2022-09-30 15:15:52,787 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-09-30 15:15:55,716 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-09-30 15:15:57.715  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Sep 30, 2022 3:16:01 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Sep 30, 2022 3:16:01 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Sep 30, 2022 3:16:01 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Sep 30, 2022 3:16:02 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-09-30 15:16:03.181 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-09-30 15:16:03.838  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-09-30 15:16:04.216  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-09-30 15:16:05.889 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-09-30 15:16:05.896 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-09-30 15:16:05.899 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-09-30 15:16:05.911 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-09-30 15:16:06.000 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-09-30 15:16:06.009 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-09-30 15:16:06.252 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-09-30 15:16:07.143 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Sep 30, 2022 3:16:08 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-09-30 15:16:09.061  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 18.786 seconds (JVM running for 23.364) Sep 30, 2022 3:16:22 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-09-30 15:16:52.406  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-30 15:16:52.458 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-30 15:16:52.639 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-09-30 15:16:52.654 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-30 15:16:52.699  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-09-30 15:16:52.704  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-30 15:16:52.706  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-30 15:16:52.709 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 15:16:52.710 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 15:16:52.719 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 15:16:52.739 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-30 15:16:52.746 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-30 15:16:52.823 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-30 15:16:52.836 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 15:16:52.838 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 15:16:52.846 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 15:16:53.896  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-30 15:16:53.901  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-30 15:16:53.902 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-30 15:16:53.904 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 15:16:53.932  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-30 15:16:53.934  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-30 15:16:53.935 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 15:16:53.936 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 15:16:53.937 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 15:16:53.966 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 15:16:53.967 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 15:16:53.967 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 15:16:53.980 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 15:16:53.982 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 15:16:53.982 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 15:16:53.985 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-30 15:16:54.056 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 434116916682262539322280758633489654382348481933 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 30 15:09:37 UTC 2022 Final Date: Wed Sep 29 15:09:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8e:a3:62:1a:6b:49:d6:dd:50:26:34:fb:36:a0:6b:83:e3:49:3a:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c3e2d1742ad58285494a23681be0ae24dac1dbd7 17b5cd0d1473f5840b056dec537f0d2e7a7bbfa8 7cf1a6427d234d04a8d61693217ad094ebe1ecfa abfb7c0bff6edd971dffea007b8681d5976b70aa b9807d579ada8dba34aba267e38578bd579212ea 0c250f2761af0c8d252c22d1c696dfe9da1025b9 d7ae1b25b245a8bafd273fc3a2e9003f54a90a2b ac95c126462defa6c4585dcffefc72a0e1e7f9f6 f1ec3d3e8d873eeeaf9ed19d86e73b48915739cd cd25749be756743235491dbe13a08fef3802a4ad 1871ae9a4c47513a1980fd97cc4b85f5a3e10025 813de6a0c8b2647b00c204ac1350a0938c335b4b 5c9cd7db393ceb10a9984cc14891b3fedbdaff42 af2866343d20cd2867dd68d12d4c5b148a849f07 4d6ac70442d760988f49eaf4b2b0dc66775e78cd 