By type
2022-03-09 16:17:21,997 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-09 16:17:22,930 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-09 16:17:23.660 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Mar 09, 2022 4:17:25 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 09, 2022 4:17:25 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 09, 2022 4:17:25 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 09, 2022 4:17:25 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-09 16:17:26.417 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-09 16:17:26.778 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-03-09 16:17:26.982 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-09 16:17:27.762 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-09 16:17:27.766 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-03-09 16:17:27.769 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-09 16:17:27.775 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-09 16:17:27.825 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-03-09 16:17:27.828 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-03-09 16:17:27.950 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-03-09 16:17:28.632 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 09, 2022 4:17:29 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-09 16:17:29.690 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.465 seconds (JVM running for 10.311) Mar 09, 2022 4:17:51 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-09 16:18:21.624 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-09 16:18:21.635 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-09 16:18:21.680 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-09 16:18:21.685 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 16:18:21.706 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-09 16:18:21.708 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-09 16:18:21.710 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-09 16:18:21.711 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 16:18:21.711 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 16:18:21.716 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 16:18:21.723 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-09 16:18:21.726 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-09 16:18:21.768 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-09 16:18:21.774 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 16:18:21.774 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 16:18:21.778 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 16:18:22.467 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-09 16:18:22.470 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-09 16:18:22.470 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-09 16:18:22.472 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 16:18:22.481 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-09 16:18:22.481 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-09 16:18:22.482 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 16:18:22.483 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 16:18:22.484 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 16:18:22.495 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 16:18:22.495 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 16:18:22.495 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 16:18:22.501 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 16:18:22.502 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 16:18:22.502 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 16:18:22.504 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 16:18:22.530 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126880377219225064731701993120666490152935645813 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 16:14:41 UTC 2022 Final Date: Mon Mar 08 16:14:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:3c:51:8a:b4:ce:50:48:e4:9a:5b:4e:bf:ff:1a:ef:80:30:00:9a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa8026ca6b4dfa77791e9e6d6a5b2c3ebcc5bb7f 7c37c7eda6e7a699f3be22d6541ca655ecc4bb17 44890aac8f07c2789d70053df58509aa41792e54 c430ada9bcd18d515d89456934213b0da6239a17 08c6ea03e1eab0fd2fadb585db98652a89c53ecb b942f29b433c3c3b22404acef94f0a133f61a23a 7bcf2afc7db4a6430f02155f8a6d3cec632eb69f 490e2984d3c3667bbcdb5e1d5158d0a762c84cd8 aa86dbf142c7201c508e6647049d6a7bcff6e4dc 742a8973154f740a64d227646a01e26884958719 0168e2c8721656bd8ad1b759d4d7321673c36249 6dd9062db3044f2e6a2e30df564daeb041db4d4b 1b88ebb87dffdc75a609c8505461a10bc77ce983 a700290480a9998f4c8f62b40b423d8bc1f46551 cb39a67ae488d45b1344d90e3906a5e68a85be5f 9407b22363e02e10dcad8b23307e58d98413c4f3 108d1447069ff9c21c72230e40505f804ac24e97 fdac268ad97585f968d5501c5f11a63433e14f91 09488d990834740f0d164c0906b26e39d2fa6587 dcc2d7e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:80:5c:f9:7f:69:90:bf:13:e6:c4:7b:80:3b:9a:0d:c3:c7:e0:9c] modulus: 