By type
2022-06-02 15:14:47,553 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-02 15:14:49,096 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-02 15:14:50.088 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 02, 2022 3:14:52 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 02, 2022 3:14:52 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 02, 2022 3:14:52 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 02, 2022 3:14:52 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-02 15:14:53.222 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-02 15:14:53.551 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-02 15:14:53.732 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-02 15:14:54.535 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-02 15:14:54.538 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-06-02 15:14:54.539 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-02 15:14:54.543 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-02 15:14:54.591 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-02 15:14:54.595 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-06-02 15:14:54.735 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-02 15:14:55.397 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 02, 2022 3:14:56 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-02 15:14:56.470 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 10.024 seconds (JVM running for 12.219) Jun 02, 2022 3:15:17 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-02 15:15:51.188 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 15:15:51.204 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 15:15:51.269 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-02 15:15:51.279 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 15:15:51.318 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-02 15:15:51.323 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 15:15:51.324 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 15:15:51.325 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 15:15:51.326 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 15:15:51.330 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 15:15:51.340 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 15:15:51.344 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 15:15:51.403 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 15:15:51.414 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 15:15:51.416 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 15:15:51.423 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 15:15:52.478 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 15:15:52.490 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 15:15:52.491 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 15:15:52.493 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 15:15:52.502 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 15:15:52.504 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 15:15:52.505 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 15:15:52.506 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 15:15:52.507 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 15:15:52.526 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 15:15:52.527 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 15:15:52.527 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 15:15:52.536 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 15:15:52.536 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 15:15:52.537 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 15:15:52.539 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 15:15:52.577 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:93:8d:17:1f:2d:b2:32:c6:71:a3:fa:5d:81:38:02:54:17:6f:d5] modulus: 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 public exponent: 10001 ] 2022-06-02 17:47:45.463 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 17:47:45.467 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 17:47:45.471 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 17:47:45.473 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 17:47:45.475 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 17:47:45.476 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 17:47:45.477 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 17:47:45.478 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 17:47:45.478 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 17:47:45.479 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 17:47:45.487 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 17:47:45.489 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 17:47:45.489 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 17:47:45.490 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 17:47:45.778 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 17:47:45.779 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 17:47:45.780 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 17:47:45.780 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 17:47:45.785 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 17:47:45.786 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 17:47:45.787 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 17:47:45.787 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 17:47:45.788 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 17:47:45.790 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 17:47:45.790 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 17:47:45.791 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 17:47:45.794 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 17:47:45.794 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 17:47:45.795 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 17:47:45.797 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 17:47:45.807 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 937f39724be3a15b53e0e41051d21b39a768bb5cc551022e61ce18d49d3021e310626098e582c8b9de0f5bd9b6fa1031c95d75b1a12f3e1c11a740579276f9f744538a810adfea515fb344105f59d05d58ad225a2de185ac905fcb67d6370902b0b1e003b54b565e9fa3d91765ba8ab6032e8ed1020ff72169cd20fad9ee1ba63aa3ef30df8be82546466b3adddf6be77575d35eed1952d6756a33a243268c4e1c6331d92da6704fbf0dbe85e68bf73cebed1e4217091b186d157f8d1eaf3269b1162ed1d127913e0b039031b55fbaf006791d6bd3d1c280a5ebeb4d33af176d25f5e62f320682af36adbd4d449598aa84644b2b120c2cb8566791d0b665907d2a51d20cb1e8c1b6523c532affeb231ab601acacdeaadbb7d3f5e708b557be4d29aa4ac4b07ddc7d9c4aa02896a38db87b812413153ebad4c6eb5d9251d0caa8a34ed099eee1bfb6e33207243ae3c522c2f2ccac8c97c813774dd1b65d5dac85a22cbb0fa6a63dbdd4880e6cfcb8e356c8398480ae14916b6dd7f23b56090889 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5d:45:53:08:4e:55:1f:6c:35:b2:bc:e1:f1:8e:4a:72:7f:f4:b3:c5] modulus: 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 public exponent: 10001 ] 2022-06-02 17:49:33.907 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 