By type
2023-02-20 17:12:57,463 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-02-20 17:12:59,019 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-02-20 17:12:59.851 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Feb 20, 2023 5:13:02 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Feb 20, 2023 5:13:02 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Feb 20, 2023 5:13:02 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Feb 20, 2023 5:13:02 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-02-20 17:13:03.156 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-02-20 17:13:03.552 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-02-20 17:13:03.737 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-02-20 17:13:04.782 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-02-20 17:13:04.786 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-02-20 17:13:04.787 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-02-20 17:13:04.791 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-02-20 17:13:04.840 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-02-20 17:13:04.845 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-02-20 17:13:05.029 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-02-20 17:13:05.656 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Feb 20, 2023 5:13:06 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-02-20 17:13:06.836 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 10.432 seconds (JVM running for 12.61) Feb 20, 2023 5:13:30 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-02-20 17:13:43.803 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-20 17:13:43.810 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-20 17:13:43.849 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-02-20 17:13:43.852 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-20 17:13:43.870 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-02-20 17:13:43.873 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-20 17:13:43.874 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-20 17:13:43.875 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-20 17:13:43.876 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 17:13:43.881 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-20 17:13:43.892 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-20 17:13:43.896 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-20 17:13:43.953 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-20 17:13:43.959 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 17:13:43.959 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 17:13:43.963 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-20 17:13:44.933 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-20 17:13:44.935 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-20 17:13:44.936 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-20 17:13:44.938 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-20 17:13:44.947 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-20 17:13:44.949 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-20 17:13:44.950 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 17:13:44.950 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 17:13:44.950 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 17:13:44.968 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 17:13:44.968 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 17:13:44.969 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 17:13:44.976 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 17:13:44.977 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 17:13:44.977 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 17:13:44.979 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-20 17:13:45.011 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 200455405876195846765716451641551549303845414600 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Feb 20 17:07:26 UTC 2023 Final Date: Sat Feb 19 17:07:25 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:f9:db:0c:d6:de:5e:23:6e:08:66:44:be:0e:42:5b:ef:2f:ca:f0],[56:66:d1:a4] modulus: d8a48f435b63ba3e485eba7f07948bc6347ea2ea413334e3423a96347bf4c5ef282cb777c71dc6415a3628bb7c716178604fa46f95d3eb4f826f8d3aea55e5c1cb2f33484cee0d36ffec6b5b4c6d6f88ebfc13416b03a794177755b861f128a6bbe3d14df58f4c412dcde67152f3308ba13f3fc8b1aa06616c3844c961aed58bf979cf7d3d4f7b6bacb8627a5c7d86a7926845f12e3a98dc0d784bc648227b6b995d40532696793554a0d83a9139238abda773acab88fac097988da1e347f50fe8ce73060fc262928fb952c1f71f24c3ab559d055594a5ed667745d964898200ddd3433615657f8eb3a2af3d94b106b1b33a63dd02b2c559028c2b142261b52400c565effc75078bab25e3a14bc70f3360f4d94d1fc8dcabd29a6dd8d750f9ef78ce3186487880a5abdcea45ad438991d0951a683a6c746a00c511705a5b9c3f563599dcaefc1e5abad66e8a0c5f3855f80f1924b0b46e68bac2ba23e864fea3d835b25eadb1bb034e4d0c20b1f80a8062a8bb2fa4eac174c02ab8cb64dd32f5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b4e0a4f9cec3b700297b2a21f4309d0fe750db95 