By type
2022-04-09 03:05:27,848 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-09 03:05:29,257 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-09 03:05:30.000 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Apr 09, 2022 3:05:31 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 09, 2022 3:05:31 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 09, 2022 3:05:31 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 09, 2022 3:05:31 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-09 03:05:32.519 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-09 03:05:32.814 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-04-09 03:05:32.984 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-09 03:05:33.665 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-09 03:05:33.668 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-04-09 03:05:33.669 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-09 03:05:33.673 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-09 03:05:33.711 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-04-09 03:05:33.714 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-04-09 03:05:33.835 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-04-09 03:05:34.365 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 09, 2022 3:05:35 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-09 03:05:35.262 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.219 seconds (JVM running for 9.941) Apr 09, 2022 3:06:02 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-09 03:06:31.812 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-09 03:06:31.820 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-09 03:06:31.864 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-09 03:06:31.871 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 03:06:31.893 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-09 03:06:31.895 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-09 03:06:31.896 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-09 03:06:31.897 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-09 03:06:31.898 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 03:06:31.902 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-09 03:06:31.908 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-09 03:06:31.911 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-09 03:06:31.948 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-09 03:06:31.952 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 03:06:31.954 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 03:06:31.957 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:06:32.504 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-09 03:06:32.507 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-09 03:06:32.507 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-09 03:06:32.509 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:06:32.517 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-09 03:06:32.518 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-09 03:06:32.520 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:06:32.520 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:06:32.520 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:06:32.531 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:06:32.532 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:06:32.532 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:06:32.538 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:06:32.539 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:06:32.539 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:06:32.541 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 03:06:32.567 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 60675914505221942473407940936296122072440100638 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 03:03:28 UTC 2022 Final Date: Thu Apr 08 03:03:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [eb:26:9a:86:8b:3c:f3:a7:61:ce:50:b1:c3:6c:1e:20:49:bd:40:d9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0c047af0a8ae5dccf94cc1772c539e2bba7bede9 8bdfd9cf03ab610308ac68b206fd7caa9144688f b04b61233fd33e5d1de3704e54fafd7125c68d25 ff2486b3957820436dd00353ef7f09310d4c450c bc360ef262791a455b27b990254023394ae72e11 04cb48e85dc9c596f55932cdfeb9a1202005dcbb c49e66cce368015e757f643992a2e4c311ceabfb 285e1cb0be05de398506ab5c713c574e56c74431 18601e862740d3d37ae4cd78dd6866d31ca3d8d2 410a86186d2bc66d5c7bae58c4a4aad242b2ec53 f26c679fb1bce0ca9a66c0e92a538e1d053b1927 