17:49:33.910 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 17:49:33.913 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-02 17:49:33.914 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 17:49:33.915 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-02 17:49:33.916 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 17:49:33.917 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 17:49:33.917 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 17:49:33.918 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 17:49:33.918 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 17:49:33.927 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 17:49:33.928 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 17:49:33.928 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 17:49:33.929 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 17:49:34.141 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 17:49:34.143 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 17:49:34.143 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 17:49:34.144 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 17:49:34.150 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 17:49:34.152 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 17:49:34.152 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 17:49:34.153 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 17:49:34.153 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 17:49:34.155 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 17:49:34.155 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 17:49:34.156 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 17:49:34.157 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 17:49:34.157 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 17:49:34.158 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 17:49:34.159 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 17:49:34.164 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 937f39724be3a15b53e0e41051d21b39a768bb5cc551022e61ce18d49d3021e310626098e582c8b9de0f5bd9b6fa1031c95d75b1a12f3e1c11a740579276f9f744538a810adfea515fb344105f59d05d58ad225a2de185ac905fcb67d6370902b0b1e003b54b565e9fa3d91765ba8ab6032e8ed1020ff72169cd20fad9ee1ba63aa3ef30df8be82546466b3adddf6be77575d35eed1952d6756a33a243268c4e1c6331d92da6704fbf0dbe85e68bf73cebed1e4217091b186d157f8d1eaf3269b1162ed1d127913e0b039031b55fbaf006791d6bd3d1c280a5ebeb4d33af176d25f5e62f320682af36adbd4d449598aa84644b2b120c2cb8566791d0b665907d2a51d20cb1e8c1b6523c532affeb231ab601acacdeaadbb7d3f5e708b557be4d29aa4ac4b07ddc7d9c4aa02896a38db87b812413153ebad4c6eb5d9251d0caa8a34ed099eee1bfb6e33207243ae3c522c2f2ccac8c97c813774dd1b65d5dac85a22cbb0fa6a63dbdd4880e6cfcb8e356c8398480ae14916b6dd7f23b56090889 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0f:b3:1b:ad:b3:a1:32:1c:16:1c:8b:cf:62:95:0e:1a:e9:47:df:90] modulus: 9e658ac41ff1cb4864287d044a29675ebbb56825a524aba3fda9362bb3a0437ac984d05e89d23fd4a627c21a0928ef1a06e7ceee1641a934dac0e5e027ca584351dd21d40941782dfb387d7c4b77a5a6e78fb6cd8c2e3c2c06615e8de21f578a28c2c258acd24f8a50717b46d31e8c42892a4f7ad5792d142ac882027fc14089bd15976a1d47b6f71284157f9743fbe37b4903e955a4268093924a0864c8fd0f8dc180e369e4d8b79ea96b1848513965adafe50a21891d41e8121c333923c4cc7a329dee1beb616e1cb00ca8bb71c9e7b40732613e95c5fa1ac203d66cdafc4b62df9a9a1f5cf8688d2b70d4e4beb371694f055d7037bc8f544fcfcb0d5be60f public exponent: 10001 ] 2022-06-02 17:51:32.353 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 17:51:32.354 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 17:51:32.356 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-02 17:51:32.357 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 17:51:32.357 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-02 17:51:32.358 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 17:51:32.359 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 17:51:32.360 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 17:51:32.360 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 17:51:32.361 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 17:51:32.369 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 17:51:32.371 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 17:51:32.371 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 17:51:32.372 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 17:51:32.548 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 17:51:32.550 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 17:51:32.550 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 17:51:32.551 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 17:51:32.553 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 17:51:32.553 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 17:51:32.554 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 17:51:32.554 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 17:51:32.555 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 17:51:32.556 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 17:51:32.557 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 17:51:32.557 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 17:51:32.558 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 17:51:32.559 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 17:51:32.559 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 17:51:32.561 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 17:51:32.566 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [45:8c:4b:42:c8:11:be:a8:1f:db:44:9f:e2:f1:4d:50:96:a3:d5:72] modulus: b2bf93744a180e5a21c474fc1c6aae5cbf6536081002470902ec31acd20e162f5aebe8c3110766132f6ebf0f97396452eb1e2f46bdc3eea10cb7c412a4d40dbb4f51aa0d25fb8fea18ed92c8d2b86632efdf7c2835fca453d1aa5b4493dc43cc3c100d88523757d314d0c4eca4c845e628001fa786531f8df81531419aa663e98df0649dbba2a6e687f7ce3358203a0194e5b71e7546b9763fcc5deaa5ec91079411a42195d1b7d2b89218a11ff6afc9c84e52486edd0a204c8fcbd80007929c813f2148f06706ed599a56d4034bac413ad88fc26078b8b8419f4ac24dfe228fe376bea7266c7fa9ed354fac300b0e8dc2ed6a4cfa475f438217ce457b4d0315 public exponent: 10001 ] 2022-06-02 17:54:05.991 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 17:54:05.994 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 17:54:05.997 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 17:54:05.999 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 17:54:05.999 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 17:54:06.002 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 17:54:06.003 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 17:54:06.003 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 17:54:06.004 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 17:54:06.004 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 17:54:06.010 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 17:54:06.012 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 17:54:06.012 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 17:54:06.013 