3a1686cfbd4188968dd576401b306c2e4957cf5d 8264050475c75335c47d81b628cc71b38d1a17c0 72382e9d6014d273f8c93213c06c3d9a7bb0e87a 4f6df93aa6d1ded1fe537b042a395fae1afff693 187613974bace58876a17b922b26bab32ad86206 d0d7add88674fc1d96e579b99f4838438030e85f ca3fe98ccd4493c6307beda2aaa4ec17799f2ebc cc861714b6cb43eda012d6fd32ecc9ec2908b68f 1711b3ec9eca205a6ea48fd0ef9dc3434c1e43fe 8d66f83e28be578b03df9f4e38a141da361b35ba 731327c5bc25498ba8d6ffd32336fda62af8d65f 021e128a438cfbc32ad1a72f8a09dff3f58e0462 cb3179f86ac1fd1ca933ec19b0c06743c24f8b47 ef352248302b16c8aa099f9d1a9f7dd1c0b0f328 5ece18a7021b59854e29debd15992756012d9160 4a12b9b0768f7dd3a2b7fd98e83ab530b80475fa 9ea6feab5dbf70edaa8d4661eb9af3803fa5c882 c9a674e4e7057e50cce4280263d445a401df49a0 f0b7b82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:10:69:b2:28:1a:db:d2:6c:3d:59:06:67:e9:52:01:32:d5:20:43],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-20 22:15:02.745 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-20 22:15:02.752 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-20 22:15:02.755 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-20 22:15:02.757 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-20 22:15:02.758 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-20 22:15:02.760 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-20 22:15:02.761 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-20 22:15:02.762 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-20 22:15:02.764 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-20 22:15:02.765 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-20 22:15:02.779 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-20 22:15:02.781 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 22:15:02.782 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 22:15:02.783 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-20 22:15:03.237 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-20 22:15:03.238 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-20 22:15:03.239 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-20 22:15:03.239 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-20 22:15:03.244 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-20 22:15:03.245 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-20 22:15:03.245 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 22:15:03.246 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 22:15:03.246 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 22:15:03.248 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 22:15:03.249 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 22:15:03.250 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 22:15:03.252 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 22:15:03.252 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 22:15:03.253 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 22:15:03.254 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-20 22:15:03.258 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 200455405876195846765716451641551549303845414600 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Feb 20 17:07:26 UTC 2023 Final Date: Sat Feb 19 17:07:25 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:f9:db:0c:d6:de:5e:23:6e:08:66:44:be:0e:42:5b:ef:2f:ca:f0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b4e0a4f9cec3b700297b2a21f4309d0fe750db95 3a1686cfbd4188968dd576401b306c2e4957cf5d 8264050475c75335c47d81b628cc71b38d1a17c0 72382e9d6014d273f8c93213c06c3d9a7bb0e87a 4f6df93aa6d1ded1fe537b042a395fae1afff693 187613974bace58876a17b922b26bab32ad86206 d0d7add88674fc1d96e579b99f4838438030e85f ca3fe98ccd4493c6307beda2aaa4ec17799f2ebc cc861714b6cb43eda012d6fd32ecc9ec2908b68f 1711b3ec9eca205a6ea48fd0ef9dc3434c1e43fe 8d66f83e28be578b03df9f4e38a141da361b35ba 731327c5bc25498ba8d6ffd32336fda62af8d65f 021e128a438cfbc32ad1a72f8a09dff3f58e0462 cb3179f86ac1fd1ca933ec19b0c06743c24f8b47 ef352248302b16c8aa099f9d1a9f7dd1c0b0f328 5ece18a7021b59854e29debd15992756012d9160 4a12b9b0768f7dd3a2b7fd98e83ab530b80475fa 9ea6feab5dbf70edaa8d4661eb9af3803fa5c882 c9a674e4e7057e50cce4280263d445a401df49a0 f0b7b82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3a:81:74:fb:8a:6b:a6:1d:dc:17:de:fd:c1:9b:38:94:c3:09:96:b9],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-20 22:17:05.310 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-20 22:17:05.313 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-20 22:17:05.316 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-02-20 22:17:05.317 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-20 22:17:05.318 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-02-20 22:17:05.319 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-20 22:17:05.320 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-20 22:17:05.321 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-20 22:17:05.322 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-20 22:17:05.323 