28294b6875cc8d e759f66bd9d72420920bfc8185709aad8359c8a8 a3992d776fd8f268d3c052410227ce4ff04a8587 5771327fac14146d594c162fb91517c77569eef8 79d5748f88e82b9818dd8bc5b38de117b1fd8315 6d9d167871722cd0c78da87706c6a584312c9c6f 8d8e5cf34983aa1f27875cfb5f3c76d6a53677b9 9ced9ff8af1813d7feb9001943d6c629550c5343 627964ee0c5eb3d270d35918b49aab39efe3175c abf53ea0a0df12c71ec01a7d392df707705679e6 db1cf188e93fb2c7e795bf68162a8a8868c60968 dde231e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d7:d7:3d:3f:0a:1e:27:8f:28:ce:c1:b0:8e:94:aa:cc:cb:32:5a:78] modulus: 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 public exponent: 10001 ] 2021-11-13 13:11:04.573  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-13 13:11:04.574 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-13 13:11:04.576 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-13 13:11:04.576 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 13:11:04.577  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-13 13:11:04.577  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-13 13:11:04.578  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-13 13:11:04.578 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 13:11:04.578 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-13 13:11:04.579 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-13 13:11:04.585 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-13 13:11:04.586 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:11:04.586 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:11:04.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:11:05.632 ERROR 1 [nio-8443-exec-9] o.o.o.c.c.i.Cmpv2HttpClient  : IOException error Connect to ejbca:8080 [ejbca/10.233.63.181] failed: Connection refused (Connection refused), while trying to connect CA RA 2021-11-13 13:11:05.636 ERROR 1 [nio-8443-exec-9] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:169) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:190) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:138) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:106) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:888) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:793) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1040) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:943) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:634) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:741) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:108) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:747) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:367) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:860) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1598) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.63.181] failed: Connection refused (Connection refused) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159) at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373) at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394) at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237) at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185) at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89) at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110) at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108) at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke() at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:769) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:136) at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747) at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:689) at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$74038042.execute() at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71) ... 62 more Caused by: java.net.ConnectException: Connection refused (Connection refused) at java.base/java.net.PlainSocketImpl.socketConnect(Native Method) at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source) at java.base/java.net.SocksSocketImpl.connect(Unknown Source) at java.base/java.net.Socket.connect(Unknown Source) at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142) ... 83 more 2021-11-13 13:11:58.222  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-13 13:11:58.223 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-13 13:11:58.225 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-13 13:11:58.225 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 13:11:58.226  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-13 13:11:58.227  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-13 13:11:58.227  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-13 13:11:58.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 13:11:58.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-13 13:11:58.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-13 13:11:58.234 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-13 13:11:58.235 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:11:58.235 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:11:58.236 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:11:58.627  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-13 13:11:58.628  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-13 13:11:58.628 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-13 13:11:58.629 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:11:58.630  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-13 13:11:58.630  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-13 13:11:58.630 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:11:58.631 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:11:58.631 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:11:58.632 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:11:58.632 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:11:58.632 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:11:58.633 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:11:58.633 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:11:58.633 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:11:58.634 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 13:11:58.637 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 463281850052294147440380009953693881036776565913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 10:47:59 UTC 2021 Final Date: Thu Nov 13 10:47:58 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [07:8a:3e:1a:58:9c:c9:d9:2b:28:f2:01:3d:20:9e:e9:46:1c:a6:62] modulus: b600a68033344f388ffae1794998047e3d8a0a5e6793655cc426228a0c678ecf0c40b2eb861e822833f1235cee635b364866d3461570ee726746c90ebf046983561318beded2a4363bb134b982a32e05296ec5becfc6e2137c00b7039ffc583fed13756703799be39b73be644684fe509a03b88d54e925fa0d0648e89f966f4e34e132c73f2ed06223e6907617302739f8b400599bb3d70b683ea6e81f4b9e4124362a456dbb7d10d6f8b75373eaa2c5f4c762984a0bf839aebfa4499787e8faa66e9f88ee021ee1cfa6baab7af208308e205feff2b734f86b67c4243712f9ba438df644ebb78b3d59cdddac8b8846dcbe60a5ba5ef9d497787fc756dd5ba2163999ee580a49fd9bb11d7545e05aff573c760eefd9fdb255dd9935537729fd8548366f9a60d024848f84f1f17f33a4108318ec6e6eac0285bfeac071d5d66c8381ecb9932a47202a1af34aa4847107753df9721ab6b63b91ad27da628f47dba280e2163f6430e5042fb2b5b370c7ff736493593ec51411099b74c42e21f10aad