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 public exponent: 10001 ] 2022-03-09 17:22:15.855 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-09 17:22:15.859 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-09 17:22:15.862 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-09 17:22:15.863 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 17:22:15.864 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-09 17:22:15.865 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-09 17:22:15.866 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-09 17:22:15.866 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 17:22:15.867 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-09 17:22:15.868 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-09 17:22:15.880 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-09 17:22:15.881 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 17:22:15.881 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 17:22:15.882 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 17:22:16.147 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-09 17:22:16.148 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-09 17:22:16.149 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-09 17:22:16.149 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 17:22:16.152 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-09 17:22:16.153 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-09 17:22:16.153 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:22:16.154 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:22:16.154 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:22:16.155 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:22:16.156 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:22:16.156 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:22:16.158 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:22:16.159 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:22:16.159 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:22:16.161 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 17:22:16.169 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126880377219225064731701993120666490152935645813 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 16:14:41 UTC 2022 Final Date: Mon Mar 08 16:14:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:3c:51:8a:b4:ce:50:48:e4:9a:5b:4e:bf:ff:1a:ef:80:30:00:9a] modulus: ccf449341095e0db241d18cbbdaca68c50fb8c4d14304e106b8aec9d10e9d20c1d374a71e364fe492223edbaf41298fc38432b25203e6bbcc8a057c966dd0c8dba2a7eff556a41eab2e185bbbabdad13d1691e45ca0e79e6dc8d72fe47f34e2040ebedc0a23fd875c67c848f1d963259eebd8b14118fabb5726dd6e6f5d006c2cc784de3e25dcb54bbe4df97fac6b6789b07bbb96678d253c7cb711af57541a032eb2da50d6ffd3d200821837e41772e7b855b2a0b96b0d0a8ea2ed66873842e036ca6e65677382a7dff5b7349b9793e19527770d69a48ce2af61ffe24ff58a2743f1dae39b20eed4840b3a5a8409fd17c259982b0eab1366abc2cb1aca5528e46414d9c1e2f172c5a3718ea0459e72f7e7ed1cd9c7b7653e066c0d8bdf7503f6676a7e2834511d801b1d692651d8a0b762422f54c1d170ebf7b130c43c9d819009f746359960cdf6d31fc3792f1304ba5fdd3e509339910fb8e8efb1ba347d83369619a094169a8c31a4ed96614fa62b7076ca2ab0f04df4b2567490c3f2581 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa8026ca6b4dfa77791e9e6d6a5b2c3ebcc5bb7f 7c37c7eda6e7a699f3be22d6541ca655ecc4bb17 44890aac8f07c2789d70053df58509aa41792e54 c430ada9bcd18d515d89456934213b0da6239a17 08c6ea03e1eab0fd2fadb585db98652a89c53ecb b942f29b433c3c3b22404acef94f0a133f61a23a 7bcf2afc7db4a6430f02155f8a6d3cec632eb69f 490e2984d3c3667bbcdb5e1d5158d0a762c84cd8 aa86dbf142c7201c508e6647049d6a7bcff6e4dc 742a8973154f740a64d227646a01e26884958719 0168e2c8721656bd8ad1b759d4d7321673c36249 6dd9062db3044f2e6a2e30df564daeb041db4d4b 1b88ebb87dffdc75a609c8505461a10bc77ce983 a700290480a9998f4c8f62b40b423d8bc1f46551 cb39a67ae488d45b1344d90e3906a5e68a85be5f 9407b22363e02e10dcad8b23307e58d98413c4f3 108d1447069ff9c21c72230e40505f804ac24e97 fdac268ad97585f968d5501c5f11a63433e14f91 09488d990834740f0d164c0906b26e39d2fa6587 dcc2d7e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ea:73:5d:fd:da:a5:13:fa:fd:22:0d:81:b9:c9:ca:24:fd:02:33:8c] modulus: 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 public exponent: 10001 ] 2022-03-09 17:23:30.659 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-09 17:23:30.661 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-09 17:23:30.663 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-09 17:23:30.664 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 17:23:30.665 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-09 17:23:30.666 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-09 17:23:30.666 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-09 17:23:30.667 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 17:23:30.667 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-09 17:23:30.668 