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-20 22:17:05.329 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-20 22:17:05.331 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 22:17:05.331 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 22:17:05.332 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-20 22:17:05.551 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-20 22:17:05.552 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-20 22:17:05.552 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-20 22:17:05.553 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-20 22:17:05.556 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-20 22:17:05.556 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-20 22:17:05.557 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 22:17:05.558 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 22:17:05.558 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 22:17:05.559 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 22:17:05.560 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 22:17:05.560 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 22:17:05.562 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 22:17:05.562 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 22:17:05.563 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 22:17:05.565 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-20 22:17:05.571 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 200455405876195846765716451641551549303845414600 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Feb 20 17:07:26 UTC 2023 Final Date: Sat Feb 19 17:07:25 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:f9:db:0c:d6:de:5e:23:6e:08:66:44:be:0e:42:5b:ef:2f:ca:f0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b4e0a4f9cec3b700297b2a21f4309d0fe750db95 3a1686cfbd4188968dd576401b306c2e4957cf5d 8264050475c75335c47d81b628cc71b38d1a17c0 72382e9d6014d273f8c93213c06c3d9a7bb0e87a 4f6df93aa6d1ded1fe537b042a395fae1afff693 187613974bace58876a17b922b26bab32ad86206 d0d7add88674fc1d96e579b99f4838438030e85f ca3fe98ccd4493c6307beda2aaa4ec17799f2ebc cc861714b6cb43eda012d6fd32ecc9ec2908b68f 1711b3ec9eca205a6ea48fd0ef9dc3434c1e43fe 8d66f83e28be578b03df9f4e38a141da361b35ba 731327c5bc25498ba8d6ffd32336fda62af8d65f 021e128a438cfbc32ad1a72f8a09dff3f58e0462 cb3179f86ac1fd1ca933ec19b0c06743c24f8b47 ef352248302b16c8aa099f9d1a9f7dd1c0b0f328 5ece18a7021b59854e29debd15992756012d9160 4a12b9b0768f7dd3a2b7fd98e83ab530b80475fa 9ea6feab5dbf70edaa8d4661eb9af3803fa5c882 c9a674e4e7057e50cce4280263d445a401df49a0 f0b7b82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [19:d4:0f:11:7d:f9:ce:c2:b8:ad:f2:8d:3f:13:2e:d8:8e:62:3d:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-20 22:19:11.738 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-20 22:19:11.741 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-20 22:19:11.745 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-02-20 22:19:11.747 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-20 22:19:11.748 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-02-20 22:19:11.749 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-20 22:19:11.750 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-20 22:19:11.750 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-20 22:19:11.751 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-20 22:19:11.752 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-20 22:19:11.763 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-20 22:19:11.765 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 22:19:11.765 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 22:19:11.766 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-20 22:19:12.008 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-20 22:19:12.011 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-20 22:19:12.012 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-20 22:19:12.012 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-20 22:19:12.015 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-20 22:19:12.016 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-20 22:19:12.017 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 22:19:12.017 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 22:19:12.018 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 22:19:12.019 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 22:19:12.020 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 22:19:12.020 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 22:19:12.022 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 22:19:12.023 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 22:19:12.023 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 22:19:12.024 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-20 22:19:12.032 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 200455405876195846765716451641551549303845414600 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Feb 20 17:07:26 UTC 2023 