public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0eb23297f61547bee491a3f07d33a7a56eeb05a 5ecfeb241951a3ec14b8542302953eaead7faafa 3cddbdab774edbcc4af62451f901f6271cfbd70b 9b8cbe12139ec475163769f45dcf2b22dbb56b6f c2c9071eca91f775fd7bbaf3a90c9b715be39619 855e50f0176e619c5ca413ee9c0aafa91606f5ba dcae56378eb5b95a6b41c8b872e8b7626e7175e3 f5a44d483e5d3f86aa4e0d5305a481c9e1e14b13 d5b435ab0fb12ab7309901597a28294b6875cc8d e759f66bd9d72420920bfc8185709aad8359c8a8 a3992d776fd8f268d3c052410227ce4ff04a8587 5771327fac14146d594c162fb91517c77569eef8 79d5748f88e82b9818dd8bc5b38de117b1fd8315 6d9d167871722cd0c78da87706c6a584312c9c6f 8d8e5cf34983aa1f27875cfb5f3c76d6a53677b9 9ced9ff8af1813d7feb9001943d6c629550c5343 627964ee0c5eb3d270d35918b49aab39efe3175c abf53ea0a0df12c71ec01a7d392df707705679e6 db1cf188e93fb2c7e795bf68162a8a8868c60968 dde231e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e7:a3:d0:b4:55:99:a6:f6:40:d5:5f:6f:f8:65:34:af:92:fd:fc:1a] modulus: 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 public exponent: 10001 ] 2021-11-13 13:12:29.711  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-13 13:12:29.714 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-13 13:12:29.716 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-13 13:12:29.716 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 13:12:29.717  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-13 13:12:29.717  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-13 13:12:29.718  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-13 13:12:29.718 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 13:12:29.718 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-13 13:12:29.719 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-13 13:12:29.796 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-13 13:12:29.797 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:12:29.797 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:12:29.797 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:12:29.868  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-13 13:12:29.893  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-13 13:12:29.894 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-13 13:12:29.894 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:12:29.896  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-13 13:12:29.896  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-13 13:12:29.897 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:12:29.897 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:12:29.897 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:12:29.898 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:12:29.898 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:12:29.899 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:12:29.899 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:12:29.900 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:12:29.900 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:12:29.901 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 13:12:29.905 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 463281850052294147440380009953693881036776565913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 10:47:59 UTC 2021 Final Date: Thu Nov 13 10:47:58 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [07:8a:3e:1a:58:9c:c9:d9:2b:28:f2:01:3d:20:9e:e9:46:1c:a6:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0eb23297f61547bee491a3f07d33a7a56eeb05a 5ecfeb241951a3ec14b8542302953eaead7faafa 3cddbdab774edbcc4af62451f901f6271cfbd70b 9b8cbe12139ec475163769f45dcf2b22dbb56b6f c2c9071eca91f775fd7bbaf3a90c9b715be39619 855e50f0176e619c5ca413ee9c0aafa91606f5ba dcae56378eb5b95a6b41c8b872e8b7626e7175e3 f5a44d483e5d3f86aa4e0d5305a481c9e1e14b13 d5b435ab0fb12ab7309901597a28294b6875cc8d e759f66bd9d72420920bfc8185709aad8359c8a8 a3992d776fd8f268d3c052410227ce4ff04a8587 5771327fac14146d594c162fb91517c77569eef8 79d5748f88e82b9818dd8bc5b38de117b1fd8315 6d9d167871722cd0c78da87706c6a584312c9c6f 8d8e5cf34983aa1f27875cfb5f3c76d6a53677b9 9ced9ff8af1813d7feb9001943d6c629550c5343 627964ee0c5eb3d270d35918b49aab39efe3175c abf53ea0a0df12c71ec01a7d392df707705679e6 db1cf188e93fb2c7e795bf68162a8a8868c60968 dde231e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4d:74:3a:4d:ef:6c:7e:3c:14:ae:c8:73:c7:d1:82:d2:fe:80:fb:92] modulus: a65ba5418778ade03cf1e572043c38164430bdb95cc7859802fc930d4e8db1c94aade2ead3bfba71763b9490e5b6fe04072c7690e1be21cc9122c5b5ba44e5a055514627ccc11bbae160bfb8f46de7777618610a5689d56d2a810f21fac82ffa27cdd87c1ba504c4485e6aae16870d6b71cbbe012bf160fe7a3b8d6154d5b3420565ceb0eca8e025180458b204a55e8fdadbab926396b76a4b2b01bfc68c268339f688f8643e6a0e9d331e613eb53623b4c8039655afe1a7fb0db9821f9586616b02833d0a2624a92a1112754f340b74fa7c2fda78a5cc3fd749e7026096932567acd2bc9c47229ba30be93e0069fae5abd2351d4a407c996be0652e0b0a8b6b public exponent: 10001 ] 2021-11-13 13:13:03.938  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-13 13:13:03.939 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-13 13:13:03.940 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-13 13:13:03.941 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 13:13:03.941  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-13 13:13:03.942  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-13 13:13:03.942  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-13 13:13:03.942 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 13:13:03.942 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-13 13:13:03.943 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-13 13:13:03.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-13 13:13:03.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:13:03.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:13:03.