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-09 17:23:30.676 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-09 17:23:30.676 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 17:23:30.677 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 17:23:30.678 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 17:23:30.833 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-09 17:23:30.834 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-09 17:23:30.834 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-09 17:23:30.835 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 17:23:30.837 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-09 17:23:30.838 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-09 17:23:30.838 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:23:30.839 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:23:30.839 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:23:30.841 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:23:30.841 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:23:30.842 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:23:30.843 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:23:30.843 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:23:30.843 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:23:30.845 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 17:23:30.849 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126880377219225064731701993120666490152935645813 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 16:14:41 UTC 2022 Final Date: Mon Mar 08 16:14:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:3c:51:8a:b4:ce:50:48:e4:9a:5b:4e:bf:ff:1a:ef:80:30:00:9a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa8026ca6b4dfa77791e9e6d6a5b2c3ebcc5bb7f 7c37c7eda6e7a699f3be22d6541ca655ecc4bb17 44890aac8f07c2789d70053df58509aa41792e54 c430ada9bcd18d515d89456934213b0da6239a17 08c6ea03e1eab0fd2fadb585db98652a89c53ecb b942f29b433c3c3b22404acef94f0a133f61a23a 7bcf2afc7db4a6430f02155f8a6d3cec632eb69f 490e2984d3c3667bbcdb5e1d5158d0a762c84cd8 aa86dbf142c7201c508e6647049d6a7bcff6e4dc 742a8973154f740a64d227646a01e26884958719 0168e2c8721656bd8ad1b759d4d7321673c36249 6dd9062db3044f2e6a2e30df564daeb041db4d4b 1b88ebb87dffdc75a609c8505461a10bc77ce983 a700290480a9998f4c8f62b40b423d8bc1f46551 cb39a67ae488d45b1344d90e3906a5e68a85be5f 9407b22363e02e10dcad8b23307e58d98413c4f3 108d1447069ff9c21c72230e40505f804ac24e97 fdac268ad97585f968d5501c5f11a63433e14f91 09488d990834740f0d164c0906b26e39d2fa6587 dcc2d7e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [77:f5:4e:11:b8:2a:4b:58:fe:35:3e:77:e5:7a:66:b3:40:f2:88:de] modulus: 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 public exponent: 10001 ] 2022-03-09 17:25:00.559 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-09 17:25:00.561 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-09 17:25:00.563 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-09 17:25:00.564 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 17:25:00.564 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-09 17:25:00.565 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-09 17:25:00.565 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-09 17:25:00.566 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 17:25:00.566 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-09 17:25:00.567 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-09 17:25:00.571 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-09 17:25:00.572 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 17:25:00.573 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 17:25:00.573 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 17:25:00.704 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-09 17:25:00.705 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-09 17:25:00.705 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-09 17:25:00.706 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 17:25:00.708 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-09 17:25:00.708 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-09 17:25:00.708 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:25:00.709 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:25:00.709 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:25:00.710 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:25:00.710 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:25:00.710 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:25:00.711 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:25:00.711 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:25:00.712 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:25:00.713 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 17:25:00.718 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126880377219225064731701993120666490152935645813 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 16:14:41 UTC 2022 Final Date: Mon Mar 08 16:14:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:3c:51:8a:b4:ce:50:48:e4:9a:5b:4e:bf:ff:1a:ef:80:30:00:9a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa8026ca6b4dfa77791e9e6d6a5b2c3ebcc5bb7f 7c37c7eda6e7a699f3be22d6541ca655ecc4bb17 44890aac8f07c2789d70053df58509aa41792e54 c430ada9bcd18d515d89456934213b0da6239a17 08c6ea03e1eab0fd2fadb585db98652a89c53ecb b942f29b433c3c3b22404acef94f0a133f61a23a 7bcf2afc7db4a6430f02155f8a6d3cec632eb69f 490e2984d3c3667bbcdb5e1d5158d0a762c84cd8 aa86dbf142c7201c508e6647049d6a7bcff6e4dc 742a8973154f740a64d227646a01e26884958719 0168e2c8721656bd8ad1b759d4d7321673c36249 6dd9062db3044f2e6a2e30df564daeb041db4d4b 1b88ebb87dffdc75a609c8505461a10bc77ce983 a700290480a9998f4c8f62b40b423d8bc1f46551 cb39a67ae488d45b1344d90e3906a5e68a85be5f 9407b22363e02e10dcad8b23307e58d98413c4f3 108d1447069ff9c21c72230e40505f804ac24e97 fdac268ad97585f968d5501c5f11a63433e14f91 09488d990834740f0d164c0906b26e39d2fa6587 dcc2d7e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:de:41:8d:c4:2e:45:c8:70:a0:fa:59:9d:1f:f7:82:1e:f7:b4:0a] modulus: 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 public exponent: 10001 ] 2022-03-09 17:26:45.846 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-09 17:26:45.848 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-09 17:26:45.851 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-09 17:26:45.852 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 17:26:45.853 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-09 17:26:45.853 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-09 17:26:45.854 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-09 17:26:45.854 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 17:26:45.855 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-09 17:26:45.855 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-09 17:26:45.860 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-09 17:26:45.861 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 17:26:45.861 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 17:26:45.862 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 17:26:46.062 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-09 17:26:46.063 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-09 17:26:46.064 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-09 17:26:46.064 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 17:26:46.066 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-09 17:26:46.067 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-09 17:26:46.067 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:26:46.068 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:26:46.069 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:26:46.070 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:26:46.070 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:26:46.071 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:26:46.072 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:26:46.072 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:26:46.072 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:26:46.073 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 17:26:46.077 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126880377219225064731701993120666490152935645813 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 16:14:41 UTC 2022 Final Date: Mon Mar 08 16:14:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:3c:51:8a:b4:ce:50:48:e4:9a:5b:4e:bf:ff:1a:ef:80:30:00:9a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa8026ca6b4dfa77791e9e6d6a5b2c3ebcc5bb7f 7c37c7eda6e7a699f3be22d6541ca655ecc4bb17 44890aac8f07c2789d70053df58509aa41792e54 c430ada9bcd18d515d89456934213b0da6239a17 08c6ea03e1eab0fd2fadb585db98652a89c53ecb b942f29b433c3c3b22404acef94f0a133f61a23a 7bcf2afc7db4a6430f02155f8a6d3cec632eb69f 490e2984d3c3667bbcdb5e1d5158d0a762c84cd8 aa86dbf142c7201c508e6647049d6a7bcff6e4dc 742a8973154f740a64d227646a01e26884958719 0168e2c8721656bd8ad1b759d4d7321673c36249 6dd9062db3044f2e6a2e30df564daeb041db4d4b 1b88ebb87dffdc75a609c8505461a10bc77ce983 a700290480a9998f4c8f62b40b423d8bc1f46551 cb39a67ae488d45b1344d90e3906a5e68a85be5f 9407b22363e02e10dcad8b23307e58d98413c4f3 108d1447069ff9c21c72230e40505f804ac24e97 fdac268ad97585f968d5501c5f11a63433e14f91 09488d990834740f0d164c0906b26e39d2fa6587 dcc2d7e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [87:f5:58:59:6e:61:ec:e8:7f:ea:9c:11:6d:11:2b:c9:1d:8e:af:da] modulus: ac824dc3ead81888a8c8478a67d79caa74e48b0c2ee952fc55eafe3a0fffccf7498e9095d0b1f3c7fa58a90957a26f4511b62110d81862972225d97d3b485822f05c6e9514c96a75d51554a5b9d0db49cc18810512b6162b731dea758dd21a2f9e5a1167c3c951b7ff7dd5e8224cb79790a10144cbefa836a59c49f3e7b1bb6e6da524f96321a0111a95d23592c7a3e5aa8c16544405ba4b7a4fcb289f90c074de65c5c631ed335c6771d13bff7bdfc5def96ccd8777d7fc5e187604a8b6b71cd59b1b9aba262359a734187ce43838b15789678ffd4ead7442985a3e8b45a1af1883a682f82589319ab2e11fcbf84e34e414ab1c59a66351a54e0d97191a54af