By type
2022-03-09 03:01:04,646 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-09 03:01:05,942 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-09 03:01:06.759 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Mar 09, 2022 3:01:08 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 09, 2022 3:01:08 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 09, 2022 3:01:08 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 09, 2022 3:01:08 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-09 03:01:09.670 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-09 03:01:09.996 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-03-09 03:01:10.184 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-09 03:01:10.986 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-09 03:01:10.990 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-03-09 03:01:10.991 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-09 03:01:10.996 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-09 03:01:11.045 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-03-09 03:01:11.058 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-03-09 03:01:11.218 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-03-09 03:01:11.835 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 09, 2022 3:01:12 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-09 03:01:13.013 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 9.353 seconds (JVM running for 11.589) Mar 09, 2022 3:01:37 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-09 03:01:50.104 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-09 03:01:50.124 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-09 03:01:50.161 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-09 03:01:50.166 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 03:01:50.182 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-09 03:01:50.185 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-09 03:01:50.186 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-09 03:01:50.187 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 03:01:50.188 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 03:01:50.192 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 03:01:50.198 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-09 03:01:50.201 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-09 03:01:50.249 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-09 03:01:50.254 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 03:01:50.255 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 03:01:50.259 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 03:01:50.993 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-09 03:01:50.996 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-09 03:01:50.997 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-09 03:01:50.999 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 03:01:51.016 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-09 03:01:51.018 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-09 03:01:51.019 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 03:01:51.020 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 03:01:51.021 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 03:01:51.033 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 03:01:51.033 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 03:01:51.034 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 03:01:51.039 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 03:01:51.040 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 03:01:51.040 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 03:01:51.042 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 03:01:51.071 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 73255413059826153134776664296619392015385529386 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 02:58:42 UTC 2022 Final Date: Mon Mar 08 02:58:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:3b:b0:29:4c:39:ff:70:f1:43:ac:6a:ee:49:ba:b8:49:4c:50:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c54f8ca4c27f532a5bb62e0adafc17573ac7eb08 8078ba7df270bd8da687617eeda821dcf513d6a6 f9a7875647bb47f2068df86832488fa8dc363468 7181786e5df0e5a6f6d2715d018ecccbe0d22e38 9a99fc0bfdf5b1b5ddc4f2d850d085da8ed7ad06 9d2c686f5ffa222819f8ce33884d5725ad719cdd 46b029e0cd0a00c60497b41e7983ffb71b1c9303 d3a98abf46d2b1f51bb8d98272b684c9fabeb054 c3431125600c68ed275bf1c788bae9a21c5be68f d4bd62357c21b518cbf8abfe2b3854e61e9d2740 a28f0d6a15dbeec9dc41c7daa69e422eb1c9a153 9c247b8cdea44edfd6a68c90c1b504c0190c5b15 291828e9c774f918a131190fe190c87a7a49d473 355b3785c5528d8d790173dd3d39e117ee753085 2993bedfe04eecc6afc62e4cd6c0a4ecfe79da0e 5444ee7442213b29468315e3cada81d0bbcf5b6e 0cccbc42469a511a3e4d55c3bb0bd6a969a4923b a42c1808e3d66f6c64cefeb6cc6c0e7085a77819 c73516b3cfada5749d430689aa5f5765d23af7b2 23902453 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:f3:48:87:d8:ba:b7:e4:12:bf:a2:df:25:99:9f:aa:0f:eb:bc:11] modulus: 