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:13:04.072  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-13 13:13:04.072  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-13 13:13:04.093 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-13 13:13:04.093 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:13:04.094  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-13 13:13:04.095  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-13 13:13:04.095 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:13:04.096 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:13:04.096 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:13:04.096 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:13:04.097 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:13:04.097 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:13:04.097 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:13:04.098 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:13:04.098 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:13:04.099 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 13:13:04.101 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 463281850052294147440380009953693881036776565913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 10:47:59 UTC 2021 Final Date: Thu Nov 13 10:47:58 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [07:8a:3e:1a:58:9c:c9:d9:2b:28:f2:01:3d:20:9e:e9:46:1c:a6:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0eb23297f61547bee491a3f07d33a7a56eeb05a 5ecfeb241951a3ec14b8542302953eaead7faafa 3cddbdab774edbcc4af62451f901f6271cfbd70b 9b8cbe12139ec475163769f45dcf2b22dbb56b6f c2c9071eca91f775fd7bbaf3a90c9b715be39619 855e50f0176e619c5ca413ee9c0aafa91606f5ba dcae56378eb5b95a6b41c8b872e8b7626e7175e3 f5a44d483e5d3f86aa4e0d5305a481c9e1e14b13 d5b435ab0fb12ab7309901597a28294b6875cc8d e759f66bd9d72420920bfc8185709aad8359c8a8 a3992d776fd8f268d3c052410227ce4ff04a8587 5771327fac14146d594c162fb91517c77569eef8 79d5748f88e82b9818dd8bc5b38de117b1fd8315 6d9d167871722cd0c78da87706c6a584312c9c6f 8d8e5cf34983aa1f27875cfb5f3c76d6a53677b9 9ced9ff8af1813d7feb9001943d6c629550c5343 627964ee0c5eb3d270d35918b49aab39efe3175c abf53ea0a0df12c71ec01a7d392df707705679e6 db1cf188e93fb2c7e795bf68162a8a8868c60968 dde231e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:85:03:e9:48:8f:c3:6e:4d:ef:26:13:89:a0:17:cd:ad:de:23:f2] modulus: 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 public exponent: 10001 ] 2021-11-13 13:14:49.049  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-13 13:14:49.051 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-13 13:14:49.052 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-13 13:14:49.053 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 13:14:49.053  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-13 13:14:49.054  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-13 13:14:49.054  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-13 13:14:49.054 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 13:14:49.055 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-13 13:14:49.055 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-13 13:14:49.059 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-13 13:14:49.060 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:14:49.060 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:14:49.061 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:14:53.581  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-13 13:14:53.582  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-13 13:14:53.583 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-13 13:14:53.583 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:14:53.585  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-13 13:14:53.586  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-13 13:14:53.586 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:14:53.587 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:14:53.587 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:14:53.588 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:14:53.588 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:14:53.589 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:14:53.589 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:14:53.590 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:14:53.590 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:14:53.591 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 13:14:53.594 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 463281850052294147440380009953693881036776565913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 10:47:59 UTC 2021 Final Date: Thu Nov 13 10:47:58 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [07:8a:3e:1a:58:9c:c9:d9:2b:28:f2:01:3d:20:9e:e9:46:1c:a6:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0eb23297f61547bee491a3f07d33a7a56eeb05a 5ecfeb241951a3ec14b8542302953eaead7faafa 3cddbdab774edbcc4af62451f901f6271cfbd70b 9b8cbe12139ec475163769f45dcf2b22dbb56b6f c2c9071eca91f775fd7bbaf3a90c9b715be39619 855e50f0176e619c5ca413ee9c0aafa91606f5ba dcae56378eb5b95a6b41c8b872e8b7626e7175e3 f5a44d483e5d3f86aa4e0d5305a481c9e1e14b13 d5b435ab0fb12ab7309901597a28294b6875cc8d e759f66bd9d72420920bfc8185709aad8359c8a8 a3992d776fd8f268d3c052410227ce4ff04a8587 5771327fac14146d594c162fb91517c77569eef8 79d5748f88e82b9818dd8bc5b38de117b1fd8315 6d9d167871722cd0c78da87706c6a584312c9c6f 8d8e5cf34983aa1f27875cfb5f3c76d6a53677b9 9ced9ff8af1813d7feb9001943d6c629550c5343 627964ee0c5eb3d270d35918b49aab39efe3175c abf53ea0a0df12c71ec01a7d392df707705679e6 db1cf188e93fb2c7e795bf68162a8a8868c60968 dde231e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d8:b7:3d:b0:73:d2:61:ae:c2:8c:03:c9:8d:c2:56:ec:d1:22:b5:8f] modulus: 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 public exponent: 10001 ] 2021-11-13 13:15:37.947  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-13 13:15:37.948 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-13 13:15:37.949 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-13 13:15:37.950 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 13:15:37.950  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-13 13:15:37.951  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-13 13:15:37.951  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-13 13:15:37.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 13:15:37.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-13 13:15:37.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-13 13:15:37.957 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-13 13:15:37.958 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:15:37.958 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:15:37.958 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:15:38.078  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-13 13:15:38.079  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-13 13:15:38.079 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-13 13:15:38.079 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:15:38.093  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-13 13:15:38.093  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-13 13:15:38.093 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:15:38.094 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:15:38.094 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:15:38.095 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:15:38.095 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:15:38.095 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:15:38.096 