5f079c97e38b9ebce140a056c06d7a98914ec442 68627828d7ec1e3946397ac8233ab107df26a6b6 02d1fc07b5de7db2190302e83c75c5198d1fc6b1 7004c044b570686a3c33c6f4616a3070c19538e3 793e1ecc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [62:23:5a:dc:3e:79:c7:a0:91:9f:1f:a4:93:11:f5:3b:7b:1d:cc:1b] modulus: 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 public exponent: 10001 ] 2022-09-30 16:29:49.802  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-30 16:29:49.807 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-30 16:29:49.823 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-30 16:29:49.827 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-30 16:29:49.828  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-30 16:29:49.837  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-30 16:29:49.838  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-30 16:29:49.839 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 16:29:49.840 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-30 16:29:49.844 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-30 16:29:49.861 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-30 16:29:49.864 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 16:29:49.866 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 16:29:49.867 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 16:29:50.150  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-30 16:29:50.152  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-30 16:29:50.154 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-30 16:29:50.155 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 16:29:50.163  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-30 16:29:50.217  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-30 16:29:50.219 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:29:50.219 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:29:50.220 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:29:50.226 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:29:50.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:29:50.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:29:50.230 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:29:50.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:29:50.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:29:50.234 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-30 16:29:50.248 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 434116916682262539322280758633489654382348481933 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 30 15:09:37 UTC 2022 Final Date: Wed Sep 29 15:09:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8e:a3:62:1a:6b:49:d6:dd:50:26:34:fb:36:a0:6b:83:e3:49:3a:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c3e2d1742ad58285494a23681be0ae24dac1dbd7 17b5cd0d1473f5840b056dec537f0d2e7a7bbfa8 7cf1a6427d234d04a8d61693217ad094ebe1ecfa abfb7c0bff6edd971dffea007b8681d5976b70aa b9807d579ada8dba34aba267e38578bd579212ea 0c250f2761af0c8d252c22d1c696dfe9da1025b9 d7ae1b25b245a8bafd273fc3a2e9003f54a90a2b ac95c126462defa6c4585dcffefc72a0e1e7f9f6 f1ec3d3e8d873eeeaf9ed19d86e73b48915739cd cd25749be756743235491dbe13a08fef3802a4ad 1871ae9a4c47513a1980fd97cc4b85f5a3e10025 813de6a0c8b2647b00c204ac1350a0938c335b4b 5c9cd7db393ceb10a9984cc14891b3fedbdaff42 af2866343d20cd2867dd68d12d4c5b148a849f07 4d6ac70442d760988f49eaf4b2b0dc66775e78cd 5f079c97e38b9ebce140a056c06d7a98914ec442 68627828d7ec1e3946397ac8233ab107df26a6b6 02d1fc07b5de7db2190302e83c75c5198d1fc6b1 7004c044b570686a3c33c6f4616a3070c19538e3 793e1ecc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:7b:94:4b:ab:99:3b:fc:e3:b3:a4:2b:25:23:ea:5f:28:f7:85:60] modulus: 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 public exponent: 10001 ] 2022-09-30 16:31:52.548  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-30 16:31:52.550 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-30 16:31:52.554 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-09-30 16:31:52.558 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-30 16:31:52.560  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-09-30 16:31:52.563  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-30 16:31:52.564  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-30 16:31:52.565 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 16:31:52.565 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-30 16:31:52.566 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-30 16:31:52.578 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-30 16:31:52.579 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 16:31:52.580 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 16:31:52.581 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 16:31:52.830  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-30 