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 public exponent: 10001 ] 2022-03-09 04:05:17.724 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-09 04:05:17.729 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-09 04:05:17.734 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-09 04:05:17.735 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 04:05:17.736 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-09 04:05:17.737 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-09 04:05:17.738 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-09 04:05:17.738 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 04:05:17.739 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-09 04:05:17.740 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-09 04:05:17.752 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-09 04:05:17.753 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 04:05:17.754 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 04:05:17.754 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 04:05:17.960 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-09 04:05:17.961 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-09 04:05:17.961 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-09 04:05:17.962 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 04:05:17.967 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-09 04:05:17.967 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-09 04:05:17.969 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:05:17.969 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:05:17.970 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:05:17.972 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:05:17.973 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:05:17.974 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:05:17.975 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:05:17.976 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:05:17.976 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:05:17.978 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 04:05:17.986 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 73255413059826153134776664296619392015385529386 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 02:58:42 UTC 2022 Final Date: Mon Mar 08 02:58:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:3b:b0:29:4c:39:ff:70:f1:43:ac:6a:ee:49:ba:b8:49:4c:50:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c54f8ca4c27f532a5bb62e0adafc17573ac7eb08 8078ba7df270bd8da687617eeda821dcf513d6a6 f9a7875647bb47f2068df86832488fa8dc363468 7181786e5df0e5a6f6d2715d018ecccbe0d22e38 9a99fc0bfdf5b1b5ddc4f2d850d085da8ed7ad06 9d2c686f5ffa222819f8ce33884d5725ad719cdd 46b029e0cd0a00c60497b41e7983ffb71b1c9303 d3a98abf46d2b1f51bb8d98272b684c9fabeb054 c3431125600c68ed275bf1c788bae9a21c5be68f d4bd62357c21b518cbf8abfe2b3854e61e9d2740 a28f0d6a15dbeec9dc41c7daa69e422eb1c9a153 9c247b8cdea44edfd6a68c90c1b504c0190c5b15 291828e9c774f918a131190fe190c87a7a49d473 355b3785c5528d8d790173dd3d39e117ee753085 2993bedfe04eecc6afc62e4cd6c0a4ecfe79da0e 5444ee7442213b29468315e3cada81d0bbcf5b6e 0cccbc42469a511a3e4d55c3bb0bd6a969a4923b a42c1808e3d66f6c64cefeb6cc6c0e7085a77819 c73516b3cfada5749d430689aa5f5765d23af7b2 23902453 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fe:0a:09:61:f9:41:d0:b4:d1:ef:ba:10:9b:d7:4a:5a:c4:81:e8:ab] modulus: 9d2f8c1b89b0d463f2bb7db15230101a394b28d8f268721cc9cf98362543900e058d845ad2b8ec5a6d19a3cbced22f216024de0f02368abcaff1f35c6f35ffa7950452a083f86d5ed3a4e50d0affa25ba456317ba2b1e82dd49ddca7ba8cfa6d3ec992f91a51bf293eec59c3a85eeac72333ba6bf3496deb7e7f6cee1035f880ec823012dd87a7b7f7731c3aefc82d2a5cc708b68adc362a0291936fb4dace355ebbf0cfbb6e8f34cb9b8c7bfe93a4cae1f924cc43919bd02eb7020f6d1286fd6f45a03f545eec20307c3660d5abd89e80ed00c5dfdd91a9dd618675f6426fcc38595b812e105b41067594ffb5cc81b638c45494c6d2886a723a0cc3eba5ba8f public exponent: 10001 ] 2022-03-09 04:06:27.596 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-09 04:06:27.600 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-09 04:06:27.604 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-09 04:06:27.607 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 04:06:27.608 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-09 04:06:27.610 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-09 04:06:27.610 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-09 04:06:27.613 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 04:06:27.614 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-09 04:06:27.615 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-09 04:06:27.631 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-09 04:06:27.633 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 04:06:27.633 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 04:06:27.633 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 04:06:27.884 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-09 