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:15:38.096 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:15:38.096 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:15:38.097 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 13:15:38.103 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 463281850052294147440380009953693881036776565913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 10:47:59 UTC 2021 Final Date: Thu Nov 13 10:47:58 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [07:8a:3e:1a:58:9c:c9:d9:2b:28:f2:01:3d:20:9e:e9:46:1c:a6:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0eb23297f61547bee491a3f07d33a7a56eeb05a 5ecfeb241951a3ec14b8542302953eaead7faafa 3cddbdab774edbcc4af62451f901f6271cfbd70b 9b8cbe12139ec475163769f45dcf2b22dbb56b6f c2c9071eca91f775fd7bbaf3a90c9b715be39619 855e50f0176e619c5ca413ee9c0aafa91606f5ba dcae56378eb5b95a6b41c8b872e8b7626e7175e3 f5a44d483e5d3f86aa4e0d5305a481c9e1e14b13 d5b435ab0fb12ab7309901597a28294b6875cc8d e759f66bd9d72420920bfc8185709aad8359c8a8 a3992d776fd8f268d3c052410227ce4ff04a8587 5771327fac14146d594c162fb91517c77569eef8 79d5748f88e82b9818dd8bc5b38de117b1fd8315 6d9d167871722cd0c78da87706c6a584312c9c6f 8d8e5cf34983aa1f27875cfb5f3c76d6a53677b9 9ced9ff8af1813d7feb9001943d6c629550c5343 627964ee0c5eb3d270d35918b49aab39efe3175c abf53ea0a0df12c71ec01a7d392df707705679e6 db1cf188e93fb2c7e795bf68162a8a8868c60968 dde231e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:a7:3f:0b:03:24:b3:1e:e5:d0:43:65:a0:3b:e7:b0:23:6f:30:a3] modulus: dc4351281d0e5987a2ca0148b5102bdb6f9bbba4595944b73b24e632292172b287bcdc110cdacb3f1b5f948a9479a1e083210d93467a70f2d6819ab524a080ceae2a9f0c2116d3086ff317fda5166d4dd9f152a72b77a49abc2effd22a4d3a2b39a250f2a0818dff86c25b2d488727a94d082eb00ed5a74065c7ce0c41d57bf62035156512feba2f4c584323f65861a731b2cf0eed60b379ed6c55e8a3628058fa385810eefdefa4602c0bb7c39e22599762308a7b8a4c54b648ef95cd9510aced1916c7baf2578797e039197117172132856888511b6e1e894c6dce42be0c10403a99a47d20f0fc53f4ae072c89badcfd49f3da9a535eeeddff8c57f5b9041b public exponent: 10001 ] 2021-11-13 13:19:07.950  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-13 13:19:07.951 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-13 13:19:07.952 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-13 13:19:07.953 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 13:19:07.953  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-13 13:19:07.954  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-13 13:19:07.954  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-13 13:19:07.955 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 13:19:07.955 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-13 13:19:07.955 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-13 13:19:07.959 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-13 13:19:07.960 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:19:07.960 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:19:07.960 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:19:08.079  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-13 13:19:08.079  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-13 13:19:08.080 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-13 13:19:08.080 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:19:08.093  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-13 13:19:08.093  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-13 13:19:08.094 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:19:08.094 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:19:08.094 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:19:08.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:19:08.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:19:08.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:19:08.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:19:08.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:19:08.097 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:19:08.097 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 13:19:08.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 463281850052294147440380009953693881036776565913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 10:47:59 UTC 2021 Final Date: Thu Nov 13 10:47:58 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [07:8a:3e:1a:58:9c:c9:d9:2b:28:f2:01:3d:20:9e:e9:46:1c:a6:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0eb23297f61547bee491a3f07d33a7a56eeb05a 5ecfeb241951a3ec14b8542302953eaead7faafa 3cddbdab774edbcc4af62451f901f6271cfbd70b 9b8cbe12139ec475163769f45dcf2b22dbb56b6f c2c9071eca91f775fd7bbaf3a90c9b715be39619 855e50f0176e619c5ca413ee9c0aafa91606f5ba dcae56378eb5b95a6b41c8b872e8b7626e7175e3 f5a44d483e5d3f86aa4e0d5305a481c9e1e14b13 d5b435ab0fb12ab7309901597a28294b6875cc8d e759f66bd9d72420920bfc8185709aad8359c8a8 a3992d776fd8f268d3c052410227ce4ff04a8587 5771327fac14146d594c162fb91517c77569eef8 79d5748f88e82b9818dd8bc5b38de117b1fd8315 6d9d167871722cd0c78da87706c6a584312c9c6f 8d8e5cf34983aa1f27875cfb5f3c76d6a53677b9 9ced9ff8af1813d7feb9001943d6c629550c5343 627964ee0c5eb3d270d35918b49aab39efe3175c abf53ea0a0df12c71ec01a7d392df707705679e6 db1cf188e93fb2c7e795bf68162a8a8868c60968 dde231e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [65:76:ab:c9:fb:bf:25:bd:ef:0b:71:85:46:6e:aa:e0:53:03:6b:30] modulus: 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 public exponent: 10001 ] 2021-11-13 13:20:20.602  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-13 13:20:20.605 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-13 13:20:20.606 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-13 13:20:20.607 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 13:20:20.607  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-13 13:20:20.608  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-13 13:20:20.608  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-13 13:20:20.608 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 13:20:20.608 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-13 13:20:20.609 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-13 13:20:20.613 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-13 13:20:20.613 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:20:20.613 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:20:20.614 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:20:20.707  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-13 13:20:20.707  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-13 13:20:20.707 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-13 13:20:20.708 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:20:20.709  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-13 13:20:20.709  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-13 13:20:20.709 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:20:20.709 