16:31:52.831  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-30 16:31:52.832 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-30 16:31:52.833 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 16:31:52.839  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-30 16:31:52.840  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-30 16:31:52.841 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:31:52.842 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:31:52.842 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:31:52.845 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:31:52.846 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:31:52.847 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:31:52.848 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:31:52.849 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:31:52.849 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:31:52.851 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-30 16:31:52.867 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 434116916682262539322280758633489654382348481933 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 30 15:09:37 UTC 2022 Final Date: Wed Sep 29 15:09:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8e:a3:62:1a:6b:49:d6:dd:50:26:34:fb:36:a0:6b:83:e3:49:3a:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c3e2d1742ad58285494a23681be0ae24dac1dbd7 17b5cd0d1473f5840b056dec537f0d2e7a7bbfa8 7cf1a6427d234d04a8d61693217ad094ebe1ecfa abfb7c0bff6edd971dffea007b8681d5976b70aa b9807d579ada8dba34aba267e38578bd579212ea 0c250f2761af0c8d252c22d1c696dfe9da1025b9 d7ae1b25b245a8bafd273fc3a2e9003f54a90a2b ac95c126462defa6c4585dcffefc72a0e1e7f9f6 f1ec3d3e8d873eeeaf9ed19d86e73b48915739cd cd25749be756743235491dbe13a08fef3802a4ad 1871ae9a4c47513a1980fd97cc4b85f5a3e10025 813de6a0c8b2647b00c204ac1350a0938c335b4b 5c9cd7db393ceb10a9984cc14891b3fedbdaff42 af2866343d20cd2867dd68d12d4c5b148a849f07 4d6ac70442d760988f49eaf4b2b0dc66775e78cd 5f079c97e38b9ebce140a056c06d7a98914ec442 68627828d7ec1e3946397ac8233ab107df26a6b6 02d1fc07b5de7db2190302e83c75c5198d1fc6b1 7004c044b570686a3c33c6f4616a3070c19538e3 793e1ecc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7a:1c:0a:91:00:2d:2d:79:26:b7:83:db:20:5f:52:d9:d8:25:d7:b7] modulus: c9700e972a6d32e6234de110a19cdf050080286709dd4cb61dea606d442000c43a9edbaa1d6a358b858e750f009fb8c28811af718c2b35e91f36c9572f9c7d968e16d9a4b6fcf7cd59ee953e3f18b7612570db99d0c9987d5f341eca5515446da8092b5253c6af579eac73c32f08178008cf2d55d75441a18ae9f3a5cad2a8f8065d2988e872654b2e5aae8be130f577af714d2257efb0d35f72bc6cdd978acfaf670a76d77300385eb65a19d7351a9c6e5d32adbfed8150824668bbea6a49e786d6f528adc729b92200e2ef0ba065ee6d685a9d82654fd58f467c18c89cfd0cdfd4668a939dae47b8c3038d944786dd26efd7b163cabd4acf917da430268a3b public exponent: 10001 ] 2022-09-30 16:32:57.213  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-30 16:32:57.217 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-30 16:32:57.220 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-09-30 16:32:57.222 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-30 16:32:57.223  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-09-30 16:32:57.224  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-30 16:32:57.224  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-30 16:32:57.225 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 16:32:57.226 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-30 16:32:57.249 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-30 16:32:57.265 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-30 16:32:57.267 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 16:32:57.268 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 16:32:57.268 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 16:32:57.422  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-30 16:32:57.423  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-30 16:32:57.424 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-30 16:32:57.424 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 16:32:57.427  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-30 16:32:57.428  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-30 16:32:57.429 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:32:57.429 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:32:57.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:32:57.431 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:32:57.432 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:32:57.433 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:32:57.434 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:32:57.435 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:32:57.435 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:32:57.439 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-30 16:32:57.