a77af75ab1ecfbd91dbe6c7f8577b0e03f03c066 f7dab01c9a10207e2f936ada9bf4ba44978c0e81 2daeb48f1a7d32909abc1ce7977b4a0f60a46e70 1c80b01b9764ccf1ac4a3849dc820bd59472ebed 1fd68e8b839f97ae85a764a290cc830401c26992 2abd30e3ed1fdfce24c2047de78933cf3cfc973d 56f0668392b43235394e1fb5e73d8d487cb6e8c9 32304f918727587200ce0ce2e206fc600fe0534f da880413 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:e4:9d:ee:5d:64:5f:3e:c5:d4:c9:89:c8:f2:cb:e4:0c:02:63:69] modulus: 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 public exponent: 10001 ] 2022-04-09 04:21:10.009 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-09 04:21:10.012 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-09 04:21:10.015 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-09 04:21:10.016 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 04:21:10.017 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-09 04:21:10.018 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-09 04:21:10.018 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-09 04:21:10.019 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-09 04:21:10.019 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-09 04:21:10.020 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-09 04:21:10.026 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-09 04:21:10.028 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 04:21:10.028 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 04:21:10.028 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:21:10.238 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-09 04:21:10.239 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-09 04:21:10.239 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-09 04:21:10.240 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:21:10.243 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-09 04:21:10.243 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-09 04:21:10.244 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:21:10.244 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:21:10.244 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:21:10.246 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:21:10.246 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:21:10.246 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:21:10.247 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:21:10.248 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:21:10.248 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:21:10.249 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 04:21:10.256 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 60675914505221942473407940936296122072440100638 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 03:03:28 UTC 2022 Final Date: Thu Apr 08 03:03:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [eb:26:9a:86:8b:3c:f3:a7:61:ce:50:b1:c3:6c:1e:20:49:bd:40:d9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0c047af0a8ae5dccf94cc1772c539e2bba7bede9 8bdfd9cf03ab610308ac68b206fd7caa9144688f b04b61233fd33e5d1de3704e54fafd7125c68d25 ff2486b3957820436dd00353ef7f09310d4c450c bc360ef262791a455b27b990254023394ae72e11 04cb48e85dc9c596f55932cdfeb9a1202005dcbb c49e66cce368015e757f643992a2e4c311ceabfb 285e1cb0be05de398506ab5c713c574e56c74431 18601e862740d3d37ae4cd78dd6866d31ca3d8d2 410a86186d2bc66d5c7bae58c4a4aad242b2ec53 f26c679fb1bce0ca9a66c0e92a538e1d053b1927 a77af75ab1ecfbd91dbe6c7f8577b0e03f03c066 f7dab01c9a10207e2f936ada9bf4ba44978c0e81 2daeb48f1a7d32909abc1ce7977b4a0f60a46e70 1c80b01b9764ccf1ac4a3849dc820bd59472ebed 1fd68e8b839f97ae85a764a290cc830401c26992 2abd30e3ed1fdfce24c2047de78933cf3cfc973d 56f0668392b43235394e1fb5e73d8d487cb6e8c9 32304f918727587200ce0ce2e206fc600fe0534f da880413 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [23:f4:bb:7b:35:44:53:2f:a0:c6:f2:3c:24:bd:09:a4:3a:3f:09:de] modulus: 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 public exponent: 10001 ] 2022-04-09 04:22:13.662 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-09 04:22:13.664 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-09 04:22:13.666 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-04-09 04:22:13.667 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 04:22:13.668 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-04-09 04:22:13.670 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-09 04:22:13.671 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-09 04:22:13.671 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-09 04:22:13.672 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-09 