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:20:20.709 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:20:20.710 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:20:20.710 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:20:20.710 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:20:20.711 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:20:20.711 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:20:20.711 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:20:20.712 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 13:20:20.714 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 463281850052294147440380009953693881036776565913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 10:47:59 UTC 2021 Final Date: Thu Nov 13 10:47:58 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [07:8a:3e:1a:58:9c:c9:d9:2b:28:f2:01:3d:20:9e:e9:46:1c:a6:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0eb23297f61547bee491a3f07d33a7a56eeb05a 5ecfeb241951a3ec14b8542302953eaead7faafa 3cddbdab774edbcc4af62451f901f6271cfbd70b 9b8cbe12139ec475163769f45dcf2b22dbb56b6f c2c9071eca91f775fd7bbaf3a90c9b715be39619 855e50f0176e619c5ca413ee9c0aafa91606f5ba dcae56378eb5b95a6b41c8b872e8b7626e7175e3 f5a44d483e5d3f86aa4e0d5305a481c9e1e14b13 d5b435ab0fb12ab7309901597a28294b6875cc8d e759f66bd9d72420920bfc8185709aad8359c8a8 a3992d776fd8f268d3c052410227ce4ff04a8587 5771327fac14146d594c162fb91517c77569eef8 79d5748f88e82b9818dd8bc5b38de117b1fd8315 6d9d167871722cd0c78da87706c6a584312c9c6f 8d8e5cf34983aa1f27875cfb5f3c76d6a53677b9 9ced9ff8af1813d7feb9001943d6c629550c5343 627964ee0c5eb3d270d35918b49aab39efe3175c abf53ea0a0df12c71ec01a7d392df707705679e6 db1cf188e93fb2c7e795bf68162a8a8868c60968 dde231e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8a:b7:41:ad:66:97:3d:37:12:d6:6d:b0:e1:4e:d6:d3:c1:cc:10:5f] modulus: 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 public exponent: 10001 ] 2021-11-13 13:21:12.884  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-13 13:21:12.885 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-13 13:21:12.886 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-13 13:21:12.886 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 13:21:12.887  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-13 13:21:12.887  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-13 13:21:12.887  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-13 13:21:12.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 13:21:12.888 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-13 13:21:12.888 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-13 13:21:12.892 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-13 13:21:12.892 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:21:12.893 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:21:12.893 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:21:12.975  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-13 13:21:12.976  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-13 13:21:12.976 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-13 13:21:12.976 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:21:12.977  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-13 13:21:12.977  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-13 13:21:12.978 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:21:12.978 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:21:12.978 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:21:12.978 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:21:12.979 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:21:12.979 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:21:12.979 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:21:12.980 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:21:12.980 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:21:12.980 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 13:21:12.983 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 463281850052294147440380009953693881036776565913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 10:47:59 UTC 2021 Final Date: Thu Nov 13 10:47:58 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [07:8a:3e:1a:58:9c:c9:d9:2b:28:f2:01:3d:20:9e:e9:46:1c:a6:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0eb23297f61547bee491a3f07d33a7a56eeb05a 5ecfeb241951a3ec14b8542302953eaead7faafa 3cddbdab774edbcc4af62451f901f6271cfbd70b 9b8cbe12139ec475163769f45dcf2b22dbb56b6f c2c9071eca91f775fd7bbaf3a90c9b715be39619 855e50f0176e619c5ca413ee9c0aafa91606f5ba dcae56378eb5b95a6b41c8b872e8b7626e7175e3 f5a44d483e5d3f86aa4e0d5305a481c9e1e14b13 d5b435ab0fb12ab7309901597a28294b6875cc8d e759f66bd9d72420920bfc8185709aad8359c8a8 a3992d776fd8f268d3c052410227ce4ff04a8587 5771327fac14146d594c162fb91517c77569eef8 79d5748f88e82b9818dd8bc5b38de117b1fd8315 6d9d167871722cd0c78da87706c6a584312c9c6f 8d8e5cf34983aa1f27875cfb5f3c76d6a53677b9 9ced9ff8af1813d7feb9001943d6c629550c5343 627964ee0c5eb3d270d35918b49aab39efe3175c abf53ea0a0df12c71ec01a7d392df707705679e6 db1cf188e93fb2c7e795bf68162a8a8868c60968 dde231e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b1:5f:cd:bb:6a:4f:98:ac:b0:cb:ae:13:bb:24:9d:3d:82:50:62:d4] modulus: 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 public exponent: 10001 ] 2021-11-13 13:24:54.805  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-13 13:24:54.807 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-13 13:24:54.808 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-13 13:24:54.809 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 13:24:54.809  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-13 13:24:54.809  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-13 13:24:54.809  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-13 13:24:54.810 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 13:24:54.810 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-13 13:24:54.810 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-13 13:24:54.815 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-13 13:24:54.815 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:24:54.816 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:24:54.816 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:24:54.978  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-13 13:24:54.979  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-13 13:24:54.979 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-13 13:24:54.979 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:24:54.980  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-13 13:24:54.980  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-13 13:24:54.981 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:24:54.981 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:24:54.981 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:24:54.982 