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 434116916682262539322280758633489654382348481933 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 30 15:09:37 UTC 2022 Final Date: Wed Sep 29 15:09:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8e:a3:62:1a:6b:49:d6:dd:50:26:34:fb:36:a0:6b:83:e3:49:3a:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c3e2d1742ad58285494a23681be0ae24dac1dbd7 17b5cd0d1473f5840b056dec537f0d2e7a7bbfa8 7cf1a6427d234d04a8d61693217ad094ebe1ecfa abfb7c0bff6edd971dffea007b8681d5976b70aa b9807d579ada8dba34aba267e38578bd579212ea 0c250f2761af0c8d252c22d1c696dfe9da1025b9 d7ae1b25b245a8bafd273fc3a2e9003f54a90a2b ac95c126462defa6c4585dcffefc72a0e1e7f9f6 f1ec3d3e8d873eeeaf9ed19d86e73b48915739cd cd25749be756743235491dbe13a08fef3802a4ad 1871ae9a4c47513a1980fd97cc4b85f5a3e10025 813de6a0c8b2647b00c204ac1350a0938c335b4b 5c9cd7db393ceb10a9984cc14891b3fedbdaff42 af2866343d20cd2867dd68d12d4c5b148a849f07 4d6ac70442d760988f49eaf4b2b0dc66775e78cd 5f079c97e38b9ebce140a056c06d7a98914ec442 68627828d7ec1e3946397ac8233ab107df26a6b6 02d1fc07b5de7db2190302e83c75c5198d1fc6b1 7004c044b570686a3c33c6f4616a3070c19538e3 793e1ecc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5d:59:5e:a7:ce:1a:04:7f:09:e3:7d:af:07:d4:a9:f3:35:22:90:71] modulus: a6f049abe2e9dc96241142d5ecf8513e4ec4f21a0b690ba4aa6e791aa944d956b6fa1c07e33f4e875f705fb1492c1ad9744744bf11c50acfc1d3d7898ed5add8617eef6fc911f953a3d106519b023ff5aca2b0f7902f63dc586dfab5cb4420982254636a2ad7ebb81195b808e70af5e74224cc524eaa4ecda62857a2c56f9db4a126a6b5500655eee09732b3181fb3fe8c5a81ce2db69c8e4a5f2ae0f9f75f1a7f4db39353e00d4699b1e31f2d7d394aa2f7969f3b2635c8952a2e358f25ed3f42ec39f0a68962ac9b245330de627d5e3d3b539b3c75618b342298d99e19abdf483ef1af736221d5f42bb17225824364258a30305be5a1b45731218bb60cf221 public exponent: 10001 ] 2022-09-30 16:35:33.913  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-30 16:35:33.916 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-30 16:35:33.918 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-30 16:35:33.920 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-30 16:35:33.920  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-30 16:35:33.923  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-30 16:35:33.924  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-30 16:35:33.929 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 16:35:33.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-30 16:35:33.931 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-30 16:35:33.946 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-30 16:35:33.947 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 16:35:33.948 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 16:35:33.948 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 16:35:34.126  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-30 16:35:34.127  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-30 16:35:34.132 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-30 16:35:34.133 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 16:35:34.146  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-30 16:35:34.147  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-30 16:35:34.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:35:34.149 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:35:34.149 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:35:34.150 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:35:34.151 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:35:34.151 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:35:34.155 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:35:34.156 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:35:34.156 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:35:34.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-30 16:35:34.165 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 434116916682262539322280758633489654382348481933 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 30 15:09:37 UTC 2022 Final Date: Wed Sep 29 15:09:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8e:a3:62:1a:6b:49:d6:dd:50:26:34:fb:36:a0:6b:83:e3:49:3a:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c3e2d1742ad58285494a23681be0ae24dac1dbd7 17b5cd0d1473f5840b056dec537f0d2e7a7bbfa8 7cf1a6427d234d04a8d61693217ad094ebe1ecfa abfb7c0bff6edd971dffea007b8681d5976b70aa b9807d579ada8dba34aba267e38578bd579212ea 0c250f2761af0c8d252c22d1c696dfe9da1025b9 d7ae1b25b245a8bafd273fc3a2e9003f54a90a2b ac95c126462defa6c4585dcffefc72a0e1e7f9f6 f1ec3d3e8d873eeeaf9ed19d86e73b48915739cd cd25749be756743235491dbe13a08fef3802a4ad 1871ae9a4c47513a1980fd97cc4b85f5a3e10025 813de6a0c8b2647b00c204ac1350a0938c335b4b 