2022-09-29 07:41:32,877 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-09-29 07:41:34,206 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-09-29 07:41:35.098  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Sep 29, 2022 7:41:37 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Sep 29, 2022 7:41:37 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Sep 29, 2022 7:41:37 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Sep 29, 2022 7:41:37 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-09-29 07:41:37.767 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-09-29 07:41:38.090  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-09-29 07:41:38.285  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-09-29 07:41:39.085 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-09-29 07:41:39.088 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-09-29 07:41:39.090 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-09-29 07:41:39.095 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-09-29 07:41:39.156 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-09-29 07:41:39.172 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-09-29 07:41:39.315 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-09-29 07:41:40.204 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Sep 29, 2022 7:41:41 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-09-29 07:41:41.329  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 9.471 seconds (JVM running for 11.813) Sep 29, 2022 7:42:02 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-09-29 07:42:20.611  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-29 07:42:20.619 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-29 07:42:20.672 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-09-29 07:42:20.686 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-29 07:42:20.707  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-09-29 07:42:20.710  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-29 07:42:20.711  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-29 07:42:20.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-29 07:42:20.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 07:42:20.716 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-29 07:42:20.722 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-29 07:42:20.726 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-29 07:42:20.778 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-29 07:42:20.784 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 07:42:20.785 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 07:42:20.788 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 07:42:21.474  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-29 07:42:21.478  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-29 07:42:21.479 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-29 07:42:21.481 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 07:42:21.497  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-29 07:42:21.499  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-29 07:42:21.500 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 07:42:21.501 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 07:42:21.502 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 07:42:21.521 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 07:42:21.522 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 07:42:21.522 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 07:42:21.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 07:42:21.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 07:42:21.529 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 07:42:21.531 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-29 07:42:21.566 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 147657153514016219317577921064520412949397535871 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 29 07:38:40 UTC 2022 Final Date: Tue Sep 28 07:38:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:66:c7:0b:62:90:9f:c9:78:5a:c4:b3:24:5a:e1:af:70:66:cd:7f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79a8572e4c3c18fad0c4f574579b8373296c26a0 a95357f4259cfdd19496dee226df9989ccce6443 5aca73edde66ec78fe3c33db71cefd3f9756c1bd 5659fce76d66d85059c7a383c2230fb5f4f58b2a 590277cbc02d362f57d37b33c3b67dc10df20098 4f26b76036a947283cda9bd7488c695a3a9bbfa3 ecedf711f448830a25ebabf8912b2859989a296c 2f90caf765e71f4addf72425dc9184121123427f 2f2f0579836044732738727bbed4209ce2c9d5cd 1593bafb39a4476cdfbe5c6b7fe5183672c4102c 99d95e15928af5def13ef2cea7a4655afd92b1ee fa5f6da2eb14d9936148282a6f45fd0a496b3735 940f75ce4f6fc73aa96455b3258e538c2cd7f794 bd268aff06def262fe1a18a439cd2d55a364645d 1403b81a3bd56dbcc7570f93d8ea45480b587595 026db63953d7aee74739bc1bab2d59a7a9575714 8457b6443994de997434fb8800621bc199e498e8 7bd03a2129062971f35a5a70e2cf860b5499efc5 42e33e306a350a576653313fc96fb76cc158d935 10f6bace Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:b9:19:cc:82:b2:cd:ca:cd:76:26:e6:12:4e:fd:a3:6a:25:40:ff] modulus: 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 public exponent: 10001 ] 2022-09-29 08:48:33.668  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-29 08:48:33.670 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-29 08:48:33.674 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-29 08:48:33.675 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-29 08:48:33.676  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-29 08:48:33.677  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-29 08:48:33.678  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-29 08:48:33.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-29 08:48:33.