Final Date: Sat Feb 19 17:07:25 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:f9:db:0c:d6:de:5e:23:6e:08:66:44:be:0e:42:5b:ef:2f:ca:f0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b4e0a4f9cec3b700297b2a21f4309d0fe750db95 3a1686cfbd4188968dd576401b306c2e4957cf5d 8264050475c75335c47d81b628cc71b38d1a17c0 72382e9d6014d273f8c93213c06c3d9a7bb0e87a 4f6df93aa6d1ded1fe537b042a395fae1afff693 187613974bace58876a17b922b26bab32ad86206 d0d7add88674fc1d96e579b99f4838438030e85f ca3fe98ccd4493c6307beda2aaa4ec17799f2ebc cc861714b6cb43eda012d6fd32ecc9ec2908b68f 1711b3ec9eca205a6ea48fd0ef9dc3434c1e43fe 8d66f83e28be578b03df9f4e38a141da361b35ba 731327c5bc25498ba8d6ffd32336fda62af8d65f 021e128a438cfbc32ad1a72f8a09dff3f58e0462 cb3179f86ac1fd1ca933ec19b0c06743c24f8b47 ef352248302b16c8aa099f9d1a9f7dd1c0b0f328 5ece18a7021b59854e29debd15992756012d9160 4a12b9b0768f7dd3a2b7fd98e83ab530b80475fa 9ea6feab5dbf70edaa8d4661eb9af3803fa5c882 c9a674e4e7057e50cce4280263d445a401df49a0 f0b7b82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:5b:e8:42:c7:2d:9b:2d:50:91:67:2d:5b:63:a0:87:6f:53:5a:a6],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-20 22:22:07.164 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-20 22:22:07.166 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-20 22:22:07.168 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-20 22:22:07.170 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-20 22:22:07.172 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-20 22:22:07.173 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-20 22:22:07.174 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-20 22:22:07.176 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-20 22:22:07.177 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-20 22:22:07.178 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-20 22:22:07.187 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-20 22:22:07.188 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 22:22:07.189 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 22:22:07.190 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-20 22:22:07.932 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-20 22:22:07.932 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-20 22:22:07.933 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-20 22:22:07.933 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-20 22:22:07.934 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-20 22:22:07.934 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-20 22:22:07.935 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 22:22:07.935 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 22:22:07.936 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 22:22:07.936 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 22:22:07.937 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 22:22:07.937 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 22:22:07.938 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 22:22:07.939 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 22:22:07.939 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 22:22:07.940 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-20 22:22:07.944 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 200455405876195846765716451641551549303845414600 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Feb 20 17:07:26 UTC 2023 Final Date: Sat Feb 19 17:07:25 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:f9:db:0c:d6:de:5e:23:6e:08:66:44:be:0e:42:5b:ef:2f:ca:f0],[56:66:d1:a4] modulus: d8a48f435b63ba3e485eba7f07948bc6347ea2ea413334e3423a96347bf4c5ef282cb777c71dc6415a3628bb7c716178604fa46f95d3eb4f826f8d3aea55e5c1cb2f33484cee0d36ffec6b5b4c6d6f88ebfc13416b03a794177755b861f128a6bbe3d14df58f4c412dcde67152f3308ba13f3fc8b1aa06616c3844c961aed58bf979cf7d3d4f7b6bacb8627a5c7d86a7926845f12e3a98dc0d784bc648227b6b995d40532696793554a0d83a9139238abda773acab88fac097988da1e347f50fe8ce73060fc262928fb952c1f71f24c3ab559d055594a5ed667745d964898200ddd3433615657f8eb3a2af3d94b106b1b33a63dd02b2c559028c2b142261b52400c565effc75078bab25e3a14bc70f3360f4d94d1fc8dcabd29a6dd8d750f9ef78ce3186487880a5abdcea45ad438991d0951a683a6c746a00c511705a5b9c3f563599dcaefc1e5abad66e8a0c5f3855f80f1924b0b46e68bac2ba23e864fea3d835b25eadb1bb034e4d0c20b1f80a8062a8bb2fa4eac174c02ab8cb64dd32f5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b4e0a4f9cec3b700297b2a21f4309d0fe750db95 3a1686cfbd4188968dd576401b306c2e4957cf5d 8264050475c75335c47d81b628cc71b38d1a17c0 72382e9d6014d273f8c93213c06c3d9a7bb0e87a 4f6df93aa6d1ded1fe537b042a395fae1afff693 187613974bace58876a17b922b26bab32ad86206 d0d7add88674fc1d96e579b99f4838438030e85f ca3fe98ccd4493c6307beda2aaa4ec17799f2ebc cc861714b6cb43eda012d6fd32ecc9ec2908b68f 1711b3ec9eca205a6ea48fd0ef9dc3434c1e43fe 8d66f83e28be578b03df9f4e38a141da361b35ba 731327c5bc25498ba8d6ffd32336fda62af8d65f 021e128a438cfbc32ad1a72f8a09dff3f58e0462 cb3179f86ac1fd1ca933ec19b0c06743c24f8b47 ef352248302b16c8aa099f9d1a9f7dd1c0b0f328 