04:22:13.673 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-09 04:22:13.689 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-09 04:22:13.690 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 04:22:13.691 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 04:22:13.691 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:22:13.876 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-09 04:22:13.883 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-09 04:22:13.883 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-09 04:22:13.883 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:22:13.888 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-09 04:22:13.889 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-09 04:22:13.889 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:22:13.890 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:22:13.890 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:22:13.894 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:22:13.894 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:22:13.894 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:22:13.895 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:22:13.896 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:22:13.896 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:22:13.897 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 04:22:13.910 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 60675914505221942473407940936296122072440100638 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 03:03:28 UTC 2022 Final Date: Thu Apr 08 03:03:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [eb:26:9a:86:8b:3c:f3:a7:61:ce:50:b1:c3:6c:1e:20:49:bd:40:d9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0c047af0a8ae5dccf94cc1772c539e2bba7bede9 8bdfd9cf03ab610308ac68b206fd7caa9144688f b04b61233fd33e5d1de3704e54fafd7125c68d25 ff2486b3957820436dd00353ef7f09310d4c450c bc360ef262791a455b27b990254023394ae72e11 04cb48e85dc9c596f55932cdfeb9a1202005dcbb c49e66cce368015e757f643992a2e4c311ceabfb 285e1cb0be05de398506ab5c713c574e56c74431 18601e862740d3d37ae4cd78dd6866d31ca3d8d2 410a86186d2bc66d5c7bae58c4a4aad242b2ec53 f26c679fb1bce0ca9a66c0e92a538e1d053b1927 a77af75ab1ecfbd91dbe6c7f8577b0e03f03c066 f7dab01c9a10207e2f936ada9bf4ba44978c0e81 2daeb48f1a7d32909abc1ce7977b4a0f60a46e70 1c80b01b9764ccf1ac4a3849dc820bd59472ebed 1fd68e8b839f97ae85a764a290cc830401c26992 2abd30e3ed1fdfce24c2047de78933cf3cfc973d 56f0668392b43235394e1fb5e73d8d487cb6e8c9 32304f918727587200ce0ce2e206fc600fe0534f da880413 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [39:65:9b:d5:7a:1a:4f:fe:15:1b:c4:28:8b:5b:c2:92:d4:fe:a2:42] modulus: dc5f29fdddf86911ea87ca1a7377035d923ae86aae8dab6dc48096ccae46bc97d22fd6c7703d9c2558ff64040900e389c3e553b94c01abd8321fb8544479d05da3350737fcad8d8ac3153e706c503fdd7436d9c4ac1f69586d79d8e01027b18971939a1892875d8a50c0e3d84c3970dfd1e6f1bbd0f24c24a5540e82dbe35892d98a751e8818f54423da71a150987f7fbfe152b9c6c5000f6e6df006d5354a2f2e3f11c73549a3f04cf43f74ef6e5cd9e2bfe1fb37ee170765e39afd5e579f4659c7063f3a013d9f0224eaef511909c259e641c1f4e80b731af971ca12e9a40d00d294c761b10f974a91fd34afdc644a76bdf85cdcd0a09fe0a7bd040a530b19 public exponent: 10001 ] 2022-04-09 04:23:45.361 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-09 04:23:45.362 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-09 04:23:45.366 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-09 04:23:45.367 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 04:23:45.367 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-09 04:23:45.376 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-09 04:23:45.376 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-09 04:23:45.377 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-09 04:23:45.378 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-09 04:23:45.378 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-09 04:23:45.397 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-09 04:23:45.398 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 04:23:45.399 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 04:23:45.399 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:23:45.530 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-09 04:23:45.531 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-09 04:23:45.531 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-09 04:23:45.532 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:23:45.534 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-09 