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-29 08:48:33.680 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-29 08:48:33.690 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-29 08:48:33.691 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 08:48:33.692 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 08:48:33.693 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 08:48:33.915  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-29 08:48:33.916  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-29 08:48:33.916 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-29 08:48:33.916 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 08:48:33.919  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-29 08:48:33.920  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-29 08:48:33.920 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 08:48:33.921 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 08:48:33.921 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 08:48:33.923 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 08:48:33.923 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 08:48:33.923 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 08:48:33.924 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 08:48:33.925 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 08:48:33.925 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 08:48:33.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-29 08:48:33.934 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 147657153514016219317577921064520412949397535871 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 29 07:38:40 UTC 2022 Final Date: Tue Sep 28 07:38:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:66:c7:0b:62:90:9f:c9:78:5a:c4:b3:24:5a:e1:af:70:66:cd:7f] modulus: ab2b6485b189c2a85ede1705d1fc4c483f8825ffb827bc1bd57c9e1c753aafc5debba7052472e3f805b8a9fa989c99a1b80b7acebcf77f39474a1fba48ea0900eede21898effcf0414d05e05bd1a37dd8676393875ecacff4f2cf16d43c031b1d7e88fe365c6cca4716e0f21b016b025fc68965668ba86f14b830621790acc0da1465bdc8e39f1daca737e860b3003ec617b70801212de9e4f603e6b44c63894d4dfeb47278f7cdf765bc0e4ad5d11a286a8e4e442c4ac909468125eb4952a92935c94ae81023b867a0fc7a05f7e6e56c910c8ec06934ca6560c3ed05d31f429f6a0290ea2353c83dbdbee0c460819d1134aa3438ff24d4f17eff31aa1646d5d3a6b72d37726adab0dfc60e6ae052b791650be52af21d4818880454f4a1322e616f027ec135af00c3fbeb4e478032148392d2490735b00d2acf927813723c1c2c541108b1b5d3787a2b3eb6071d68dbec6bfada3d751a100d09d7a0f60bcc62a9a1ceae586a1ad8dd8924eda5dfa247e8ab4e19a4c35e1e73181ab0a9be4354b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79a8572e4c3c18fad0c4f574579b8373296c26a0 a95357f4259cfdd19496dee226df9989ccce6443 5aca73edde66ec78fe3c33db71cefd3f9756c1bd 5659fce76d66d85059c7a383c2230fb5f4f58b2a 590277cbc02d362f57d37b33c3b67dc10df20098 4f26b76036a947283cda9bd7488c695a3a9bbfa3 ecedf711f448830a25ebabf8912b2859989a296c 2f90caf765e71f4addf72425dc9184121123427f 2f2f0579836044732738727bbed4209ce2c9d5cd 1593bafb39a4476cdfbe5c6b7fe5183672c4102c 99d95e15928af5def13ef2cea7a4655afd92b1ee fa5f6da2eb14d9936148282a6f45fd0a496b3735 940f75ce4f6fc73aa96455b3258e538c2cd7f794 bd268aff06def262fe1a18a439cd2d55a364645d 1403b81a3bd56dbcc7570f93d8ea45480b587595 026db63953d7aee74739bc1bab2d59a7a9575714 8457b6443994de997434fb8800621bc199e498e8 7bd03a2129062971f35a5a70e2cf860b5499efc5 42e33e306a350a576653313fc96fb76cc158d935 10f6bace Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [81:16:3f:b1:77:1b:b0:1a:b2:b3:b9:dd:7e:cc:b4:46:30:b5:c3:9c] modulus: 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 public exponent: 10001 ] 2022-09-29 08:50:21.845  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-29 08:50:21.846 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-29 08:50:21.848 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-09-29 08:50:21.849 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-29 08:50:21.849  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-09-29 08:50:21.850  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-29 08:50:21.851  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-29 08:50:21.851 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-29 08:50:21.852 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-29 08:50:21.853 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-29 08:50:21.861 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-29 08:50:21.862 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 08:50:21.863 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 08:50:21.863 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 08:50:22.057  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-29 08:50:22.058  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-29 08:50:22.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-29 08:50:22.059 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 08:50:22.061  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-29 08:50:22.061  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-29 08:50:22.062 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 08:50:22.062 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 08:50:22.063 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 08:50:22.064 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 08:50:22.064 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 08:50:22.065 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 08:50:22.066 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 08:50:22.066 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 08:50:22.066 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 08:50:22.068 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-29 08:50:22.074 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 