5ece18a7021b59854e29debd15992756012d9160 4a12b9b0768f7dd3a2b7fd98e83ab530b80475fa 9ea6feab5dbf70edaa8d4661eb9af3803fa5c882 c9a674e4e7057e50cce4280263d445a401df49a0 f0b7b82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:bf:9e:75:a0:91:ec:90:9b:e3:49:de:09:2f:64:5e:15:18:01:c9],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-20 22:34:17.898 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-20 22:34:17.903 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-20 22:34:17.908 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-20 22:34:17.910 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-20 22:34:17.911 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-20 22:34:17.911 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-20 22:34:17.912 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-20 22:34:17.913 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-20 22:34:17.913 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-20 22:34:17.914 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-20 22:34:17.922 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-20 22:34:17.924 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 22:34:17.924 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 22:34:17.925 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-20 22:34:18.447 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-20 22:34:18.449 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-20 22:34:18.450 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-20 22:34:18.450 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-20 22:34:18.452 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-20 22:34:18.452 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-20 22:34:18.453 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 22:34:18.453 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 22:34:18.454 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 22:34:18.455 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 22:34:18.456 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 22:34:18.457 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 22:34:18.458 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 22:34:18.458 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 22:34:18.459 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 22:34:18.460 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-20 22:34:18.463 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 200455405876195846765716451641551549303845414600 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Feb 20 17:07:26 UTC 2023 Final Date: Sat Feb 19 17:07:25 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:f9:db:0c:d6:de:5e:23:6e:08:66:44:be:0e:42:5b:ef:2f:ca:f0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b4e0a4f9cec3b700297b2a21f4309d0fe750db95 3a1686cfbd4188968dd576401b306c2e4957cf5d 8264050475c75335c47d81b628cc71b38d1a17c0 72382e9d6014d273f8c93213c06c3d9a7bb0e87a 4f6df93aa6d1ded1fe537b042a395fae1afff693 187613974bace58876a17b922b26bab32ad86206 d0d7add88674fc1d96e579b99f4838438030e85f ca3fe98ccd4493c6307beda2aaa4ec17799f2ebc cc861714b6cb43eda012d6fd32ecc9ec2908b68f 1711b3ec9eca205a6ea48fd0ef9dc3434c1e43fe 8d66f83e28be578b03df9f4e38a141da361b35ba 731327c5bc25498ba8d6ffd32336fda62af8d65f 021e128a438cfbc32ad1a72f8a09dff3f58e0462 cb3179f86ac1fd1ca933ec19b0c06743c24f8b47 ef352248302b16c8aa099f9d1a9f7dd1c0b0f328 5ece18a7021b59854e29debd15992756012d9160 4a12b9b0768f7dd3a2b7fd98e83ab530b80475fa 9ea6feab5dbf70edaa8d4661eb9af3803fa5c882 c9a674e4e7057e50cce4280263d445a401df49a0 f0b7b82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bc:cf:3d:d0:41:98:b6:c0:c6:7b:03:88:92:8b:7f:63:16:e3:af:ca],[56:66:d1:a4] modulus: c81e7fb122831e8efac171836d5b87c42255d25a39ad757396b96f4c98933aceab085517e8b3e53d9c4d5613b1fd4aa2b73777c472eaddb54a2daf1c6d0e55842a156f84df75d944ba009c98d77f326797dc37d8e2a51b580f854756f3e11da664f1b4bb33136c1f74110bd3e1305b37fdbba5135ee84af891c1e6cb3283cc553a1fbea7e0797c7133d47a66e55a9586779bfd7e3154c0e65b96c7482876f806a5a9b25ed5a613ea0468266dfb2e855e4261812d5776d7bff9c602e6d18bbdd88c84e94cfde4080e5d283b6fbb708449dcfaf723c9330d5292f1dca15ad242ece1a6ed71d03f0e51237e1463e20895145e0392550cbd21f7c55ccf01253a43f5 public exponent: 10001 ] 2023-02-20 22:40:47.206 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-20 22:40:47.212 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-20 22:40:47.222 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-20 22:40:47.224 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-20 22:40:47.224 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-20 22:40:47.225 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-20 22:40:47.225 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-20 22:40:47.226 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-20 22:40:47.226 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-20 22:40:47.226 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-20 22:40:47.231 