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 17:54:06.292 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 17:54:06.293 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 17:54:06.293 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 17:54:06.294 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 17:54:06.296 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 17:54:06.297 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 17:54:06.297 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 17:54:06.297 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 17:54:06.298 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 17:54:06.299 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 17:54:06.299 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 17:54:06.300 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 17:54:06.300 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 17:54:06.301 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 17:54:06.301 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 17:54:06.302 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 17:54:06.306 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cc:85:a5:1d:f8:1e:0e:52:27:8e:8b:de:e7:d9:95:60:e1:74:6a:2c] modulus: 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 public exponent: 10001 ] 2022-06-02 17:58:07.268 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 17:58:07.270 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 17:58:07.272 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 17:58:07.272 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 17:58:07.273 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 17:58:07.276 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 17:58:07.277 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 17:58:07.278 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 17:58:07.278 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 17:58:07.279 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 17:58:07.288 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 17:58:07.290 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 17:58:07.290 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 17:58:07.291 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 17:58:07.455 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 17:58:07.457 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 17:58:07.457 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 17:58:07.458 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 17:58:07.461 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 17:58:07.461 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 17:58:07.462 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 17:58:07.462 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 17:58:07.463 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 17:58:07.464 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 17:58:07.464 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 17:58:07.465 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 17:58:07.467 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 17:58:07.467 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 17:58:07.468 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 17:58:07.469 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 17:58:07.475 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [62:e9:a6:87:7d:99:b6:cd:21:b1:8c:cb:08:37:f2:55:c5:43:38:c2] modulus: 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 public exponent: 10001 ] 2022-06-02 18:01:44.099 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 18:01:44.103 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 18:01:44.106 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:01:44.107 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 18:01:44.107 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:01:44.108 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 18:01:44.108 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 18:01:44.109 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 18:01:44.109 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 18:01:44.110 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 18:01:44.115 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 18:01:44.116 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:01:44.117 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:01:44.117 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:01:44.418 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 18:01:44.419 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 18:01:44.419 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 18:01:44.419 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:01:44.421 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 18:01:44.421 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 18:01:44.422 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:01:44.422 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:01:44.422 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:01:44.423 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:01:44.424 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:01:44.424 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:01:44.425 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:01:44.426 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:01:44.426 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:01:44.427 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 18:01:44.432 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 937f39724be3a15b53e0e41051d21b39a768bb5cc551022e61ce18d49d3021e310626098e582c8b9de0f5bd9b6fa1031c95d75b1a12f3e1c11a740579276f9f744538a810adfea515fb344105f59d05d58ad225a2de185ac905fcb67d6370902b0b1e003b54b565e9fa3d91765ba8ab6032e8ed1020ff72169cd20fad9ee1ba63aa3ef30df8be82546466b3adddf6be77575d35eed1952d6756a33a243268c4e1c6331d92da6704fbf0dbe85e68bf73cebed1e4217091b186d157f8d1eaf3269b1162ed1d127913e0b039031b55fbaf006791d6bd3d1c280a5ebeb4d33af176d25f5e62f320682af36adbd4d449598aa84644b2b120c2cb8566791d0b665907d2a51d20cb1e8c1b6523c532affeb231ab601acacdeaadbb7d3f5e708b557be4d29aa4ac4b07ddc7d9c4aa02896a38db87b812413153ebad4c6eb5d9251d0caa8a34ed099eee1bfb6e33207243ae3c522c2f2ccac8c97c813774dd1b65d5dac85a22cbb0fa6a63dbdd4880e6cfcb8e356c8398480ae14916b6dd7f23b56090889 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6d:0a:0f:eb:ca:fd:c4:33:3c:8c:c8:5e:ba:21:40:ae:94:a3:93:6c] modulus: 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 public exponent: 10001 ] 2022-06-02 18:03:41.786 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 18:03:41.788 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 18:03:41.789 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:03:41.790 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 18:03:41.790 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:03:41.791 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 18:03:41.791 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 