04:23:45.535 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-09 04:23:45.536 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:23:45.536 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:23:45.536 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:23:45.537 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:23:45.537 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:23:45.538 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:23:45.538 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:23:45.539 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:23:45.539 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:23:45.540 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 04:23:45.544 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 60675914505221942473407940936296122072440100638 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 03:03:28 UTC 2022 Final Date: Thu Apr 08 03:03:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [eb:26:9a:86:8b:3c:f3:a7:61:ce:50:b1:c3:6c:1e:20:49:bd:40:d9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0c047af0a8ae5dccf94cc1772c539e2bba7bede9 8bdfd9cf03ab610308ac68b206fd7caa9144688f b04b61233fd33e5d1de3704e54fafd7125c68d25 ff2486b3957820436dd00353ef7f09310d4c450c bc360ef262791a455b27b990254023394ae72e11 04cb48e85dc9c596f55932cdfeb9a1202005dcbb c49e66cce368015e757f643992a2e4c311ceabfb 285e1cb0be05de398506ab5c713c574e56c74431 18601e862740d3d37ae4cd78dd6866d31ca3d8d2 410a86186d2bc66d5c7bae58c4a4aad242b2ec53 f26c679fb1bce0ca9a66c0e92a538e1d053b1927 a77af75ab1ecfbd91dbe6c7f8577b0e03f03c066 f7dab01c9a10207e2f936ada9bf4ba44978c0e81 2daeb48f1a7d32909abc1ce7977b4a0f60a46e70 1c80b01b9764ccf1ac4a3849dc820bd59472ebed 1fd68e8b839f97ae85a764a290cc830401c26992 2abd30e3ed1fdfce24c2047de78933cf3cfc973d 56f0668392b43235394e1fb5e73d8d487cb6e8c9 32304f918727587200ce0ce2e206fc600fe0534f da880413 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ba:0d:d7:c2:b8:ed:3b:d9:0f:25:9d:b5:a4:51:73:c5:51:fa:d2:25] modulus: 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 public exponent: 10001 ] 2022-04-09 04:25:36.693 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-09 04:25:36.697 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-09 04:25:36.700 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-04-09 04:25:36.702 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 04:25:36.702 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-04-09 04:25:36.703 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-09 04:25:36.704 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-09 04:25:36.704 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-09 04:25:36.705 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-09 04:25:36.705 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-09 04:25:36.710 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-09 04:25:36.711 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 04:25:36.712 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 04:25:36.712 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:25:36.869 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-09 04:25:36.870 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-09 04:25:36.871 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-09 04:25:36.871 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:25:36.874 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-09 04:25:36.875 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-09 04:25:36.876 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:25:36.877 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:25:36.877 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:25:36.879 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:25:36.880 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:25:36.881 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:25:36.883 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:25:36.883 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:25:36.884 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:25:36.886 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 04:25:36.893 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 60675914505221942473407940936296122072440100638 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 03:03:28 UTC 2022 Final Date: Thu Apr 08 03:03:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [eb:26:9a:86:8b:3c:f3:a7:61:ce:50:b1:c3:6c:1e:20:49:bd:40:d9] modulus: a2f054ac2d95f7965621e47756c3e0be35bdce54c2084ab48c8139f4d9489a9b540241d75bdfbd0bef2bbb226f270ff67e26d506e6fb28a12840872fe17b45e0183ea5562c9e254e8e157644158f2cccbf2777e68a29e1d252d90345f1f7759994e46bc6ebe2d54798eddab80bcc9e827ddeabb1cb567cdea75c24d569413fb422c39bb2b06e4d9d46f0c7f59bd3e6b17b79000ae1fbcf325f5dc19b38998a6e1da19fd855c9e24a074cb22a80bc1832093da823305553d0c5dc8a1ccd06c157fd12d873135b13b16b8fea1203b74897e6932c78e54f74c35d720cc57877788c2a90052c721e8203115931fcb0c22627fa6d9d0f5f94a16c0d3d4744d160349ea6fc8e30b8d14351f9b2c8c6ce199f25e611eb47f622fef1c80715f5aeb2683e85e2b5349a6e94535dc6212a52f13cfb10f467289c844b6e74bcba488ed806311b871f680a8f6d3928b9648ed3a4c6114d9a51cab4a3188285ac7836010715ad3afa7d746c527e1fe7d9e9226c2f4d22216ac6c8d8a8a0a3c6a743beeb2bffaf public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0c047af0a8ae5dccf94cc1772c539e2bba7bede9 8bdfd9cf03ab610308ac68b206fd7caa9144688f b04b61233fd33e5d1de3704e54fafd7125c68d25 ff2486b3957820436dd00353ef7f09310d4c450c bc360ef262791a455b27b990254023394ae72e11 04cb48e85dc9c596f55932cdfeb9a1202005dcbb c49e66cce368015e757f643992a2e4c311ceabfb 285e1cb0be05de398506ab5c713c574e56c74431 18601e862740d3d37ae4cd78dd6866d31ca3d8d2 410a86186d2bc66d5c7bae58c4a4aad242b2ec53 f26c679fb1bce0ca9a66c0e92a538e1d053b1927 a77af75ab1ecfbd91dbe6c7f8577b0e03f03c066 f7dab01c9a10207e2f936ada9bf4ba44978c0e81 2daeb48f1a7d32909abc1ce7977b4a0f60a46e70 1c80b01b9764ccf1ac4a3849dc820bd59472ebed 1fd68e8b839f97ae85a764a290cc830401c26992 2abd30e3ed1fdfce24c2047de78933cf3cfc973d 56f0668392b43235394e1fb5e73d8d487cb6e8c9 32304f918727587200ce0ce2e206fc600fe0534f da880413 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5e:d0:1f:3e:0f:78:37:4b:4d:b8:f5:0d:17:e0:69:b0:6f:78:7c:60] modulus: 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 public exponent: 10001 ] 2022-04-09 04:25:48.428 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-09 04:25:48.429 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-09 04:25:48.431 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-09 04:25:48.431 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 04:25:48.432 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-09 04:25:48.432 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-09 04:25:48.433 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-09 04:25:48.433 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-09 04:25:48.434 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-09 04:25:48.434 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-09 04:25:48.440 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-09 04:25:48.440 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 04:25:48.441 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 04:25:48.441 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:25:48.548 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-09 04:25:48.549 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-09 04:25:48.549 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-09 04:25:48.549 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:25:48.551 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-09 04:25:48.551 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-09 04:25:48.552 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:25:48.552 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:25:48.552 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:25:48.553 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:25:48.553 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:25:48.554 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:25:48.554 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:25:48.555 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:25:48.555 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:25:48.556 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 04:25:48.559 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 60675914505221942473407940936296122072440100638 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 03:03:28 UTC 2022 Final Date: Thu Apr 08 03:03:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [eb:26:9a:86:8b:3c:f3:a7:61:ce:50:b1:c3:6c:1e:20:49:bd:40:d9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0c047af0a8ae5dccf94cc1772c539e2bba7bede9 8bdfd9cf03ab610308ac68b206fd7caa9144688f b04b61233fd33e5d1de3704e54fafd7125c68d25 ff2486b3957820436dd00353ef7f09310d4c450c bc360ef262791a455b27b990254023394ae72e11 04cb48e85dc9c596f55932cdfeb9a1202005dcbb c49e66cce368015e757f643992a2e4c311ceabfb 285e1cb0be05de398506ab5c713c574e56c74431 18601e862740d3d37ae4cd78dd6866d31ca3d8d2 