public exponent: 10001 ] 2022-03-09 17:26:52.755 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-09 17:26:52.756 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-09 17:26:52.758 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-09 17:26:52.758 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 17:26:52.759 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-09 17:26:52.759 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-09 17:26:52.760 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-09 17:26:52.760 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 17:26:52.760 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-09 17:26:52.761 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-09 17:26:52.766 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-09 17:26:52.766 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 17:26:52.767 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 17:26:52.767 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 17:26:52.883 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-09 17:26:52.884 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-09 17:26:52.884 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-09 17:26:52.884 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 17:26:52.886 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-09 17:26:52.887 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-09 17:26:52.887 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:26:52.887 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:26:52.888 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:26:52.888 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:26:52.889 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:26:52.889 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:26:52.890 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:26:52.890 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:26:52.890 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:26:52.891 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 17:26:52.895 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126880377219225064731701993120666490152935645813 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 16:14:41 UTC 2022 Final Date: Mon Mar 08 16:14:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:3c:51:8a:b4:ce:50:48:e4:9a:5b:4e:bf:ff:1a:ef:80:30:00:9a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa8026ca6b4dfa77791e9e6d6a5b2c3ebcc5bb7f 7c37c7eda6e7a699f3be22d6541ca655ecc4bb17 44890aac8f07c2789d70053df58509aa41792e54 c430ada9bcd18d515d89456934213b0da6239a17 08c6ea03e1eab0fd2fadb585db98652a89c53ecb b942f29b433c3c3b22404acef94f0a133f61a23a 7bcf2afc7db4a6430f02155f8a6d3cec632eb69f 490e2984d3c3667bbcdb5e1d5158d0a762c84cd8 aa86dbf142c7201c508e6647049d6a7bcff6e4dc 742a8973154f740a64d227646a01e26884958719 0168e2c8721656bd8ad1b759d4d7321673c36249 6dd9062db3044f2e6a2e30df564daeb041db4d4b 1b88ebb87dffdc75a609c8505461a10bc77ce983 a700290480a9998f4c8f62b40b423d8bc1f46551 cb39a67ae488d45b1344d90e3906a5e68a85be5f 9407b22363e02e10dcad8b23307e58d98413c4f3 108d1447069ff9c21c72230e40505f804ac24e97 fdac268ad97585f968d5501c5f11a63433e14f91 09488d990834740f0d164c0906b26e39d2fa6587 dcc2d7e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ec:be:f4:54:08:61:7c:7f:b8:76:0c:d5:ff:1e:e7:f0:0c:cc:98:e4] modulus: b767291271f95d112c043eb902c198035d3aab7fbe6f6fd6d87cfed7c78e33ce53c200d95b5bbefd74d0bc86b36aa00124008567b6d0fe9108215958a33d25f4c91082b748bd3e8445a6d9b752af888cc8c361065e9118510261e11967b6b6abc17e6e772aa823bea2810d45f6d64cca91f806efc1908d6d88320f6752ef1b137958b6be52ce0819524eb222ab13d7d0ff78420d3cf7d78640ae76eddbf73ff6a5c72a24cbad7f90e16f80ba79c6671dac80ef9832a47d45aade5f24e55d1a9d633cf79e679d157f6603fb5ac4b7fd3a355f8a2d87fa85f9c9fb76a2dc4348d8446d2ea00bd10d4a6ecd7771202fce59e8ee257adeb1ec822c2b55516ea5aa27 public exponent: 10001 ] 2022-03-09 17:27:18.901 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-09 17:27:18.903 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-09 17:27:18.904 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-09 17:27:18.905 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 17:27:18.905 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-09 17:27:18.906 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-09 17:27:18.906 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-09 17:27:18.906 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 17:27:18.907 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-09 17:27:18.907 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-09 17:27:18.912 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-09 17:27:18.913 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 17:27:18.913 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 17:27:18.914 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 17:27:19.058 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-09 17:27:19.059 