18:03:41.792 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 18:03:41.792 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 18:03:41.792 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 18:03:41.799 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 18:03:41.800 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:03:41.801 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:03:41.801 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:03:42.014 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 18:03:42.015 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 18:03:42.015 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 18:03:42.016 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:03:42.018 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 18:03:42.019 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 18:03:42.019 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:03:42.019 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:03:42.020 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:03:42.020 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:03:42.021 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:03:42.021 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:03:42.022 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:03:42.022 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:03:42.022 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:03:42.023 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 18:03:42.027 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 937f39724be3a15b53e0e41051d21b39a768bb5cc551022e61ce18d49d3021e310626098e582c8b9de0f5bd9b6fa1031c95d75b1a12f3e1c11a740579276f9f744538a810adfea515fb344105f59d05d58ad225a2de185ac905fcb67d6370902b0b1e003b54b565e9fa3d91765ba8ab6032e8ed1020ff72169cd20fad9ee1ba63aa3ef30df8be82546466b3adddf6be77575d35eed1952d6756a33a243268c4e1c6331d92da6704fbf0dbe85e68bf73cebed1e4217091b186d157f8d1eaf3269b1162ed1d127913e0b039031b55fbaf006791d6bd3d1c280a5ebeb4d33af176d25f5e62f320682af36adbd4d449598aa84644b2b120c2cb8566791d0b665907d2a51d20cb1e8c1b6523c532affeb231ab601acacdeaadbb7d3f5e708b557be4d29aa4ac4b07ddc7d9c4aa02896a38db87b812413153ebad4c6eb5d9251d0caa8a34ed099eee1bfb6e33207243ae3c522c2f2ccac8c97c813774dd1b65d5dac85a22cbb0fa6a63dbdd4880e6cfcb8e356c8398480ae14916b6dd7f23b56090889 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:4c:23:8d:f6:8e:69:67:ac:d9:60:ef:dc:0e:d2:27:ac:d5:db:29] modulus: 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 public exponent: 10001 ] 2022-06-02 18:06:09.044 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 18:06:09.046 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 18:06:09.048 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:06:09.049 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 18:06:09.049 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:06:09.050 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 18:06:09.050 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 18:06:09.051 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 18:06:09.051 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 18:06:09.052 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 18:06:09.058 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 18:06:09.060 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:06:09.060 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:06:09.061 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:06:09.225 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 18:06:09.227 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 18:06:09.228 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 18:06:09.229 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:06:09.232 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 18:06:09.232 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 18:06:09.233 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:06:09.233 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:06:09.234 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:06:09.235 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:06:09.235 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:06:09.236 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:06:09.237 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:06:09.237 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:06:09.238 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:06:09.239 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 18:06:09.246 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1d:95:58:32:90:1b:4b:14:56:e0:88:8c:8f:d8:ae:ab:e3:06:01:6d] modulus: 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 public exponent: 10001 ] 2022-06-02 18:10:25.179 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 18:10:25.181 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 18:10:25.184 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:10:25.185 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 18:10:25.185 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:10:25.186 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 18:10:25.187 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 18:10:25.187 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 18:10:25.188 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 18:10:25.188 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 18:10:25.194 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 18:10:25.195 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:10:25.195 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:10:25.195 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:10:25.482 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 18:10:25.488 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 18:10:25.489 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 18:10:25.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:10:25.495 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 18:10:25.495 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 18:10:25.496 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:10:25.496 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:10:25.497 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:10:25.498 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:10:25.498 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:10:25.498 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:10:25.500 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:10:25.502 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:10:25.502 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:10:25.503 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 18:10:25.514 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a5:b2:89:2d:ec:d8:d4:3e:e7:e0:df:81:7f:90:2b:57:be:77:75:ff] modulus: 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 public exponent: 10001 ] 2022-06-02 18:14:47.468 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 18:14:47.471 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 