410a86186d2bc66d5c7bae58c4a4aad242b2ec53 f26c679fb1bce0ca9a66c0e92a538e1d053b1927 a77af75ab1ecfbd91dbe6c7f8577b0e03f03c066 f7dab01c9a10207e2f936ada9bf4ba44978c0e81 2daeb48f1a7d32909abc1ce7977b4a0f60a46e70 1c80b01b9764ccf1ac4a3849dc820bd59472ebed 1fd68e8b839f97ae85a764a290cc830401c26992 2abd30e3ed1fdfce24c2047de78933cf3cfc973d 56f0668392b43235394e1fb5e73d8d487cb6e8c9 32304f918727587200ce0ce2e206fc600fe0534f da880413 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:c9:da:ea:48:1a:73:0f:82:20:09:06:7c:d5:97:9a:70:de:b7:62] modulus: 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 public exponent: 10001 ] 2022-04-09 04:26:21.768 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-09 04:26:21.769 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-09 04:26:21.770 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-04-09 04:26:21.771 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 04:26:21.774 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-04-09 04:26:21.775 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-09 04:26:21.775 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-09 04:26:21.776 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-09 04:26:21.776 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-09 04:26:21.776 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-09 04:26:21.781 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-09 04:26:21.781 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 04:26:21.781 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 04:26:21.782 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:26:21.924 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-09 04:26:21.925 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-09 04:26:21.925 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-09 04:26:21.926 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:26:21.927 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-09 04:26:21.928 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-09 04:26:21.929 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:26:21.929 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:26:21.930 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:26:21.930 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:26:21.931 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:26:21.931 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:26:21.932 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:26:21.932 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:26:21.933 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:26:21.934 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 04:26:21.938 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 60675914505221942473407940936296122072440100638 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 03:03:28 UTC 2022 Final Date: Thu Apr 08 03:03:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [eb:26:9a:86:8b:3c:f3:a7:61:ce:50:b1:c3:6c:1e:20:49:bd:40:d9] modulus: a2f054ac2d95f7965621e47756c3e0be35bdce54c2084ab48c8139f4d9489a9b540241d75bdfbd0bef2bbb226f270ff67e26d506e6fb28a12840872fe17b45e0183ea5562c9e254e8e157644158f2cccbf2777e68a29e1d252d90345f1f7759994e46bc6ebe2d54798eddab80bcc9e827ddeabb1cb567cdea75c24d569413fb422c39bb2b06e4d9d46f0c7f59bd3e6b17b79000ae1fbcf325f5dc19b38998a6e1da19fd855c9e24a074cb22a80bc1832093da823305553d0c5dc8a1ccd06c157fd12d873135b13b16b8fea1203b74897e6932c78e54f74c35d720cc57877788c2a90052c721e8203115931fcb0c22627fa6d9d0f5f94a16c0d3d4744d160349ea6fc8e30b8d14351f9b2c8c6ce199f25e611eb47f622fef1c80715f5aeb2683e85e2b5349a6e94535dc6212a52f13cfb10f467289c844b6e74bcba488ed806311b871f680a8f6d3928b9648ed3a4c6114d9a51cab4a3188285ac7836010715ad3afa7d746c527e1fe7d9e9226c2f4d22216ac6c8d8a8a0a3c6a743beeb2bffaf public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0c047af0a8ae5dccf94cc1772c539e2bba7bede9 8bdfd9cf03ab610308ac68b206fd7caa9144688f b04b61233fd33e5d1de3704e54fafd7125c68d25 ff2486b3957820436dd00353ef7f09310d4c450c bc360ef262791a455b27b990254023394ae72e11 04cb48e85dc9c596f55932cdfeb9a1202005dcbb c49e66cce368015e757f643992a2e4c311ceabfb 285e1cb0be05de398506ab5c713c574e56c74431 18601e862740d3d37ae4cd78dd6866d31ca3d8d2 410a86186d2bc66d5c7bae58c4a4aad242b2ec53 f26c679fb1bce0ca9a66c0e92a538e1d053b1927 a77af75ab1ecfbd91dbe6c7f8577b0e03f03c066 f7dab01c9a10207e2f936ada9bf4ba44978c0e81 2daeb48f1a7d32909abc1ce7977b4a0f60a46e70 1c80b01b9764ccf1ac4a3849dc820bd59472ebed 1fd68e8b839f97ae85a764a290cc830401c26992 2abd30e3ed1fdfce24c2047de78933cf3cfc973d 56f0668392b43235394e1fb5e73d8d487cb6e8c9 