5c9cd7db393ceb10a9984cc14891b3fedbdaff42 af2866343d20cd2867dd68d12d4c5b148a849f07 4d6ac70442d760988f49eaf4b2b0dc66775e78cd 5f079c97e38b9ebce140a056c06d7a98914ec442 68627828d7ec1e3946397ac8233ab107df26a6b6 02d1fc07b5de7db2190302e83c75c5198d1fc6b1 7004c044b570686a3c33c6f4616a3070c19538e3 793e1ecc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3c:2a:4a:a5:47:db:64:dd:04:e4:72:8b:8a:f1:9c:a8:c2:d4:f4:48] modulus: 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 public exponent: 10001 ] 2022-09-30 16:42:26.096  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-30 16:42:26.099 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-30 16:42:26.104 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-30 16:42:26.106 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-30 16:42:26.109  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-30 16:42:26.110  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-30 16:42:26.111  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-30 16:42:26.112 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 16:42:26.112 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-30 16:42:26.113 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-30 16:42:26.125 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-30 16:42:26.127 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 16:42:26.128 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 16:42:26.128 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 16:42:26.285  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-30 16:42:26.286  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-30 16:42:26.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-30 16:42:26.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 16:42:26.290  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-30 16:42:26.291  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-30 16:42:26.292 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:42:26.293 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:42:26.293 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:42:26.295 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:42:26.296 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:42:26.296 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:42:26.298 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:42:26.299 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:42:26.299 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:42:26.301 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-30 16:42:26.311 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 434116916682262539322280758633489654382348481933 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 30 15:09:37 UTC 2022 Final Date: Wed Sep 29 15:09:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8e:a3:62:1a:6b:49:d6:dd:50:26:34:fb:36:a0:6b:83:e3:49:3a:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c3e2d1742ad58285494a23681be0ae24dac1dbd7 17b5cd0d1473f5840b056dec537f0d2e7a7bbfa8 7cf1a6427d234d04a8d61693217ad094ebe1ecfa abfb7c0bff6edd971dffea007b8681d5976b70aa b9807d579ada8dba34aba267e38578bd579212ea 0c250f2761af0c8d252c22d1c696dfe9da1025b9 d7ae1b25b245a8bafd273fc3a2e9003f54a90a2b ac95c126462defa6c4585dcffefc72a0e1e7f9f6 f1ec3d3e8d873eeeaf9ed19d86e73b48915739cd cd25749be756743235491dbe13a08fef3802a4ad 1871ae9a4c47513a1980fd97cc4b85f5a3e10025 813de6a0c8b2647b00c204ac1350a0938c335b4b 5c9cd7db393ceb10a9984cc14891b3fedbdaff42 af2866343d20cd2867dd68d12d4c5b148a849f07 4d6ac70442d760988f49eaf4b2b0dc66775e78cd 5f079c97e38b9ebce140a056c06d7a98914ec442 68627828d7ec1e3946397ac8233ab107df26a6b6 02d1fc07b5de7db2190302e83c75c5198d1fc6b1 7004c044b570686a3c33c6f4616a3070c19538e3 793e1ecc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:a7:08:15:f0:50:8b:7e:d8:54:5c:5f:91:f0:16:ae:84:ed:cc:b0] modulus: 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 public exponent: 10001 ] 2022-09-30 16:46:46.983  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-30 16:46:46.985 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-30 16:46:46.987 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-30 16:46:46.988 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-30 16:46:46.989  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-30 16:46:46.990  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-30 16:46:46.990  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-30 16:46:46.991 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 16:46:46.991 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-30 16:46:46.992 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-30 16:46:46.998 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-30 16:46:46.999 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 16:46:46.999 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 16:46:47.000 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 16:46:47.154  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-30 16:46:47.155  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-30 16:46:47.156 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-30 16:46:47.156 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 16:46:47.159  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-30 16:46:47.159  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-30 16:46:47.