04:06:27.885 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-09 04:06:27.886 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-09 04:06:27.886 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 04:06:27.890 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-09 04:06:27.890 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-09 04:06:27.891 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:06:27.892 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:06:27.892 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:06:27.894 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:06:27.894 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:06:27.895 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:06:27.896 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:06:27.896 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:06:27.897 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:06:27.898 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 04:06:27.903 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 73255413059826153134776664296619392015385529386 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 02:58:42 UTC 2022 Final Date: Mon Mar 08 02:58:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:3b:b0:29:4c:39:ff:70:f1:43:ac:6a:ee:49:ba:b8:49:4c:50:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c54f8ca4c27f532a5bb62e0adafc17573ac7eb08 8078ba7df270bd8da687617eeda821dcf513d6a6 f9a7875647bb47f2068df86832488fa8dc363468 7181786e5df0e5a6f6d2715d018ecccbe0d22e38 9a99fc0bfdf5b1b5ddc4f2d850d085da8ed7ad06 9d2c686f5ffa222819f8ce33884d5725ad719cdd 46b029e0cd0a00c60497b41e7983ffb71b1c9303 d3a98abf46d2b1f51bb8d98272b684c9fabeb054 c3431125600c68ed275bf1c788bae9a21c5be68f d4bd62357c21b518cbf8abfe2b3854e61e9d2740 a28f0d6a15dbeec9dc41c7daa69e422eb1c9a153 9c247b8cdea44edfd6a68c90c1b504c0190c5b15 291828e9c774f918a131190fe190c87a7a49d473 355b3785c5528d8d790173dd3d39e117ee753085 2993bedfe04eecc6afc62e4cd6c0a4ecfe79da0e 5444ee7442213b29468315e3cada81d0bbcf5b6e 0cccbc42469a511a3e4d55c3bb0bd6a969a4923b a42c1808e3d66f6c64cefeb6cc6c0e7085a77819 c73516b3cfada5749d430689aa5f5765d23af7b2 23902453 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1f:7c:c3:42:51:39:34:68:5f:26:86:9b:10:dc:dc:a2:bd:5d:49:95] modulus: c31c9a94d9c6567efbd4e949a4a07f1b50920cb5a21621c07ad65acf7cb83070b964d7eb03033f3cbf3343d78a93775c889f7ab862caef5225b9bdf32e7b32a37a5688e2e8ddcbb0a06b0580911e641b9617c1f32f9e60b1dfe9d2f24ed492869e4b4dbf751b07112e501d567b08373f3dd9c43e59101eb0f4f1a7e64e9a0e79322591dc63f8a472b1a2fa649ce625d0e8b8f4915b111e596ddf6041811c165c218ed6de877f8d8e84cec6ffc354e3601f74f0688b302126be9d46ab7c74387de82054f716a2cfc040d705532d28fc4bde51946605976b20af4dbf3bb855421b2ae01d4d41ddd377a9fb4717162cb586df924105c5af404948e80f56d55ed249 public exponent: 10001 ] 2022-03-09 04:08:00.406 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-09 04:08:00.409 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-09 04:08:00.414 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-09 04:08:00.414 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 04:08:00.415 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-09 04:08:00.416 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-09 04:08:00.416 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-09 04:08:00.416 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 04:08:00.417 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-09 04:08:00.417 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-09 04:08:00.423 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-09 04:08:00.424 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 04:08:00.424 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 04:08:00.424 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 04:08:00.610 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-09 04:08:00.612 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-09 04:08:00.613 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-09 04:08:00.613 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 04:08:00.617 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-09 04:08:00.618 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-09 04:08:00.628 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:08:00.629 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:08:00.629 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:08:00.632 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:08:00.632 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:08:00.632 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:08:00.633 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:08:00.634 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:08:00.634 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:08:00.637 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 04:08:00.642 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 73255413059826153134776664296619392015385529386 