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-09 17:27:19.060 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-09 17:27:19.060 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 17:27:19.063 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-09 17:27:19.063 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-09 17:27:19.064 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:27:19.065 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:27:19.065 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:27:19.067 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:27:19.067 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:27:19.068 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:27:19.069 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:27:19.070 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:27:19.070 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:27:19.071 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 17:27:19.076 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126880377219225064731701993120666490152935645813 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 16:14:41 UTC 2022 Final Date: Mon Mar 08 16:14:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:3c:51:8a:b4:ce:50:48:e4:9a:5b:4e:bf:ff:1a:ef:80:30:00:9a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa8026ca6b4dfa77791e9e6d6a5b2c3ebcc5bb7f 7c37c7eda6e7a699f3be22d6541ca655ecc4bb17 44890aac8f07c2789d70053df58509aa41792e54 c430ada9bcd18d515d89456934213b0da6239a17 08c6ea03e1eab0fd2fadb585db98652a89c53ecb b942f29b433c3c3b22404acef94f0a133f61a23a 7bcf2afc7db4a6430f02155f8a6d3cec632eb69f 490e2984d3c3667bbcdb5e1d5158d0a762c84cd8 aa86dbf142c7201c508e6647049d6a7bcff6e4dc 742a8973154f740a64d227646a01e26884958719 0168e2c8721656bd8ad1b759d4d7321673c36249 6dd9062db3044f2e6a2e30df564daeb041db4d4b 1b88ebb87dffdc75a609c8505461a10bc77ce983 a700290480a9998f4c8f62b40b423d8bc1f46551 cb39a67ae488d45b1344d90e3906a5e68a85be5f 9407b22363e02e10dcad8b23307e58d98413c4f3 108d1447069ff9c21c72230e40505f804ac24e97 fdac268ad97585f968d5501c5f11a63433e14f91 09488d990834740f0d164c0906b26e39d2fa6587 dcc2d7e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9e:89:2a:cc:2c:48:88:72:9d:6b:eb:da:43:44:cd:e6:f9:62:e0:d1] modulus: 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 public exponent: 10001 ] 2022-03-09 17:27:52.695 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-09 17:27:52.696 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-09 17:27:52.697 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-09 17:27:52.698 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 17:27:52.699 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-09 17:27:52.699 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-09 17:27:52.700 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-09 17:27:52.700 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 17:27:52.701 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-09 17:27:52.701 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-09 17:27:52.706 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-09 17:27:52.707 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 17:27:52.707 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 17:27:52.708 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 17:27:52.853 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-09 17:27:52.853 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-09 17:27:52.854 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-09 17:27:52.854 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 17:27:52.856 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-09 17:27:52.856 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-09 17:27:52.856 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:27:52.857 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:27:52.857 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:27:52.857 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:27:52.858 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:27:52.858 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:27:52.859 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:27:52.859 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:27:52.859 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:27:52.860 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 17:27:52.863 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126880377219225064731701993120666490152935645813 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 16:14:41 UTC 2022 Final Date: Mon Mar 08 16:14:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:3c:51:8a:b4:ce:50:48:e4:9a:5b:4e:bf:ff:1a:ef:80:30:00:9a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa8026ca6b4dfa77791e9e6d6a5b2c3ebcc5bb7f 7c37c7eda6e7a699f3be22d6541ca655ecc4bb17 44890aac8f07c2789d70053df58509aa41792e54 c430ada9bcd18d515d89456934213b0da6239a17 08c6ea03e1eab0fd2fadb585db98652a89c53ecb