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:46:47.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:46:47.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:46:47.163 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:46:47.163 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:46:47.164 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:46:47.166 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:46:47.166 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:46:47.167 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:46:47.169 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-30 16:46:47.176 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 434116916682262539322280758633489654382348481933 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 30 15:09:37 UTC 2022 Final Date: Wed Sep 29 15:09:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8e:a3:62:1a:6b:49:d6:dd:50:26:34:fb:36:a0:6b:83:e3:49:3a:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c3e2d1742ad58285494a23681be0ae24dac1dbd7 17b5cd0d1473f5840b056dec537f0d2e7a7bbfa8 7cf1a6427d234d04a8d61693217ad094ebe1ecfa abfb7c0bff6edd971dffea007b8681d5976b70aa b9807d579ada8dba34aba267e38578bd579212ea 0c250f2761af0c8d252c22d1c696dfe9da1025b9 d7ae1b25b245a8bafd273fc3a2e9003f54a90a2b ac95c126462defa6c4585dcffefc72a0e1e7f9f6 f1ec3d3e8d873eeeaf9ed19d86e73b48915739cd cd25749be756743235491dbe13a08fef3802a4ad 1871ae9a4c47513a1980fd97cc4b85f5a3e10025 813de6a0c8b2647b00c204ac1350a0938c335b4b 5c9cd7db393ceb10a9984cc14891b3fedbdaff42 af2866343d20cd2867dd68d12d4c5b148a849f07 4d6ac70442d760988f49eaf4b2b0dc66775e78cd 5f079c97e38b9ebce140a056c06d7a98914ec442 68627828d7ec1e3946397ac8233ab107df26a6b6 02d1fc07b5de7db2190302e83c75c5198d1fc6b1 7004c044b570686a3c33c6f4616a3070c19538e3 793e1ecc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f2:ff:6c:fb:97:ce:63:80:11:d3:62:e0:3d:87:92:12:3a:f4:65:fc] modulus: d7dd980351bb9068273d13a1171d72a02c5e078fda1527cbe8d97fff94a38b3832cea037c4b013fd9f26ae061e6dd691b4d9108c2f57f6d5f159ec0363dccbf528017048d273dc3c07866f586cc026b1d65523a77ced364068234e87ffd867540d76521f14a1f256d657e820936b1d97d8937a9403ca3bbd9c77ab875c640d7a6b076e4628ac69da243cb574879c4a7fcf871296feaf884b8176a4488a3b40db4c9db87380114bc2556bc2457fd01d9771a717c3b4b03ba2396c6f9dea5eb4176a6d28cc4f4d5d9b1d6ea56d5890f044af911455e202ec23afd7c55596540488f984586b05bd1448ef6c964feb291a5f7c4af6596ead492470805c712e31a21b public exponent: 10001 ] 2022-09-30 16:53:35.854  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-30 16:53:35.859 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-30 16:53:35.862 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-09-30 16:53:35.863 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-30 16:53:35.864  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-09-30 16:53:35.865  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-30 16:53:35.866  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-30 16:53:35.866 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 16:53:35.867 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-30 16:53:35.867 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-30 16:53:35.875 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-30 16:53:35.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 16:53:35.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 16:53:35.877 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 16:53:36.051  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-30 16:53:36.053  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-30 16:53:36.053 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-30 16:53:36.054 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 16:53:36.056  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-30 16:53:36.057  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-30 16:53:36.057 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:53:36.058 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:53:36.058 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:53:36.060 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:53:36.060 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:53:36.061 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:53:36.062 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:53:36.062 