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 02:58:42 UTC 2022 Final Date: Mon Mar 08 02:58:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:3b:b0:29:4c:39:ff:70:f1:43:ac:6a:ee:49:ba:b8:49:4c:50:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c54f8ca4c27f532a5bb62e0adafc17573ac7eb08 8078ba7df270bd8da687617eeda821dcf513d6a6 f9a7875647bb47f2068df86832488fa8dc363468 7181786e5df0e5a6f6d2715d018ecccbe0d22e38 9a99fc0bfdf5b1b5ddc4f2d850d085da8ed7ad06 9d2c686f5ffa222819f8ce33884d5725ad719cdd 46b029e0cd0a00c60497b41e7983ffb71b1c9303 d3a98abf46d2b1f51bb8d98272b684c9fabeb054 c3431125600c68ed275bf1c788bae9a21c5be68f d4bd62357c21b518cbf8abfe2b3854e61e9d2740 a28f0d6a15dbeec9dc41c7daa69e422eb1c9a153 9c247b8cdea44edfd6a68c90c1b504c0190c5b15 291828e9c774f918a131190fe190c87a7a49d473 355b3785c5528d8d790173dd3d39e117ee753085 2993bedfe04eecc6afc62e4cd6c0a4ecfe79da0e 5444ee7442213b29468315e3cada81d0bbcf5b6e 0cccbc42469a511a3e4d55c3bb0bd6a969a4923b a42c1808e3d66f6c64cefeb6cc6c0e7085a77819 c73516b3cfada5749d430689aa5f5765d23af7b2 23902453 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:5e:d6:9f:50:03:3d:b5:c0:1f:f0:85:82:8d:07:18:14:73:f8:7f] modulus: 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 public exponent: 10001 ] 2022-03-09 04:09:31.788 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-09 04:09:31.795 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-09 04:09:31.801 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-09 04:09:31.805 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 04:09:31.807 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-09 04:09:31.809 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-09 04:09:31.811 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-09 04:09:31.812 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 04:09:31.815 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-09 04:09:31.817 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-09 04:09:31.827 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-09 04:09:31.829 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 04:09:31.830 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 04:09:31.830 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 04:09:32.054 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-09 04:09:32.055 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-09 04:09:32.056 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-09 04:09:32.057 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 04:09:32.060 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-09 04:09:32.061 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-09 04:09:32.062 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:09:32.063 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:09:32.064 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:09:32.066 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:09:32.066 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:09:32.067 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:09:32.069 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:09:32.070 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:09:32.070 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:09:32.072 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 04:09:32.081 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 73255413059826153134776664296619392015385529386 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 02:58:42 UTC 2022 Final Date: Mon Mar 08 02:58:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:3b:b0:29:4c:39:ff:70:f1:43:ac:6a:ee:49:ba:b8:49:4c:50:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c54f8ca4c27f532a5bb62e0adafc17573ac7eb08 8078ba7df270bd8da687617eeda821dcf513d6a6 f9a7875647bb47f2068df86832488fa8dc363468 7181786e5df0e5a6f6d2715d018ecccbe0d22e38 9a99fc0bfdf5b1b5ddc4f2d850d085da8ed7ad06 9d2c686f5ffa222819f8ce33884d5725ad719cdd 46b029e0cd0a00c60497b41e7983ffb71b1c9303 d3a98abf46d2b1f51bb8d98272b684c9fabeb054 c3431125600c68ed275bf1c788bae9a21c5be68f d4bd62357c21b518cbf8abfe2b3854e61e9d2740 a28f0d6a15dbeec9dc41c7daa69e422eb1c9a153 9c247b8cdea44edfd6a68c90c1b504c0190c5b15 291828e9c774f918a131190fe190c87a7a49d473 355b3785c5528d8d790173dd3d39e117ee753085 2993bedfe04eecc6afc62e4cd6c0a4ecfe79da0e 5444ee7442213b29468315e3cada81d0bbcf5b6e 0cccbc42469a511a3e4d55c3bb0bd6a969a4923b a42c1808e3d66f6c64cefeb6cc6c0e7085a77819 c73516b3cfada5749d430689aa5f5765d23af7b2 23902453 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6a:72:fe:ea:c7:9c:bd:64:e9:8f:ff:65:f2:72:57:af:30:e6:96:5a] modulus: e977c416d1393589a39e3c3207e168e8fb759b0d039b7066992d9e59d081d80020d400c341c61f90934f333538191f99d2ee3853f37a9a226c6a654319fcc4028612c8676442518cad94da11e73aac790eeba39c423b0bf3e91b5e043c6c9424b0207a6a5cd62df81f23d147ab7e1713b29da6dadc1f138862994f9404b28fe5bf7f6b1cb5e6a6f30e9f724c0f48621d55f20811112413785c227826a2c295b07af7c8c093bcf64f170d7926c481289adfa8b7080b4f52b224e01b4169864bfad6acfb9a148f925eae1613f7a6fde194fa1465a0ee90cd38336f3c2c8b556fc54e8a918b56df1e5c68255a6fd1af07535d1b51cb3044c5d63b8dfab8f7d02f8b