b942f29b433c3c3b22404acef94f0a133f61a23a 7bcf2afc7db4a6430f02155f8a6d3cec632eb69f 490e2984d3c3667bbcdb5e1d5158d0a762c84cd8 aa86dbf142c7201c508e6647049d6a7bcff6e4dc 742a8973154f740a64d227646a01e26884958719 0168e2c8721656bd8ad1b759d4d7321673c36249 6dd9062db3044f2e6a2e30df564daeb041db4d4b 1b88ebb87dffdc75a609c8505461a10bc77ce983 a700290480a9998f4c8f62b40b423d8bc1f46551 cb39a67ae488d45b1344d90e3906a5e68a85be5f 9407b22363e02e10dcad8b23307e58d98413c4f3 108d1447069ff9c21c72230e40505f804ac24e97 fdac268ad97585f968d5501c5f11a63433e14f91 09488d990834740f0d164c0906b26e39d2fa6587 dcc2d7e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [00:ac:8d:d7:80:d0:c3:33:7e:6e:e2:bc:db:4e:c0:78:9d:e1:f7:52] modulus: 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 public exponent: 10001 ] 2022-03-09 17:29:39.392 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-09 17:29:39.393 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-09 17:29:39.394 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-09 17:29:39.394 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 17:29:39.395 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-09 17:29:39.395 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-09 17:29:39.395 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-09 17:29:39.396 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-09 17:29:39.396 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-09 17:29:39.396 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-09 17:29:39.401 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-09 17:29:39.401 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 17:29:39.401 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-09 17:29:39.402 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 17:29:39.537 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-09 17:29:39.537 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-09 17:29:39.538 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-09 17:29:39.538 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 17:29:39.540 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-09 17:29:39.540 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-09 17:29:39.540 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:29:39.541 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:29:39.541 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:29:39.541 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:29:39.542 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:29:39.542 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:29:39.544 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 17:29:39.545 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-09 17:29:39.545 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-09 17:29:39.547 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 17:29:39.551 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126880377219225064731701993120666490152935645813 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 16:14:41 UTC 2022 Final Date: Mon Mar 08 16:14:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:3c:51:8a:b4:ce:50:48:e4:9a:5b:4e:bf:ff:1a:ef:80:30:00:9a] modulus: ccf449341095e0db241d18cbbdaca68c50fb8c4d14304e106b8aec9d10e9d20c1d374a71e364fe492223edbaf41298fc38432b25203e6bbcc8a057c966dd0c8dba2a7eff556a41eab2e185bbbabdad13d1691e45ca0e79e6dc8d72fe47f34e2040ebedc0a23fd875c67c848f1d963259eebd8b14118fabb5726dd6e6f5d006c2cc784de3e25dcb54bbe4df97fac6b6789b07bbb96678d253c7cb711af57541a032eb2da50d6ffd3d200821837e41772e7b855b2a0b96b0d0a8ea2ed66873842e036ca6e65677382a7dff5b7349b9793e19527770d69a48ce2af61ffe24ff58a2743f1dae39b20eed4840b3a5a8409fd17c259982b0eab1366abc2cb1aca5528e46414d9c1e2f172c5a3718ea0459e72f7e7ed1cd9c7b7653e066c0d8bdf7503f6676a7e2834511d801b1d692651d8a0b762422f54c1d170ebf7b130c43c9d819009f746359960cdf6d31fc3792f1304ba5fdd3e509339910fb8e8efb1ba347d83369619a094169a8c31a4ed96614fa62b7076ca2ab0f04df4b2567490c3f2581 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aa8026ca6b4dfa77791e9e6d6a5b2c3ebcc5bb7f 7c37c7eda6e7a699f3be22d6541ca655ecc4bb17 44890aac8f07c2789d70053df58509aa41792e54 c430ada9bcd18d515d89456934213b0da6239a17 08c6ea03e1eab0fd2fadb585db98652a89c53ecb b942f29b433c3c3b22404acef94f0a133f61a23a 7bcf2afc7db4a6430f02155f8a6d3cec632eb69f 490e2984d3c3667bbcdb5e1d5158d0a762c84cd8 aa86dbf142c7201c508e6647049d6a7bcff6e4dc 742a8973154f740a64d227646a01e26884958719 0168e2c8721656bd8ad1b759d4d7321673c36249 6dd9062db3044f2e6a2e30df564daeb041db4d4b 1b88ebb87dffdc75a609c8505461a10bc77ce983 a700290480a9998f4c8f62b40b423d8bc1f46551 cb39a67ae488d45b1344d90e3906a5e68a85be5f 9407b22363e02e10dcad8b23307e58d98413c4f3 108d1447069ff9c21c72230e40505f804ac24e97 fdac268ad97585f968d5501c5f11a63433e14f91 09488d990834740f0d164c0906b26e39d2fa6587 dcc2d7e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:b3:59:ba:1c:9d:e2:5e:cf:ae:fb:96:3a:66:e3:74:8f:76:33:f3] modulus: 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 public exponent: 10001 ]