18:14:47.474 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:14:47.477 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 18:14:47.477 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:14:47.479 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 18:14:47.479 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 18:14:47.480 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 18:14:47.480 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 18:14:47.481 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 18:14:47.487 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 18:14:47.488 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:14:47.488 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:14:47.489 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:14:47.652 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 18:14:47.653 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 18:14:47.654 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 18:14:47.654 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:14:47.657 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 18:14:47.658 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 18:14:47.658 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:14:47.659 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:14:47.660 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:14:47.661 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:14:47.662 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:14:47.662 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:14:47.664 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:14:47.664 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:14:47.665 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:14:47.666 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 18:14:47.675 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:fc:d5:36:e8:07:fb:1d:1d:80:66:a4:3e:e1:52:e3:84:a4:d0:2c] modulus: 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 public exponent: 10001 ] 2022-06-02 18:19:08.654 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 18:19:08.656 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 18:19:08.658 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:19:08.659 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 18:19:08.660 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:19:08.660 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 18:19:08.661 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 18:19:08.661 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 18:19:08.662 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 18:19:08.662 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 18:19:08.668 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 18:19:08.669 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:19:08.669 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:19:08.670 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:19:08.835 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 18:19:08.836 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 18:19:08.836 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 18:19:08.836 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:19:08.838 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 18:19:08.838 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 18:19:08.838 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:19:08.839 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:19:08.839 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:19:08.840 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:19:08.840 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:19:08.840 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:19:08.841 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:19:08.841 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:19:08.841 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:19:08.842 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 18:19:08.847 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fe:be:5c:32:7a:f3:5d:04:0d:65:3f:07:2e:b3:f9:0d:dd:2f:3f:3e] modulus: de4a4e6677a944740ba394a9b945a0f6a0e71c7adbe0f4523926b4fd0c6e9013c073c2a053c2663723ced35c9ae2da5a84ec0147268668bd1000cd113b6e9a4a7e207bc23e5e8ccd3f67600be7493faab6465196aa0a358d33c625b60eaa5ee0e06f9b942b11ea071bafb892062435439ef4fa7b99dbf81621749b67f6b82aef0634ec6b2479ac36f033f79a83063f42e9c6ba5dc71523233ff73cddf8e588750b302fde56bc7b30a5521b76b4ba87fdf69a210df3bfb2e32af2c87b8fb1d6130d6c5b6f45ffbbee34a25757163c6803e9091750956ad7b827e56ad9b46d809d47781da7dfeab6b3c147501beb00aced675b2461db82ac094b7a2a64b59b7ab1 public exponent: 10001 ] 2022-06-02 18:23:15.360 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 18:23:15.363 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 18:23:15.366 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:23:15.367 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 18:23:15.368 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:23:15.369 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 18:23:15.369 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 18:23:15.370 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 18:23:15.370 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 18:23:15.371 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 18:23:15.377 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 18:23:15.378 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:23:15.378 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:23:15.378 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:23:15.539 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 18:23:15.540 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 18:23:15.540 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 18:23:15.541 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:23:15.542 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 18:23:15.543 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 18:23:15.544 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:23:15.544 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:23:15.544 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:23:15.545 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:23:15.546 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:23:15.546 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:23:15.547 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:23:15.547 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:23:15.548 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:23:15.549 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 18:23:15.554 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7a:aa:1e:51:43:7b:ff:df:38:f3:0d:f2:fd:c4:97:7f:47:6b:83:27] modulus: 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 public exponent: 10001 ] 2022-06-02 18:27:28.183 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 18:27:28.188 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 