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:24:54.982 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:24:54.982 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:24:54.982 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:24:54.983 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:24:54.983 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:24:54.983 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 13:24:54.994 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 463281850052294147440380009953693881036776565913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 10:47:59 UTC 2021 Final Date: Thu Nov 13 10:47:58 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [07:8a:3e:1a:58:9c:c9:d9:2b:28:f2:01:3d:20:9e:e9:46:1c:a6:62] modulus: b600a68033344f388ffae1794998047e3d8a0a5e6793655cc426228a0c678ecf0c40b2eb861e822833f1235cee635b364866d3461570ee726746c90ebf046983561318beded2a4363bb134b982a32e05296ec5becfc6e2137c00b7039ffc583fed13756703799be39b73be644684fe509a03b88d54e925fa0d0648e89f966f4e34e132c73f2ed06223e6907617302739f8b400599bb3d70b683ea6e81f4b9e4124362a456dbb7d10d6f8b75373eaa2c5f4c762984a0bf839aebfa4499787e8faa66e9f88ee021ee1cfa6baab7af208308e205feff2b734f86b67c4243712f9ba438df644ebb78b3d59cdddac8b8846dcbe60a5ba5ef9d497787fc756dd5ba2163999ee580a49fd9bb11d7545e05aff573c760eefd9fdb255dd9935537729fd8548366f9a60d024848f84f1f17f33a4108318ec6e6eac0285bfeac071d5d66c8381ecb9932a47202a1af34aa4847107753df9721ab6b63b91ad27da628f47dba280e2163f6430e5042fb2b5b370c7ff736493593ec51411099b74c42e21f10aad public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0eb23297f61547bee491a3f07d33a7a56eeb05a 5ecfeb241951a3ec14b8542302953eaead7faafa 3cddbdab774edbcc4af62451f901f6271cfbd70b 9b8cbe12139ec475163769f45dcf2b22dbb56b6f c2c9071eca91f775fd7bbaf3a90c9b715be39619 855e50f0176e619c5ca413ee9c0aafa91606f5ba dcae56378eb5b95a6b41c8b872e8b7626e7175e3 f5a44d483e5d3f86aa4e0d5305a481c9e1e14b13 d5b435ab0fb12ab7309901597a28294b6875cc8d e759f66bd9d72420920bfc8185709aad8359c8a8 a3992d776fd8f268d3c052410227ce4ff04a8587 5771327fac14146d594c162fb91517c77569eef8 79d5748f88e82b9818dd8bc5b38de117b1fd8315 6d9d167871722cd0c78da87706c6a584312c9c6f 8d8e5cf34983aa1f27875cfb5f3c76d6a53677b9 9ced9ff8af1813d7feb9001943d6c629550c5343 627964ee0c5eb3d270d35918b49aab39efe3175c abf53ea0a0df12c71ec01a7d392df707705679e6 db1cf188e93fb2c7e795bf68162a8a8868c60968 dde231e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3c:f3:db:13:41:7c:7f:4a:ed:f9:a7:fd:fe:9a:11:dd:08:dc:ba:a7] modulus: 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 public exponent: 10001 ] 2021-11-13 13:26:20.679  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-13 13:26:20.680 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-13 13:26:20.681 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-13 13:26:20.681 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 13:26:20.682  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-13 13:26:20.682  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-13 13:26:20.682  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-13 13:26:20.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 13:26:20.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-13 13:26:20.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-13 13:26:20.690 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-13 13:26:20.691 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:26:20.691 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:26:20.691 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:26:20.787  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-13 13:26:20.787  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-13 13:26:20.787 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-13 13:26:20.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:26:20.789  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-13 13:26:20.789  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-13 13:26:20.789 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:26:20.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:26:20.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:26:20.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:26:20.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:26:20.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:26:20.792 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:26:20.792 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:26:20.792 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:26:20.793 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 13:26:20.795 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 463281850052294147440380009953693881036776565913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 10:47:59 UTC 2021 Final Date: Thu Nov 13 10:47:58 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [07:8a:3e:1a:58:9c:c9:d9:2b:28:f2:01:3d:20:9e:e9:46:1c:a6:62] modulus: b600a68033344f388ffae1794998047e3d8a0a5e6793655cc426228a0c678ecf0c40b2eb861e822833f1235cee635b364866d3461570ee726746c90ebf046983561318beded2a4363bb134b982a32e05296ec5becfc6e2137c00b7039ffc583fed13756703799be39b73be644684fe509a03b88d54e925fa0d0648e89f966f4e34e132c73f2ed06223e6907617302739f8b400599bb3d70b683ea6e81f4b9e4124362a456dbb7d10d6f8b75373eaa2c5f4c762984a0bf839aebfa4499787e8faa66e9f88ee021ee1cfa6baab7af208308e205feff2b734f86b67c4243712f9ba438df644ebb78b3d59cdddac8b8846dcbe60a5ba5ef9d497787fc756dd5ba2163999ee580a49fd9bb11d7545e05aff573c760eefd9fdb255dd9935537729fd8548366f9a60d024848f84f1f17f33a4108318ec6e6eac0285bfeac071d5d66c8381ecb9932a47202a1af34aa4847107753df9721ab6b63b91ad27da628f47dba280e2163f6430e5042fb2b5b370c7ff736493593ec51411099b74c42e21f10aad public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0eb23297f61547bee491a3f07d33a7a56eeb05a 5ecfeb241951a3ec14b8542302953eaead7faafa 3cddbdab774edbcc4af62451f901f6271cfbd70b 9b8cbe12139ec475163769f45dcf2b22dbb56b6f c2c9071eca91f775fd7bbaf3a90c9b715be39619 855e50f0176e619c5ca413ee9c0aafa91606f5ba dcae56378eb5b95a6b41c8b872e8b7626e7175e3 f5a44d483e5d3f86aa4e0d5305a481c9e1e14b13 d5b435ab0fb12ab7309901597a28294b6875cc8d e759f66bd9d72420920bfc8185709aad8359c8a8 a3992d776fd8f268d3c052410227ce4ff04a8587 5771327fac14146d594c162fb91517c77569eef8 79d5748f88e82b9818dd8bc5b38de117b1fd8315 6d9d167871722cd0c78da87706c6a584312c9c6f 8d8e5cf34983aa1f27875cfb5f3c76d6a53677b9 9ced9ff8af1813d7feb9001943d6c629550c5343 627964ee0c5eb3d270d35918b49aab39efe3175c abf53ea0a0df12c71ec01a7d392df707705679e6 db1cf188e93fb2c7e795bf68162a8a8868c60968 dde231e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8d:58:06:7c:01:73:cc:19:be:73:96:c2:05:fa:27:c1:2f:48:27:8f] modulus: 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 public exponent: 10001 ] 2021-11-13 13:30:11.119  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-13 13:30:11.120 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-13 13:30:11.121 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-13 