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-20 22:40:47.232 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 22:40:47.232 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 22:40:47.232 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-20 22:40:47.758 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-20 22:40:47.758 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-20 22:40:47.759 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-20 22:40:47.759 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-20 22:40:47.761 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-20 22:40:47.762 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-20 22:40:47.763 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 22:40:47.763 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 22:40:47.764 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 22:40:47.765 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 22:40:47.766 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 22:40:47.766 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 22:40:47.767 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 22:40:47.768 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 22:40:47.768 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 22:40:47.769 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-20 22:40:47.774 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 200455405876195846765716451641551549303845414600 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Feb 20 17:07:26 UTC 2023 Final Date: Sat Feb 19 17:07:25 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:f9:db:0c:d6:de:5e:23:6e:08:66:44:be:0e:42:5b:ef:2f:ca:f0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b4e0a4f9cec3b700297b2a21f4309d0fe750db95 3a1686cfbd4188968dd576401b306c2e4957cf5d 8264050475c75335c47d81b628cc71b38d1a17c0 72382e9d6014d273f8c93213c06c3d9a7bb0e87a 4f6df93aa6d1ded1fe537b042a395fae1afff693 187613974bace58876a17b922b26bab32ad86206 d0d7add88674fc1d96e579b99f4838438030e85f ca3fe98ccd4493c6307beda2aaa4ec17799f2ebc cc861714b6cb43eda012d6fd32ecc9ec2908b68f 1711b3ec9eca205a6ea48fd0ef9dc3434c1e43fe 8d66f83e28be578b03df9f4e38a141da361b35ba 731327c5bc25498ba8d6ffd32336fda62af8d65f 021e128a438cfbc32ad1a72f8a09dff3f58e0462 cb3179f86ac1fd1ca933ec19b0c06743c24f8b47 ef352248302b16c8aa099f9d1a9f7dd1c0b0f328 5ece18a7021b59854e29debd15992756012d9160 4a12b9b0768f7dd3a2b7fd98e83ab530b80475fa 9ea6feab5dbf70edaa8d4661eb9af3803fa5c882 c9a674e4e7057e50cce4280263d445a401df49a0 f0b7b82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0c:65:31:53:a5:b9:0c:7c:d1:25:66:48:e6:c4:97:dc:a0:6c:bd:63],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-20 23:08:41.855 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-20 23:08:41.862 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-20 23:08:41.873 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-20 23:08:41.877 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-20 23:08:41.878 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-20 23:08:41.880 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-20 23:08:41.880 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-20 23:08:41.881 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-20 23:08:41.882 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-20 23:08:41.882 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-20 23:08:41.890 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-20 23:08:41.892 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 23:08:41.893 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 23:08:41.893 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-20 23:08:42.299 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-20 23:08:42.300 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-20 23:08:42.300 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-20 23:08:42.301 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-20 23:08:42.302 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-20 23:08:42.302 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-20 23:08:42.303 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 23:08:42.303 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 23:08:42.304 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 23:08:42.305 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 23:08:42.305 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 23:08:42.305 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 23:08:42.306 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 23:08:42.306 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 23:08:42.306 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 23:08:42.307 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-20 23:08:42.313 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 200455405876195846765716451641551549303845414600 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Feb 20 17:07:26 UTC 2023 Final Date: Sat Feb 19 17:07:25 