18:27:28.191 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:27:28.193 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 18:27:28.194 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:27:28.195 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 18:27:28.195 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 18:27:28.196 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 18:27:28.196 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 18:27:28.197 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 18:27:28.204 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 18:27:28.205 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:27:28.205 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:27:28.206 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:27:28.392 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 18:27:28.393 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 18:27:28.393 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 18:27:28.394 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:27:28.395 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 18:27:28.396 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 18:27:28.396 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:27:28.397 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:27:28.397 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:27:28.398 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:27:28.398 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:27:28.398 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:27:28.399 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:27:28.399 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:27:28.400 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:27:28.401 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 18:27:28.405 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0d:f6:e9:1c:29:38:f3:7c:aa:88:f4:33:57:2d:ac:6b:9b:86:80:9b] modulus: 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 public exponent: 10001 ] 2022-06-02 18:32:22.234 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 18:32:22.235 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 18:32:22.237 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:32:22.238 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 18:32:22.238 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:32:22.239 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 18:32:22.240 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 18:32:22.240 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 18:32:22.240 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 18:32:22.241 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 18:32:22.246 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 18:32:22.246 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:32:22.246 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:32:22.247 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:32:22.429 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 18:32:22.430 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 18:32:22.431 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 18:32:22.431 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:32:22.433 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 18:32:22.433 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 18:32:22.434 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:32:22.434 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:32:22.434 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:32:22.435 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:32:22.435 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:32:22.436 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:32:22.437 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:32:22.437 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:32:22.437 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:32:22.438 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 18:32:22.442 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 937f39724be3a15b53e0e41051d21b39a768bb5cc551022e61ce18d49d3021e310626098e582c8b9de0f5bd9b6fa1031c95d75b1a12f3e1c11a740579276f9f744538a810adfea515fb344105f59d05d58ad225a2de185ac905fcb67d6370902b0b1e003b54b565e9fa3d91765ba8ab6032e8ed1020ff72169cd20fad9ee1ba63aa3ef30df8be82546466b3adddf6be77575d35eed1952d6756a33a243268c4e1c6331d92da6704fbf0dbe85e68bf73cebed1e4217091b186d157f8d1eaf3269b1162ed1d127913e0b039031b55fbaf006791d6bd3d1c280a5ebeb4d33af176d25f5e62f320682af36adbd4d449598aa84644b2b120c2cb8566791d0b665907d2a51d20cb1e8c1b6523c532affeb231ab601acacdeaadbb7d3f5e708b557be4d29aa4ac4b07ddc7d9c4aa02896a38db87b812413153ebad4c6eb5d9251d0caa8a34ed099eee1bfb6e33207243ae3c522c2f2ccac8c97c813774dd1b65d5dac85a22cbb0fa6a63dbdd4880e6cfcb8e356c8398480ae14916b6dd7f23b56090889 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c7:ab:4b:b9:4b:7d:f4:02:42:b9:99:6f:35:87:df:40:32:eb:db:5b] modulus: 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 public exponent: 10001 ] 2022-06-02 18:36:35.903 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 18:36:35.905 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 18:36:35.907 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:36:35.908 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 18:36:35.908 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:36:35.909 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 18:36:35.909 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 18:36:35.910 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 18:36:35.910 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 18:36:35.911 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 18:36:35.916 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 18:36:35.917 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:36:35.917 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:36:35.918 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:36:36.167 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 18:36:36.167 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 18:36:36.168 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 18:36:36.168 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:36:36.170 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 18:36:36.170 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 18:36:36.171 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:36:36.171 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:36:36.171 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:36:36.172 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:36:36.172 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:36:36.173 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:36:36.174 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:36:36.174 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:36:36.174 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:36:36.175 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 18:36:36.179 