13:30:11.121 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 13:30:11.122  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-13 13:30:11.122  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-13 13:30:11.122  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-13 13:30:11.123 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 13:30:11.123 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-13 13:30:11.123 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-13 13:30:11.127 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-13 13:30:11.128 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:30:11.128 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:30:11.128 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:30:11.216  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-13 13:30:11.216  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-13 13:30:11.216 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-13 13:30:11.217 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:30:11.218  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-13 13:30:11.218  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-13 13:30:11.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:30:11.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:30:11.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:30:11.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:30:11.220 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:30:11.220 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:30:11.220 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:30:11.221 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:30:11.221 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:30:11.222 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 13:30:11.224 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 463281850052294147440380009953693881036776565913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 10:47:59 UTC 2021 Final Date: Thu Nov 13 10:47:58 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [07:8a:3e:1a:58:9c:c9:d9:2b:28:f2:01:3d:20:9e:e9:46:1c:a6:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0eb23297f61547bee491a3f07d33a7a56eeb05a 5ecfeb241951a3ec14b8542302953eaead7faafa 3cddbdab774edbcc4af62451f901f6271cfbd70b 9b8cbe12139ec475163769f45dcf2b22dbb56b6f c2c9071eca91f775fd7bbaf3a90c9b715be39619 855e50f0176e619c5ca413ee9c0aafa91606f5ba dcae56378eb5b95a6b41c8b872e8b7626e7175e3 f5a44d483e5d3f86aa4e0d5305a481c9e1e14b13 d5b435ab0fb12ab7309901597a28294b6875cc8d e759f66bd9d72420920bfc8185709aad8359c8a8 a3992d776fd8f268d3c052410227ce4ff04a8587 5771327fac14146d594c162fb91517c77569eef8 79d5748f88e82b9818dd8bc5b38de117b1fd8315 6d9d167871722cd0c78da87706c6a584312c9c6f 8d8e5cf34983aa1f27875cfb5f3c76d6a53677b9 9ced9ff8af1813d7feb9001943d6c629550c5343 627964ee0c5eb3d270d35918b49aab39efe3175c abf53ea0a0df12c71ec01a7d392df707705679e6 db1cf188e93fb2c7e795bf68162a8a8868c60968 dde231e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8a:66:ae:95:98:42:44:54:3c:30:33:f5:2f:54:6c:4c:5b:80:b0:53] modulus: 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 public exponent: 10001 ] 2021-11-13 13:31:24.577  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-13 13:31:24.578 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-13 13:31:24.579 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-13 13:31:24.579 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 13:31:24.580  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-13 13:31:24.580  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-13 13:31:24.580  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-13 13:31:24.581 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 13:31:24.581 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-13 13:31:24.581 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-13 13:31:24.585 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-13 13:31:24.585 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:31:24.586 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:31:24.586 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:31:24.765  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-13 13:31:24.765  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-13 13:31:24.766 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-13 13:31:24.766 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:31:24.767  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-13 13:31:24.768  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-13 13:31:24.768 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:31:24.768 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:31:24.769 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:31:24.769 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:31:24.770 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:31:24.770 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:31:24.770 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:31:24.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:31:24.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:31:24.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 13:31:24.774 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 463281850052294147440380009953693881036776565913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 10:47:59 UTC 2021 Final Date: Thu Nov 13 10:47:58 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [07:8a:3e:1a:58:9c:c9:d9:2b:28:f2:01:3d:20:9e:e9:46:1c:a6:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0eb23297f61547bee491a3f07d33a7a56eeb05a 5ecfeb241951a3ec14b8542302953eaead7faafa 3cddbdab774edbcc4af62451f901f6271cfbd70b 9b8cbe12139ec475163769f45dcf2b22dbb56b6f c2c9071eca91f775fd7bbaf3a90c9b715be39619 855e50f0176e619c5ca413ee9c0aafa91606f5ba dcae56378eb5b95a6b41c8b872e8b7626e7175e3 f5a44d483e5d3f86aa4e0d5305a481c9e1e14b13 d5b435ab0fb12ab7309901597a28294b6875cc8d e759f66bd9d72420920bfc8185709aad8359c8a8 a3992d776fd8f268d3c052410227ce4ff04a8587 5771327fac14146d594c162fb91517c77569eef8 79d5748f88e82b9818dd8bc5b38de117b1fd8315 6d9d167871722cd0c78da87706c6a584312c9c6f 8d8e5cf34983aa1f27875cfb5f3c76d6a53677b9 9ced9ff8af1813d7feb9001943d6c629550c5343 627964ee0c5eb3d270d35918b49aab39efe3175c abf53ea0a0df12c71ec01a7d392df707705679e6 db1cf188e93fb2c7e795bf68162a8a8868c60968 dde231e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:12:b6:4c:e9:10:8f:1e:bf:93:96:34:13:ce:1c:78:a9:65:94:f1] modulus: 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 public exponent: 10001 ] 2021-11-13 13:35:36.958  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-13 13:35:36.960 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-13 13:35:36.962 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-13 13:35:36.962 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 13:35:36.963  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-13 13:35:36.963  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-13 13:35:36.963  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-13 13:35:36.963 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 13:35:36.