32304f918727587200ce0ce2e206fc600fe0534f da880413 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e0:15:ee:34:6e:88:15:86:bd:16:83:2d:fa:50:8b:75:bc:de:de:a1] modulus: a6f9532423f371a7a04b798dea1d3a443c96a52a5fd05ff68a2e444cc3f98c814cf5295d0145c1314bb6baee175ecc3a589d555be4924539f877eab75a2f281c7dbdd8f993defbc1d1f6c5b392e50f9cde4ae21000c097194dd4427808d6e1b130494934b08846de06102623540e73a451db068d0cdded429e2f317f72a5302829a596f8ed1b40b614e595840d9201b1d6e1c03e9fcffd826b34f66e3a7fc1361f4a750d23922e1e9c7e5bd6d93c6984faa1672606d86c8b9f03b45949585ea87ab8151ef833bcba2240a7de7572758b30a115fea13f3c802d0869fffe4a0eea5903601ce32c85ebdc5d2581f55d02d1a7a3475a26a0ad6c77ad90e3e4bb0e5b public exponent: 10001 ] 2022-04-09 04:26:55.676 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-09 04:26:55.677 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-09 04:26:55.679 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-04-09 04:26:55.679 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 04:26:55.680 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-04-09 04:26:55.681 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-09 04:26:55.681 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-09 04:26:55.682 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-09 04:26:55.682 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-09 04:26:55.683 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-09 04:26:55.688 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-09 04:26:55.689 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 04:26:55.689 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 04:26:55.690 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:26:55.824 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-09 04:26:55.825 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-09 04:26:55.825 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-09 04:26:55.826 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:26:55.828 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-09 04:26:55.831 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-09 04:26:55.832 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:26:55.833 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:26:55.833 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:26:55.835 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:26:55.835 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:26:55.836 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:26:55.837 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:26:55.837 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:26:55.837 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:26:55.839 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 04:26:55.844 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 60675914505221942473407940936296122072440100638 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 03:03:28 UTC 2022 Final Date: Thu Apr 08 03:03:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [eb:26:9a:86:8b:3c:f3:a7:61:ce:50:b1:c3:6c:1e:20:49:bd:40:d9] modulus: a2f054ac2d95f7965621e47756c3e0be35bdce54c2084ab48c8139f4d9489a9b540241d75bdfbd0bef2bbb226f270ff67e26d506e6fb28a12840872fe17b45e0183ea5562c9e254e8e157644158f2cccbf2777e68a29e1d252d90345f1f7759994e46bc6ebe2d54798eddab80bcc9e827ddeabb1cb567cdea75c24d569413fb422c39bb2b06e4d9d46f0c7f59bd3e6b17b79000ae1fbcf325f5dc19b38998a6e1da19fd855c9e24a074cb22a80bc1832093da823305553d0c5dc8a1ccd06c157fd12d873135b13b16b8fea1203b74897e6932c78e54f74c35d720cc57877788c2a90052c721e8203115931fcb0c22627fa6d9d0f5f94a16c0d3d4744d160349ea6fc8e30b8d14351f9b2c8c6ce199f25e611eb47f622fef1c80715f5aeb2683e85e2b5349a6e94535dc6212a52f13cfb10f467289c844b6e74bcba488ed806311b871f680a8f6d3928b9648ed3a4c6114d9a51cab4a3188285ac7836010715ad3afa7d746c527e1fe7d9e9226c2f4d22216ac6c8d8a8a0a3c6a743beeb2bffaf public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0c047af0a8ae5dccf94cc1772c539e2bba7bede9 8bdfd9cf03ab610308ac68b206fd7caa9144688f b04b61233fd33e5d1de3704e54fafd7125c68d25 ff2486b3957820436dd00353ef7f09310d4c450c bc360ef262791a455b27b990254023394ae72e11 04cb48e85dc9c596f55932cdfeb9a1202005dcbb c49e66cce368015e757f643992a2e4c311ceabfb 285e1cb0be05de398506ab5c713c574e56c74431 18601e862740d3d37ae4cd78dd6866d31ca3d8d2 410a86186d2bc66d5c7bae58c4a4aad242b2ec53 f26c679fb1bce0ca9a66c0e92a538e1d053b1927 a77af75ab1ecfbd91dbe6c7f8577b0e03f03c066 f7dab01c9a10207e2f936ada9bf4ba44978c0e81 2daeb48f1a7d32909abc1ce7977b4a0f60a46e70 1c80b01b9764ccf1ac4a3849dc820bd59472ebed 1fd68e8b839f97ae85a764a290cc830401c26992 