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:53:36.063 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:53:36.064 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-30 16:53:36.068 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 434116916682262539322280758633489654382348481933 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 30 15:09:37 UTC 2022 Final Date: Wed Sep 29 15:09:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8e:a3:62:1a:6b:49:d6:dd:50:26:34:fb:36:a0:6b:83:e3:49:3a:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c3e2d1742ad58285494a23681be0ae24dac1dbd7 17b5cd0d1473f5840b056dec537f0d2e7a7bbfa8 7cf1a6427d234d04a8d61693217ad094ebe1ecfa abfb7c0bff6edd971dffea007b8681d5976b70aa b9807d579ada8dba34aba267e38578bd579212ea 0c250f2761af0c8d252c22d1c696dfe9da1025b9 d7ae1b25b245a8bafd273fc3a2e9003f54a90a2b ac95c126462defa6c4585dcffefc72a0e1e7f9f6 f1ec3d3e8d873eeeaf9ed19d86e73b48915739cd cd25749be756743235491dbe13a08fef3802a4ad 1871ae9a4c47513a1980fd97cc4b85f5a3e10025 813de6a0c8b2647b00c204ac1350a0938c335b4b 5c9cd7db393ceb10a9984cc14891b3fedbdaff42 af2866343d20cd2867dd68d12d4c5b148a849f07 4d6ac70442d760988f49eaf4b2b0dc66775e78cd 5f079c97e38b9ebce140a056c06d7a98914ec442 68627828d7ec1e3946397ac8233ab107df26a6b6 02d1fc07b5de7db2190302e83c75c5198d1fc6b1 7004c044b570686a3c33c6f4616a3070c19538e3 793e1ecc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [58:ce:57:b9:30:26:1c:90:ba:0b:0c:33:30:a4:b7:59:ca:45:a3:48] modulus: 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 public exponent: 10001 ] 2022-09-30 16:59:36.154  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-30 16:59:36.156 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-30 16:59:36.159 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-30 16:59:36.160 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-30 16:59:36.160  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-30 16:59:36.162  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-30 16:59:36.162  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-30 16:59:36.162 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 16:59:36.163 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-30 16:59:36.164 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-30 16:59:36.171 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-30 16:59:36.172 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 16:59:36.173 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 16:59:36.173 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 16:59:36.324  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-30 16:59:36.325  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-30 16:59:36.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-30 16:59:36.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 16:59:36.329  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-30 16:59:36.331  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-30 16:59:36.333 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:59:36.333 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:59:36.334 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:59:36.335 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:59:36.336 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:59:36.337 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:59:36.338 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:59:36.339 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:59:36.339 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:59:36.341 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-30 16:59:36.346 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 434116916682262539322280758633489654382348481933 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 30 15:09:37 UTC 2022 Final Date: Wed Sep 29 15:09:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8e:a3:62:1a:6b:49:d6:dd:50:26:34:fb:36:a0:6b:83:e3:49:3a:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c3e2d1742ad58285494a23681be0ae24dac1dbd7 17b5cd0d1473f5840b056dec537f0d2e7a7bbfa8 7cf1a6427d234d04a8d61693217ad094ebe1ecfa abfb7c0bff6edd971dffea007b8681d5976b70aa b9807d579ada8dba34aba267e38578bd579212ea 0c250f2761af0c8d252c22d1c696dfe9da1025b9 d7ae1b25b245a8bafd273fc3a2e9003f54a90a2b ac95c126462defa6c4585dcffefc72a0e1e7f9f6 f1ec3d3e8d873eeeaf9ed19d86e73b48915739cd cd25749be756743235491dbe13a08fef3802a4ad 1871ae9a4c47513a1980fd97cc4b85f5a3e10025 813de6a0c8b2647b00c204ac1350a0938c335b4b 5c9cd7db393ceb10a9984cc14891b3fedbdaff42 af2866343d20cd2867dd68d12d4c5b148a849f07 4d6ac70442d760988f49eaf4b2b0dc66775e78cd 5f079c97e38b9ebce140a056c06d7a98914ec442 68627828d7ec1e3946397ac8233ab107df26a6b6 02d1fc07b5de7db2190302e83c75c5198d1fc6b1 7004c044b570686a3c33c6f4616a3070c19538e3 793e1ecc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6c:df:b7:18:10:4c:c8:ac:bf:e9:e2:8a:4f:0c:8a:50:09:c2:cc:55] modulus: 