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-13 13:35:36.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-13 13:35:36.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-13 13:35:36.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:35:36.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:35:36.969 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:35:37.078  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-13 13:35:37.079  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-13 13:35:37.079 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-13 13:35:37.079 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:35:37.080  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-13 13:35:37.081  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-13 13:35:37.081 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:35:37.081 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:35:37.081 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:35:37.082 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:35:37.082 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:35:37.082 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:35:37.083 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:35:37.083 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:35:37.084 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:35:37.085 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 13:35:37.089 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 463281850052294147440380009953693881036776565913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 10:47:59 UTC 2021 Final Date: Thu Nov 13 10:47:58 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [07:8a:3e:1a:58:9c:c9:d9:2b:28:f2:01:3d:20:9e:e9:46:1c:a6:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0eb23297f61547bee491a3f07d33a7a56eeb05a 5ecfeb241951a3ec14b8542302953eaead7faafa 3cddbdab774edbcc4af62451f901f6271cfbd70b 9b8cbe12139ec475163769f45dcf2b22dbb56b6f c2c9071eca91f775fd7bbaf3a90c9b715be39619 855e50f0176e619c5ca413ee9c0aafa91606f5ba dcae56378eb5b95a6b41c8b872e8b7626e7175e3 f5a44d483e5d3f86aa4e0d5305a481c9e1e14b13 d5b435ab0fb12ab7309901597a28294b6875cc8d e759f66bd9d72420920bfc8185709aad8359c8a8 a3992d776fd8f268d3c052410227ce4ff04a8587 5771327fac14146d594c162fb91517c77569eef8 79d5748f88e82b9818dd8bc5b38de117b1fd8315 6d9d167871722cd0c78da87706c6a584312c9c6f 8d8e5cf34983aa1f27875cfb5f3c76d6a53677b9 9ced9ff8af1813d7feb9001943d6c629550c5343 627964ee0c5eb3d270d35918b49aab39efe3175c abf53ea0a0df12c71ec01a7d392df707705679e6 db1cf188e93fb2c7e795bf68162a8a8868c60968 dde231e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [49:45:48:51:4b:93:7e:09:8c:c7:52:0f:5d:1e:da:cf:80:5c:ab:cb] modulus: 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 public exponent: 10001 ] 2021-11-13 13:36:47.307  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-13 13:36:47.308 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-13 13:36:47.309 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-13 13:36:47.310 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 13:36:47.310  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-13 13:36:47.310  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-13 13:36:47.310  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-13 13:36:47.311 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-13 13:36:47.311 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-13 13:36:47.311 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-13 13:36:47.315 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-13 13:36:47.315 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:36:47.316 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-13 13:36:47.316 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:36:47.405  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-13 13:36:47.406  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-13 13:36:47.406 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-13 13:36:47.406 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 13:36:47.407  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-13 13:36:47.408  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-13 13:36:47.408 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:36:47.408 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:36:47.408 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:36:47.409 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:36:47.409 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:36:47.409 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:36:47.410 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 13:36:47.410 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-13 13:36:47.410 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-13 13:36:47.411 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 13:36:47.413 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 463281850052294147440380009953693881036776565913 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 10:47:59 UTC 2021 Final Date: Thu Nov 13 10:47:58 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [07:8a:3e:1a:58:9c:c9:d9:2b:28:f2:01:3d:20:9e:e9:46:1c:a6:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0eb23297f61547bee491a3f07d33a7a56eeb05a 5ecfeb241951a3ec14b8542302953eaead7faafa 3cddbdab774edbcc4af62451f901f6271cfbd70b 9b8cbe12139ec475163769f45dcf2b22dbb56b6f c2c9071eca91f775fd7bbaf3a90c9b715be39619 855e50f0176e619c5ca413ee9c0aafa91606f5ba dcae56378eb5b95a6b41c8b872e8b7626e7175e3 f5a44d483e5d3f86aa4e0d5305a481c9e1e14b13 d5b435ab0fb12ab7309901597a28294b6875cc8d e759f66bd9d72420920bfc8185709aad8359c8a8 a3992d776fd8f268d3c052410227ce4ff04a8587 5771327fac14146d594c162fb91517c77569eef8 79d5748f88e82b9818dd8bc5b38de117b1fd8315 6d9d167871722cd0c78da87706c6a584312c9c6f 8d8e5cf34983aa1f27875cfb5f3c76d6a53677b9 9ced9ff8af1813d7feb9001943d6c629550c5343 627964ee0c5eb3d270d35918b49aab39efe3175c abf53ea0a0df12c71ec01a7d392df707705679e6 db1cf188e93fb2c7e795bf68162a8a8868c60968 dde231e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c1:21:71:5c:1e:62:e6:8e:8e:1f:fa:9d:7c:50:69:69:f9:aa:3b:1d] modulus: ba049d551371e9bf3f3f74ed1dd894d7dcbfdcf18c99cdf3d1e9169f58722a823b21b54875000de82a4216475fc5b0e5e8fc414bc4c705ebf0a790d5e4e2534e9f443e7ec07efbc74fdeae600bcb09908c87cfdf886fe52834f326cff23dd28aade88fe82fbbd9ca69741a222549c57bc471fe99eca198c1d779e71fa09a49d93c39d4b9eccf688883237e49fdb1fe06b436cc47e3fdcc316d3c37eed68d5fdbb53252bdac8494fda044ee9f5281ca6b93fa27985a4208948b4444db369042c54308c80219117a5ca294c1b9a16bcd1060fc2c784fb8b1590e30077a5b5ed14ee3ed8834808d35f0e19971a55f5581abe4d61de894b89214aa706c43cf5be373 public exponent: 10001 ]