public exponent: 10001 ] 2022-03-09 04:09:46.416 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-09 04:09:46.418 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-09 04:09:46.420 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-09 04:09:46.423 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 04:09:46.424 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-09 04:09:46.425 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-09 04:09:46.425 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-09 04:09:46.426 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 04:09:46.426 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-09 04:09:46.426 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-09 04:09:46.433 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-09 04:09:46.434 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 04:09:46.435 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 04:09:46.435 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 04:09:46.597 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-09 04:09:46.597 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-09 04:09:46.598 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-09 04:09:46.598 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 04:09:46.600 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-09 04:09:46.601 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-09 04:09:46.601 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:09:46.602 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:09:46.602 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:09:46.603 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:09:46.603 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:09:46.604 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:09:46.605 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:09:46.606 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:09:46.606 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:09:46.607 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 04:09:46.611 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 73255413059826153134776664296619392015385529386 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 02:58:42 UTC 2022 Final Date: Mon Mar 08 02:58:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:3b:b0:29:4c:39:ff:70:f1:43:ac:6a:ee:49:ba:b8:49:4c:50:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c54f8ca4c27f532a5bb62e0adafc17573ac7eb08 8078ba7df270bd8da687617eeda821dcf513d6a6 f9a7875647bb47f2068df86832488fa8dc363468 7181786e5df0e5a6f6d2715d018ecccbe0d22e38 9a99fc0bfdf5b1b5ddc4f2d850d085da8ed7ad06 9d2c686f5ffa222819f8ce33884d5725ad719cdd 46b029e0cd0a00c60497b41e7983ffb71b1c9303 d3a98abf46d2b1f51bb8d98272b684c9fabeb054 c3431125600c68ed275bf1c788bae9a21c5be68f d4bd62357c21b518cbf8abfe2b3854e61e9d2740 a28f0d6a15dbeec9dc41c7daa69e422eb1c9a153 9c247b8cdea44edfd6a68c90c1b504c0190c5b15 291828e9c774f918a131190fe190c87a7a49d473 355b3785c5528d8d790173dd3d39e117ee753085 2993bedfe04eecc6afc62e4cd6c0a4ecfe79da0e 5444ee7442213b29468315e3cada81d0bbcf5b6e 0cccbc42469a511a3e4d55c3bb0bd6a969a4923b a42c1808e3d66f6c64cefeb6cc6c0e7085a77819 c73516b3cfada5749d430689aa5f5765d23af7b2 23902453 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:60:ef:b4:e8:39:8b:d0:cf:ac:cf:c5:a2:cf:7a:c1:a4:a3:8e:5e] modulus: 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 public exponent: 10001 ] 2022-03-09 04:10:19.116 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-09 04:10:19.118 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-09 04:10:19.120 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-09 04:10:19.120 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 04:10:19.121 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-09 04:10:19.122 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-09 04:10:19.123 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-09 04:10:19.123 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 04:10:19.123 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-09 04:10:19.124 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-09 04:10:19.131 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-09 04:10:19.133 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 04:10:19.136 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 04:10:19.141 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 04:10:19.320 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-09 04:10:19.321 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-09 04:10:19.322 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-09 04:10:19.322 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 04:10:19.324 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-09 04:10:19.325 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-09 04:10:19.326 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:10:19.326 