2abd30e3ed1fdfce24c2047de78933cf3cfc973d 56f0668392b43235394e1fb5e73d8d487cb6e8c9 32304f918727587200ce0ce2e206fc600fe0534f da880413 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [84:11:52:5c:6a:ac:9a:1b:4a:9d:fc:47:93:6d:0d:df:fc:26:26:d9] modulus: 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 public exponent: 10001 ] 2022-04-09 04:28:41.730 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-09 04:28:41.731 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-09 04:28:41.732 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-04-09 04:28:41.733 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 04:28:41.734 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-04-09 04:28:41.734 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-09 04:28:41.734 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-09 04:28:41.735 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-09 04:28:41.735 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-09 04:28:41.735 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-09 04:28:41.742 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-09 04:28:41.743 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 04:28:41.743 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-09 04:28:41.744 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:28:41.882 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-09 04:28:41.883 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-09 04:28:41.883 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-09 04:28:41.883 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:28:41.885 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-09 04:28:41.885 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-09 04:28:41.885 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:28:41.886 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:28:41.886 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:28:41.887 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:28:41.887 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:28:41.887 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:28:41.888 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:28:41.889 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:28:41.889 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:28:41.890 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 04:28:41.893 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 60675914505221942473407940936296122072440100638 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 03:03:28 UTC 2022 Final Date: Thu Apr 08 03:03:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [eb:26:9a:86:8b:3c:f3:a7:61:ce:50:b1:c3:6c:1e:20:49:bd:40:d9] modulus: a2f054ac2d95f7965621e47756c3e0be35bdce54c2084ab48c8139f4d9489a9b540241d75bdfbd0bef2bbb226f270ff67e26d506e6fb28a12840872fe17b45e0183ea5562c9e254e8e157644158f2cccbf2777e68a29e1d252d90345f1f7759994e46bc6ebe2d54798eddab80bcc9e827ddeabb1cb567cdea75c24d569413fb422c39bb2b06e4d9d46f0c7f59bd3e6b17b79000ae1fbcf325f5dc19b38998a6e1da19fd855c9e24a074cb22a80bc1832093da823305553d0c5dc8a1ccd06c157fd12d873135b13b16b8fea1203b74897e6932c78e54f74c35d720cc57877788c2a90052c721e8203115931fcb0c22627fa6d9d0f5f94a16c0d3d4744d160349ea6fc8e30b8d14351f9b2c8c6ce199f25e611eb47f622fef1c80715f5aeb2683e85e2b5349a6e94535dc6212a52f13cfb10f467289c844b6e74bcba488ed806311b871f680a8f6d3928b9648ed3a4c6114d9a51cab4a3188285ac7836010715ad3afa7d746c527e1fe7d9e9226c2f4d22216ac6c8d8a8a0a3c6a743beeb2bffaf public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0c047af0a8ae5dccf94cc1772c539e2bba7bede9 8bdfd9cf03ab610308ac68b206fd7caa9144688f b04b61233fd33e5d1de3704e54fafd7125c68d25 ff2486b3957820436dd00353ef7f09310d4c450c bc360ef262791a455b27b990254023394ae72e11 04cb48e85dc9c596f55932cdfeb9a1202005dcbb c49e66cce368015e757f643992a2e4c311ceabfb 285e1cb0be05de398506ab5c713c574e56c74431 18601e862740d3d37ae4cd78dd6866d31ca3d8d2 410a86186d2bc66d5c7bae58c4a4aad242b2ec53 f26c679fb1bce0ca9a66c0e92a538e1d053b1927 a77af75ab1ecfbd91dbe6c7f8577b0e03f03c066 f7dab01c9a10207e2f936ada9bf4ba44978c0e81 2daeb48f1a7d32909abc1ce7977b4a0f60a46e70 1c80b01b9764ccf1ac4a3849dc820bd59472ebed 1fd68e8b839f97ae85a764a290cc830401c26992 2abd30e3ed1fdfce24c2047de78933cf3cfc973d 56f0668392b43235394e1fb5e73d8d487cb6e8c9 32304f918727587200ce0ce2e206fc600fe0534f da880413 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e4:83:b8:14:8f:c8:3f:63:20:d2:c0:5d:78:df:3a:9d:1b:be:fe:99] modulus: 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 public exponent: 10001 ]