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [73:a7:a0:91:22:a6:fd:bd:7c:6b:34:48:2d:de:89:6d:4c:dd:3e:a1] modulus: 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 public exponent: 10001 ] 2022-06-02 18:42:39.294 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 18:42:39.297 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 18:42:39.301 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:42:39.302 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 18:42:39.303 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:42:39.305 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 18:42:39.306 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 18:42:39.307 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 18:42:39.307 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 18:42:39.308 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 18:42:39.317 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 18:42:39.319 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:42:39.319 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:42:39.320 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:42:39.516 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 18:42:39.517 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 18:42:39.517 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 18:42:39.518 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:42:39.519 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 18:42:39.520 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 18:42:39.520 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:42:39.520 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:42:39.521 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:42:39.521 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:42:39.522 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:42:39.522 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:42:39.523 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:42:39.523 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:42:39.523 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:42:39.524 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 18:42:39.530 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 937f39724be3a15b53e0e41051d21b39a768bb5cc551022e61ce18d49d3021e310626098e582c8b9de0f5bd9b6fa1031c95d75b1a12f3e1c11a740579276f9f744538a810adfea515fb344105f59d05d58ad225a2de185ac905fcb67d6370902b0b1e003b54b565e9fa3d91765ba8ab6032e8ed1020ff72169cd20fad9ee1ba63aa3ef30df8be82546466b3adddf6be77575d35eed1952d6756a33a243268c4e1c6331d92da6704fbf0dbe85e68bf73cebed1e4217091b186d157f8d1eaf3269b1162ed1d127913e0b039031b55fbaf006791d6bd3d1c280a5ebeb4d33af176d25f5e62f320682af36adbd4d449598aa84644b2b120c2cb8566791d0b665907d2a51d20cb1e8c1b6523c532affeb231ab601acacdeaadbb7d3f5e708b557be4d29aa4ac4b07ddc7d9c4aa02896a38db87b812413153ebad4c6eb5d9251d0caa8a34ed099eee1bfb6e33207243ae3c522c2f2ccac8c97c813774dd1b65d5dac85a22cbb0fa6a63dbdd4880e6cfcb8e356c8398480ae14916b6dd7f23b56090889 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [47:99:5e:63:9b:9b:21:a0:99:46:ac:a2:db:e2:96:c0:d4:16:ce:10] modulus: 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 public exponent: 10001 ] 2022-06-02 18:46:59.634 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 18:46:59.636 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 18:46:59.637 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:46:59.638 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 18:46:59.639 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 18:46:59.639 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 18:46:59.640 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 18:46:59.640 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 18:46:59.640 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 18:46:59.641 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 18:46:59.646 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 18:46:59.647 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:46:59.647 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:46:59.648 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:46:59.899 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 18:46:59.900 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 18:46:59.900 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 18:46:59.900 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:46:59.902 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 18:46:59.902 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 18:46:59.903 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:46:59.903 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:46:59.903 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:46:59.903 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:46:59.904 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:46:59.904 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:46:59.904 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:46:59.905 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:46:59.905 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:46:59.905 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 18:46:59.908 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:8c:c3:67:ee:68:d4:1e:55:4f:ff:3d:8a:fb:66:24:af:c2:f7:0f] modulus: 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 public exponent: 10001 ] 2022-06-02 18:55:25.634 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 18:55:25.638 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 18:55:25.641 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-02 18:55:25.643 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 18:55:25.644 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-02 18:55:25.644 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 18:55:25.645 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 18:55:25.645 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 18:55:25.646 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 18:55:25.647 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 18:55:25.656 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 18:55:25.657 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:55:25.658 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 18:55:25.658 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:55:25.936 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 18:55:25.937 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 18:55:25.937 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 18:55:25.937 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 18:55:25.940 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 18:55:25.940 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 18:55:25.941 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:55:25.941 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:55:25.941 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:55:25.942 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:55:25.942 