147657153514016219317577921064520412949397535871 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 29 07:38:40 UTC 2022 Final Date: Tue Sep 28 07:38:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:66:c7:0b:62:90:9f:c9:78:5a:c4:b3:24:5a:e1:af:70:66:cd:7f] modulus: ab2b6485b189c2a85ede1705d1fc4c483f8825ffb827bc1bd57c9e1c753aafc5debba7052472e3f805b8a9fa989c99a1b80b7acebcf77f39474a1fba48ea0900eede21898effcf0414d05e05bd1a37dd8676393875ecacff4f2cf16d43c031b1d7e88fe365c6cca4716e0f21b016b025fc68965668ba86f14b830621790acc0da1465bdc8e39f1daca737e860b3003ec617b70801212de9e4f603e6b44c63894d4dfeb47278f7cdf765bc0e4ad5d11a286a8e4e442c4ac909468125eb4952a92935c94ae81023b867a0fc7a05f7e6e56c910c8ec06934ca6560c3ed05d31f429f6a0290ea2353c83dbdbee0c460819d1134aa3438ff24d4f17eff31aa1646d5d3a6b72d37726adab0dfc60e6ae052b791650be52af21d4818880454f4a1322e616f027ec135af00c3fbeb4e478032148392d2490735b00d2acf927813723c1c2c541108b1b5d3787a2b3eb6071d68dbec6bfada3d751a100d09d7a0f60bcc62a9a1ceae586a1ad8dd8924eda5dfa247e8ab4e19a4c35e1e73181ab0a9be4354b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79a8572e4c3c18fad0c4f574579b8373296c26a0 a95357f4259cfdd19496dee226df9989ccce6443 5aca73edde66ec78fe3c33db71cefd3f9756c1bd 5659fce76d66d85059c7a383c2230fb5f4f58b2a 590277cbc02d362f57d37b33c3b67dc10df20098 4f26b76036a947283cda9bd7488c695a3a9bbfa3 ecedf711f448830a25ebabf8912b2859989a296c 2f90caf765e71f4addf72425dc9184121123427f 2f2f0579836044732738727bbed4209ce2c9d5cd 1593bafb39a4476cdfbe5c6b7fe5183672c4102c 99d95e15928af5def13ef2cea7a4655afd92b1ee fa5f6da2eb14d9936148282a6f45fd0a496b3735 940f75ce4f6fc73aa96455b3258e538c2cd7f794 bd268aff06def262fe1a18a439cd2d55a364645d 1403b81a3bd56dbcc7570f93d8ea45480b587595 026db63953d7aee74739bc1bab2d59a7a9575714 8457b6443994de997434fb8800621bc199e498e8 7bd03a2129062971f35a5a70e2cf860b5499efc5 42e33e306a350a576653313fc96fb76cc158d935 10f6bace Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [70:1d:dd:d4:b2:1c:80:ce:00:b8:ba:7f:4b:b5:be:b4:5e:65:74:d8] modulus: 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 public exponent: 10001 ] 2022-09-29 08:51:37.235  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-29 08:51:37.238 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-29 08:51:37.243 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-09-29 08:51:37.244 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-29 08:51:37.249  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-09-29 08:51:37.250  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-29 08:51:37.250  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-29 08:51:37.251 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-29 08:51:37.251 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-29 08:51:37.251 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-29 08:51:37.257 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-29 08:51:37.258 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 08:51:37.259 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 08:51:37.259 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 08:51:37.420  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-29 08:51:37.421  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-29 08:51:37.422 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-29 08:51:37.423 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 08:51:37.427  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-29 08:51:37.428  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-29 08:51:37.429 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 08:51:37.429 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 08:51:37.429 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 08:51:37.430 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 08:51:37.431 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 08:51:37.431 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 08:51:37.432 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 08:51:37.433 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 08:51:37.433 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 08:51:37.434 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-29 08:51:37.444 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 147657153514016219317577921064520412949397535871 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 29 07:38:40 UTC 2022 Final Date: Tue Sep 28 07:38:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:66:c7:0b:62:90:9f:c9:78:5a:c4:b3:24:5a:e1:af:70:66:cd:7f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79a8572e4c3c18fad0c4f574579b8373296c26a0 a95357f4259cfdd19496dee226df9989ccce6443 5aca73edde66ec78fe3c33db71cefd3f9756c1bd 5659fce76d66d85059c7a383c2230fb5f4f58b2a 590277cbc02d362f57d37b33c3b67dc10df20098 4f26b76036a947283cda9bd7488c695a3a9bbfa3 ecedf711f448830a25ebabf8912b2859989a296c 2f90caf765e71f4addf72425dc9184121123427f 2f2f0579836044732738727bbed4209ce2c9d5cd 1593bafb39a4476cdfbe5c6b7fe5183672c4102c 99d95e15928af5def13ef2cea7a4655afd92b1ee fa5f6da2eb14d9936148282a6f45fd0a496b3735 940f75ce4f6fc73aa96455b3258e538c2cd7f794 bd268aff06def262fe1a18a439cd2d55a364645d 1403b81a3bd56dbcc7570f93d8ea45480b587595 026db63953d7aee74739bc1bab2d59a7a9575714 8457b6443994de997434fb8800621bc199e498e8 7bd03a2129062971f35a5a70e2cf860b5499efc5 42e33e306a350a576653313fc96fb76cc158d935 10f6bace Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [54:ce:29:c4:c1:d0:1f:fc:56:d3:f8:69:ef:f4:d1:e9:97:7a:06:86] modulus: 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 public exponent: 10001 ] 2022-09-29 08:53:39.421  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-29 08:53:39.422 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-29 08:53:39.424 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-29 08:53:39.425 