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 public exponent: 10001 ] 2022-09-30 16:59:57.268  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-30 16:59:57.270 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-30 16:59:57.273 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-30 16:59:57.274 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-30 16:59:57.274  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-30 16:59:57.275  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-30 16:59:57.276  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-30 16:59:57.277 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 16:59:57.277 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-30 16:59:57.278 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-30 16:59:57.286 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-30 16:59:57.287 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 16:59:57.287 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 16:59:57.287 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 16:59:57.419  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-30 16:59:57.420  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-30 16:59:57.420 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-30 16:59:57.421 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 16:59:57.422  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-30 16:59:57.423  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-30 16:59:57.423 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:59:57.424 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:59:57.424 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:59:57.425 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:59:57.426 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:59:57.426 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:59:57.427 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 16:59:57.427 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 16:59:57.427 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 16:59:57.428 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-30 16:59:57.434 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 434116916682262539322280758633489654382348481933 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 30 15:09:37 UTC 2022 Final Date: Wed Sep 29 15:09:36 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8e:a3:62:1a:6b:49:d6:dd:50:26:34:fb:36:a0:6b:83:e3:49:3a:42] modulus: e0050dbab7386eabef4e9178c2b0661eec54a066ab40150d629713f884c2de636922e63044dd0b7ccadac38d77fc67fb2da65735d3ddeee310376393489a51b59d86fa5f428ba911d580e17f254047027303f112e2c8c1917a31b5a31edede63ab45c366a28cf11b3cc047424267f63f2b41c488ffda228d46d668ac1018a19915a0f5686524afb3a1b8b267c0bb6dce771f13432e8a6ca660696207cfe024a606a24fa5d575abdc4962ab6930324ee8a4d308795bf854ee719d433e64611b6ce1ff0798373745f90ab46f8efd4b1c6dfbf73553099a0bcb7dbbbaa0f0afba019199553c32f82fd3cd05186cef077c3fc3d251051c170719e83dbdefbc1f34ec1dc08a4066195a29c6fab507a0fa3a1d885c97c0014927248d8d962a64871ce99e42bca3c7add9fa7bc8d73dc5d1a571c5052d3b14c4cee931ec66005108b51411c4f309b6e365050cd86d3ae09d0474a7225a640ce9c5f4cdf2e7bb6274d06287c298a156cf5378912d3086b49d812f0da4e7a722cdce7e54fda69f1b86f929 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c3e2d1742ad58285494a23681be0ae24dac1dbd7 17b5cd0d1473f5840b056dec537f0d2e7a7bbfa8 7cf1a6427d234d04a8d61693217ad094ebe1ecfa abfb7c0bff6edd971dffea007b8681d5976b70aa b9807d579ada8dba34aba267e38578bd579212ea 0c250f2761af0c8d252c22d1c696dfe9da1025b9 d7ae1b25b245a8bafd273fc3a2e9003f54a90a2b ac95c126462defa6c4585dcffefc72a0e1e7f9f6 f1ec3d3e8d873eeeaf9ed19d86e73b48915739cd cd25749be756743235491dbe13a08fef3802a4ad 1871ae9a4c47513a1980fd97cc4b85f5a3e10025 813de6a0c8b2647b00c204ac1350a0938c335b4b 5c9cd7db393ceb10a9984cc14891b3fedbdaff42 af2866343d20cd2867dd68d12d4c5b148a849f07 4d6ac70442d760988f49eaf4b2b0dc66775e78cd 5f079c97e38b9ebce140a056c06d7a98914ec442 68627828d7ec1e3946397ac8233ab107df26a6b6 02d1fc07b5de7db2190302e83c75c5198d1fc6b1 7004c044b570686a3c33c6f4616a3070c19538e3 793e1ecc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [04:ee:b2:cd:6a:e1:3f:dd:82:a8:a4:29:a0:84:b1:57:19:e9:a7:d4] modulus: c0678fcde49a4264e147f2d8d7bc46385f302a84d90f768def80f5ddda341262ef1639ddfa809f1cad6fec9b29591f941f29651e0ee09261cba0797102c79117a3ff4464b877dff6dad2d3115c63fce54a7bf055c31d11c3a270e036bee0b8b7f2b663d3c7579ce4266f49992ecc0e54e5b1d7007238473cdfb22ebbb5ec8a95b9436bad3f67d456bcd4ab4e9d3dc91141e68ece2f10ed1dfba416e4c6aa251de520149e3fa6e534e5827a9c08601d461131185374c741a94d8f4bebf9e9bfba119d68ae92566ee4362c96c5b846aa2b7eca5a07883d23f333ef3dfcbe0474e682d6057029ea2d60cafd4c400afaf9353031f714859673fb1437ce1111cfe4b9 public exponent: 10001 ]