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:55:25.943 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:55:25.944 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 18:55:25.944 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 18:55:25.944 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 18:55:25.945 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 18:55:25.950 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:42:b5:8c:d7:f5:f0:e7:4e:d8:f9:aa:51:75:05:b7:4f:05:13:b3] modulus: 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 public exponent: 10001 ] 2022-06-02 19:01:41.517 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 19:01:41.521 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 19:01:41.526 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-02 19:01:41.527 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 19:01:41.532 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-02 19:01:41.532 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 19:01:41.533 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 19:01:41.533 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 19:01:41.534 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 19:01:41.534 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 19:01:41.547 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 19:01:41.548 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 19:01:41.549 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 19:01:41.549 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 19:01:41.729 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 19:01:41.730 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 19:01:41.731 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 19:01:41.731 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 19:01:41.733 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 19:01:41.734 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 19:01:41.734 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 19:01:41.734 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 19:01:41.735 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 19:01:41.736 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 19:01:41.736 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 19:01:41.737 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 19:01:41.738 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 19:01:41.738 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 19:01:41.739 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 19:01:41.739 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 19:01:41.750 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [86:00:4e:9d:e8:80:f6:26:c1:8b:fb:c9:34:ee:bb:12:9e:ea:d1:fa] modulus: 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 public exponent: 10001 ] 2022-06-02 19:02:04.645 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-02 19:02:04.646 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-02 19:02:04.647 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-02 19:02:04.648 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 19:02:04.648 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-02 19:02:04.649 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-02 19:02:04.649 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-02 19:02:04.650 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-02 19:02:04.650 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-02 19:02:04.651 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-02 19:02:04.655 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-02 19:02:04.656 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 19:02:04.656 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-02 19:02:04.657 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 19:02:04.790 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-02 19:02:04.790 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-02 19:02:04.791 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-02 19:02:04.791 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 19:02:04.792 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-02 19:02:04.793 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-02 19:02:04.793 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 19:02:04.793 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 19:02:04.793 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 19:02:04.794 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 19:02:04.794 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 19:02:04.794 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 19:02:04.795 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 19:02:04.795 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-02 19:02:04.795 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-02 19:02:04.796 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 19:02:04.799 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 541869141140759781923878480251318253817978642597 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 15:12:19 UTC 2022 Final Date: Tue Jun 01 15:12:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b2:95:44:48:96:b3:8c:d4:59:d9:cf:74:78:9b:b5:34:b4:72:e1:42] modulus: 937f39724be3a15b53e0e41051d21b39a768bb5cc551022e61ce18d49d3021e310626098e582c8b9de0f5bd9b6fa1031c95d75b1a12f3e1c11a740579276f9f744538a810adfea515fb344105f59d05d58ad225a2de185ac905fcb67d6370902b0b1e003b54b565e9fa3d91765ba8ab6032e8ed1020ff72169cd20fad9ee1ba63aa3ef30df8be82546466b3adddf6be77575d35eed1952d6756a33a243268c4e1c6331d92da6704fbf0dbe85e68bf73cebed1e4217091b186d157f8d1eaf3269b1162ed1d127913e0b039031b55fbaf006791d6bd3d1c280a5ebeb4d33af176d25f5e62f320682af36adbd4d449598aa84644b2b120c2cb8566791d0b665907d2a51d20cb1e8c1b6523c532affeb231ab601acacdeaadbb7d3f5e708b557be4d29aa4ac4b07ddc7d9c4aa02896a38db87b812413153ebad4c6eb5d9251d0caa8a34ed099eee1bfb6e33207243ae3c522c2f2ccac8c97c813774dd1b65d5dac85a22cbb0fa6a63dbdd4880e6cfcb8e356c8398480ae14916b6dd7f23b56090889 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4d3aaddcece3a8a193f4322515f46b6ca07b190b e645cd695bbe0cde4f353c2536dc4a9ba8f69ab5 4cc27ae6aeaa243fd4eecdcf2dd77ca2739cca11 59f07ddf22ea2c5368e2e5d927d768de7ff397d0 a0be8c69df8bcfd6bbf2aa722af526858d175043 0432bd728a65ec5d7d1fdfd95d92d087f42a44fb 537c896ebbbb104b18c03238792e1924c9cd6165 d9d8ff198ad50921bd695a3c1b85211d0e3f5618 32867bec8bd4fafde93cdab7e5082b936bc4e3b4 cade6c5e08c8cf56b4b23cd9871343245ed395df 112b8c6e9b0db4459575082cfdec2c8690530a3e f9cd4baa26131dc7e28b33fc68d422c65b240dee d39a17f267019709c5d934462daf0203b0336eee 1882b6a34ce55770745def1eab8ddd96247abd16 b0cf47f87c6db3b205ade2e51533271f49f8f812 b8770f6cfb098ae17ead28d9cedccbb67d520b43 e1223fe4e66aa0e55a1d43e8b96e896994c206d8 bd6d843891fcf5623fb3435e2a08d4b36160b163 91e6a59d5869415c626263792dd8bba337bb75b6 c9302995 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [70:a1:77:80:a3:95:27:a5:0c:1e:eb:98:dc:30:37:e2:73:79:c6:cc] modulus: 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 public exponent: 10001 ]