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:10:19.327 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:10:19.328 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:10:19.329 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:10:19.329 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:10:19.330 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:10:19.330 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:10:19.331 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:10:19.332 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 04:10:19.337 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 73255413059826153134776664296619392015385529386 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 02:58:42 UTC 2022 Final Date: Mon Mar 08 02:58:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:3b:b0:29:4c:39:ff:70:f1:43:ac:6a:ee:49:ba:b8:49:4c:50:8e] modulus: cf6499f89bc35339b4f7e5ab916682c7a695954a0b11e7ef3296e51553222d5ae0c2fd4e89cec903ec6f1543b65275d46770d6cb42f477a23781118315802315861945735d5d2338af3a41e59b8aa77cd976a658bbf346c477308ebff1c37fe81486189cae73a50f1765a546c45a97fb452e65f146a1e3bf7908c2a92c2f94df093a54dd0ee7d6b2a5cfb08b888530d8db503cd6044354e86a0e4882472566366270cbc560ac8dade065c5d3812ee7386a1f795c405fddbcac9f32d903de8421651248d456e2351912b794153a9a89d11117ca5dfa5bff4b9c51bd9b49388762bee675a77ef09256301f9a8748e87478650f8ade4492b1134f2cfca12dc68dad759ed32ca5e30bd8486412c32294c168a687fc2cf8299eb082137aeda142fe92f0578299fbef0efb1dd3ec317ad0f2bfebbf84d47111d48d2526219ced47465d8df9447a98ac9b19d79a253b614a5e85acdaf8995c9072c78d840ab2a1013cbc2483373ecf43c18ddda24d571a70c7af27ae0a86b5c3986852b2c5fe7392b233 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c54f8ca4c27f532a5bb62e0adafc17573ac7eb08 8078ba7df270bd8da687617eeda821dcf513d6a6 f9a7875647bb47f2068df86832488fa8dc363468 7181786e5df0e5a6f6d2715d018ecccbe0d22e38 9a99fc0bfdf5b1b5ddc4f2d850d085da8ed7ad06 9d2c686f5ffa222819f8ce33884d5725ad719cdd 46b029e0cd0a00c60497b41e7983ffb71b1c9303 d3a98abf46d2b1f51bb8d98272b684c9fabeb054 c3431125600c68ed275bf1c788bae9a21c5be68f d4bd62357c21b518cbf8abfe2b3854e61e9d2740 a28f0d6a15dbeec9dc41c7daa69e422eb1c9a153 9c247b8cdea44edfd6a68c90c1b504c0190c5b15 291828e9c774f918a131190fe190c87a7a49d473 355b3785c5528d8d790173dd3d39e117ee753085 2993bedfe04eecc6afc62e4cd6c0a4ecfe79da0e 5444ee7442213b29468315e3cada81d0bbcf5b6e 0cccbc42469a511a3e4d55c3bb0bd6a969a4923b a42c1808e3d66f6c64cefeb6cc6c0e7085a77819 c73516b3cfada5749d430689aa5f5765d23af7b2 23902453 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [20:f2:9b:6b:1d:6b:de:58:3f:83:ec:3c:e6:fa:e4:71:0a:bc:df:fb] modulus: f8b3af47460d396622ca16f6573666f8f6ee9e044bd4302931414e7e4e12b67b706f05af72ae5a865868432521fb5e52722d641b1f35445d3028d42e02243f17f8d2e0393d6f3b27235f14183bb66efe68c191cc1e7eeca2b6c5df5b35c956cd33a56d5de2be5335f2a1b856d42dc2629ec7764bba2613bbc2460a23771307a8a99d482790d7bc3af9102ff94251c6493fea6bdbbc55dd518a507e85d0986b7e46d3fc362e6b819659f8afa381f40e29772b2080c4dbe9b052b4f110fa6ce1d72fa48209f88a0e5cf812b47874f3e1ed7a4a458a941272c138a62a9425710603c28e0e1f78f835cea83e89e4ca47ec1f10cc2d7a84bd7c1b550b8eb2b3433b57 public exponent: 10001 ] 2022-03-09 04:10:53.009 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-09 04:10:53.012 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-09 04:10:53.014 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-09 04:10:53.016 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 04:10:53.016 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-09 04:10:53.017 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-09 04:10:53.018 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-09 04:10:53.018 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 04:10:53.019 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-09 04:10:53.019 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-09 04:10:53.025 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-09 04:10:53.026 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 04:10:53.026 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 04:10:53.026 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 04:10:53.238 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-09 04:10:53.239 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-09 04:10:53.239 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-09 04:10:53.239 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 04:10:53.241 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-09 04:10:53.241 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-09 04:10:53.242 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:10:53.242 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:10:53.242 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:10:53.243 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:10:53.243 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:10:53.244 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:10:53.244 