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:f9:db:0c:d6:de:5e:23:6e:08:66:44:be:0e:42:5b:ef:2f:ca:f0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b4e0a4f9cec3b700297b2a21f4309d0fe750db95 3a1686cfbd4188968dd576401b306c2e4957cf5d 8264050475c75335c47d81b628cc71b38d1a17c0 72382e9d6014d273f8c93213c06c3d9a7bb0e87a 4f6df93aa6d1ded1fe537b042a395fae1afff693 187613974bace58876a17b922b26bab32ad86206 d0d7add88674fc1d96e579b99f4838438030e85f ca3fe98ccd4493c6307beda2aaa4ec17799f2ebc cc861714b6cb43eda012d6fd32ecc9ec2908b68f 1711b3ec9eca205a6ea48fd0ef9dc3434c1e43fe 8d66f83e28be578b03df9f4e38a141da361b35ba 731327c5bc25498ba8d6ffd32336fda62af8d65f 021e128a438cfbc32ad1a72f8a09dff3f58e0462 cb3179f86ac1fd1ca933ec19b0c06743c24f8b47 ef352248302b16c8aa099f9d1a9f7dd1c0b0f328 5ece18a7021b59854e29debd15992756012d9160 4a12b9b0768f7dd3a2b7fd98e83ab530b80475fa 9ea6feab5dbf70edaa8d4661eb9af3803fa5c882 c9a674e4e7057e50cce4280263d445a401df49a0 f0b7b82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8d:ed:1c:b6:5f:8d:8d:68:f7:bc:75:48:b6:94:9f:15:d0:62:83:80],[56:66:d1:a4] modulus: eb61b3fe3b4d027a5e5eda4cb2e45fd4c18fe5b10b81b5d3500ab5772990bc032b01bd0d11df68bf5b19f097cd8791abee65ba65aba89d7b478ee64aa795dd0c67813e10139f620fd24c54bb3d1ee301591fdbe01a595d736bed8fbb7cf0dab54136aadb1b2c3624809f69ead969529c6ff5bd5b0df10888ed2c304dbd9bcc621e983f836fae0da214e8cbdf256597cbcb24b9cefdbfb2f62bdddf9aeb74cac792c53b4f784ad7ca8c5617bd5c4c1cfd877c535213d70b88b0ae7cdc5f3d80c293bd645d0bf1630b5e3f0eab95168989ccde765316e03cf5be234f04449286882323717b2655593adf9825d0f090b796e53d53a5405c04df797ac01895f93ecb public exponent: 10001 ] 2023-02-20 23:15:14.496 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-20 23:15:14.501 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-20 23:15:14.503 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-20 23:15:14.505 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-20 23:15:14.505 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-20 23:15:14.506 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-20 23:15:14.507 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-20 23:15:14.507 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-20 23:15:14.508 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-20 23:15:14.508 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-20 23:15:14.513 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-20 23:15:14.514 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 23:15:14.514 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-20 23:15:14.515 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-20 23:15:14.817 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-20 23:15:14.818 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-20 23:15:14.819 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-20 23:15:14.819 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-20 23:15:14.820 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-20 23:15:14.821 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-20 23:15:14.821 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 23:15:14.822 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 23:15:14.823 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 23:15:14.830 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 23:15:14.830 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 23:15:14.831 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 23:15:14.831 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-20 23:15:14.832 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-20 23:15:14.832 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-20 23:15:14.833 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-20 23:15:14.836 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 200455405876195846765716451641551549303845414600 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Feb 20 17:07:26 UTC 2023 Final Date: Sat Feb 19 17:07:25 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:f9:db:0c:d6:de:5e:23:6e:08:66:44:be:0e:42:5b:ef:2f:ca:f0],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b4e0a4f9cec3b700297b2a21f4309d0fe750db95 3a1686cfbd4188968dd576401b306c2e4957cf5d 8264050475c75335c47d81b628cc71b38d1a17c0 72382e9d6014d273f8c93213c06c3d9a7bb0e87a 4f6df93aa6d1ded1fe537b042a395fae1afff693 187613974bace58876a17b922b26bab32ad86206 d0d7add88674fc1d96e579b99f4838438030e85f ca3fe98ccd4493c6307beda2aaa4ec17799f2ebc cc861714b6cb43eda012d6fd32ecc9ec2908b68f 1711b3ec9eca205a6ea48fd0ef9dc3434c1e43fe 8d66f83e28be578b03df9f4e38a141da361b35ba 731327c5bc25498ba8d6ffd32336fda62af8d65f 021e128a438cfbc32ad1a72f8a09dff3f58e0462 cb3179f86ac1fd1ca933ec19b0c06743c24f8b47 ef352248302b16c8aa099f9d1a9f7dd1c0b0f328 5ece18a7021b59854e29debd15992756012d9160 4a12b9b0768f7dd3a2b7fd98e83ab530b80475fa 9ea6feab5dbf70edaa8d4661eb9af3803fa5c882 c9a674e4e7057e50cce4280263d445a401df49a0 f0b7b82b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [81:3f:60:44:c3:f7:29:75:c4:1e:10:10:f0:a7:ee:3f:99:51:14:90],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]