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:10:53.245 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:10:53.245 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:10:53.246 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 04:10:53.250 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 73255413059826153134776664296619392015385529386 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 02:58:42 UTC 2022 Final Date: Mon Mar 08 02:58:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:3b:b0:29:4c:39:ff:70:f1:43:ac:6a:ee:49:ba:b8:49:4c:50:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c54f8ca4c27f532a5bb62e0adafc17573ac7eb08 8078ba7df270bd8da687617eeda821dcf513d6a6 f9a7875647bb47f2068df86832488fa8dc363468 7181786e5df0e5a6f6d2715d018ecccbe0d22e38 9a99fc0bfdf5b1b5ddc4f2d850d085da8ed7ad06 9d2c686f5ffa222819f8ce33884d5725ad719cdd 46b029e0cd0a00c60497b41e7983ffb71b1c9303 d3a98abf46d2b1f51bb8d98272b684c9fabeb054 c3431125600c68ed275bf1c788bae9a21c5be68f d4bd62357c21b518cbf8abfe2b3854e61e9d2740 a28f0d6a15dbeec9dc41c7daa69e422eb1c9a153 9c247b8cdea44edfd6a68c90c1b504c0190c5b15 291828e9c774f918a131190fe190c87a7a49d473 355b3785c5528d8d790173dd3d39e117ee753085 2993bedfe04eecc6afc62e4cd6c0a4ecfe79da0e 5444ee7442213b29468315e3cada81d0bbcf5b6e 0cccbc42469a511a3e4d55c3bb0bd6a969a4923b a42c1808e3d66f6c64cefeb6cc6c0e7085a77819 c73516b3cfada5749d430689aa5f5765d23af7b2 23902453 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:e4:47:18:47:4f:1c:9e:05:3d:70:96:e2:74:0c:38:0f:4d:da:e3] modulus: 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 public exponent: 10001 ] 2022-03-09 04:12:39.599 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-09 04:12:39.601 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-09 04:12:39.603 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-09 04:12:39.604 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 04:12:39.605 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-09 04:12:39.606 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-09 04:12:39.606 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-09 04:12:39.607 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 04:12:39.608 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-09 04:12:39.608 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-09 04:12:39.613 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-09 04:12:39.614 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 04:12:39.614 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 04:12:39.614 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 04:12:39.788 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-09 04:12:39.789 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-09 04:12:39.789 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-09 04:12:39.789 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 04:12:39.791 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-09 04:12:39.792 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-09 04:12:39.792 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:12:39.793 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:12:39.793 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:12:39.794 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:12:39.794 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:12:39.794 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:12:39.795 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 04:12:39.795 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 04:12:39.796 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 04:12:39.797 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 04:12:39.801 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 73255413059826153134776664296619392015385529386 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 02:58:42 UTC 2022 Final Date: Mon Mar 08 02:58:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:3b:b0:29:4c:39:ff:70:f1:43:ac:6a:ee:49:ba:b8:49:4c:50:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: c54f8ca4c27f532a5bb62e0adafc17573ac7eb08 8078ba7df270bd8da687617eeda821dcf513d6a6 f9a7875647bb47f2068df86832488fa8dc363468 7181786e5df0e5a6f6d2715d018ecccbe0d22e38 9a99fc0bfdf5b1b5ddc4f2d850d085da8ed7ad06 9d2c686f5ffa222819f8ce33884d5725ad719cdd 46b029e0cd0a00c60497b41e7983ffb71b1c9303 d3a98abf46d2b1f51bb8d98272b684c9fabeb054 c3431125600c68ed275bf1c788bae9a21c5be68f d4bd62357c21b518cbf8abfe2b3854e61e9d2740 a28f0d6a15dbeec9dc41c7daa69e422eb1c9a153 9c247b8cdea44edfd6a68c90c1b504c0190c5b15 291828e9c774f918a131190fe190c87a7a49d473 355b3785c5528d8d790173dd3d39e117ee753085 2993bedfe04eecc6afc62e4cd6c0a4ecfe79da0e 5444ee7442213b29468315e3cada81d0bbcf5b6e 0cccbc42469a511a3e4d55c3bb0bd6a969a4923b a42c1808e3d66f6c64cefeb6cc6c0e7085a77819 c73516b3cfada5749d430689aa5f5765d23af7b2 23902453 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [46:b8:d3:e7:b9:52:b1:29:01:37:9a:33:5a:9f:ca:8e:07:cb:2d:b1] modulus: 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 public exponent: 10001 ]