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-29 08:53:39.425  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-29 08:53:39.426  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-29 08:53:39.426  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-29 08:53:39.427 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-29 08:53:39.427 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-29 08:53:39.427 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-29 08:53:39.432 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-29 08:53:39.432 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 08:53:39.433 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 08:53:39.433 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 08:53:39.635  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-29 08:53:39.636  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-29 08:53:39.636 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-29 08:53:39.636 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 08:53:39.638  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-29 08:53:39.639  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-29 08:53:39.639 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 08:53:39.640 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 08:53:39.640 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 08:53:39.641 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 08:53:39.641 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 08:53:39.641 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 08:53:39.642 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 08:53:39.643 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 08:53:39.643 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 08:53:39.644 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-29 08:53:39.655 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 147657153514016219317577921064520412949397535871 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 29 07:38:40 UTC 2022 Final Date: Tue Sep 28 07:38:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:66:c7:0b:62:90:9f:c9:78:5a:c4:b3:24:5a:e1:af:70:66:cd:7f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79a8572e4c3c18fad0c4f574579b8373296c26a0 a95357f4259cfdd19496dee226df9989ccce6443 5aca73edde66ec78fe3c33db71cefd3f9756c1bd 5659fce76d66d85059c7a383c2230fb5f4f58b2a 590277cbc02d362f57d37b33c3b67dc10df20098 4f26b76036a947283cda9bd7488c695a3a9bbfa3 ecedf711f448830a25ebabf8912b2859989a296c 2f90caf765e71f4addf72425dc9184121123427f 2f2f0579836044732738727bbed4209ce2c9d5cd 1593bafb39a4476cdfbe5c6b7fe5183672c4102c 99d95e15928af5def13ef2cea7a4655afd92b1ee fa5f6da2eb14d9936148282a6f45fd0a496b3735 940f75ce4f6fc73aa96455b3258e538c2cd7f794 bd268aff06def262fe1a18a439cd2d55a364645d 1403b81a3bd56dbcc7570f93d8ea45480b587595 026db63953d7aee74739bc1bab2d59a7a9575714 8457b6443994de997434fb8800621bc199e498e8 7bd03a2129062971f35a5a70e2cf860b5499efc5 42e33e306a350a576653313fc96fb76cc158d935 10f6bace Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [34:f5:79:2f:b6:57:e6:e8:30:42:fe:af:9c:14:96:62:8d:03:ca:33] modulus: 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 public exponent: 10001 ] 2022-09-29 08:59:17.628  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-29 08:59:17.632 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-29 08:59:17.634 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-29 08:59:17.634 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-29 08:59:17.635  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-29 08:59:17.636  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-29 08:59:17.636  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-29 08:59:17.636 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-29 08:59:17.637 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-29 08:59:17.637 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-29 08:59:17.644 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-29 08:59:17.646 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 08:59:17.646 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 08:59:17.646 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 08:59:17.776  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-29 08:59:17.777  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-29 08:59:17.778 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-29 08:59:17.778 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 08:59:17.780  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-29 08:59:17.781  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-29 08:59:17.781 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 08:59:17.781 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 08:59:17.782 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 08:59:17.784 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 08:59:17.785 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 08:59:17.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 08:59:17.789 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 08:59:17.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 08:59:17.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 08:59:17.793 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-29 08:59:17.798 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 147657153514016219317577921064520412949397535871 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 29 07:38:40 UTC 2022 Final Date: Tue Sep 28 07:38:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:66:c7:0b:62:90:9f:c9:78:5a:c4:b3:24:5a:e1:af:70:66:cd:7f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79a8572e4c3c18fad0c4f574579b8373296c26a0 a95357f4259cfdd19496dee226df9989ccce6443 5aca73edde66ec78fe3c33db71cefd3f9756c1bd 5659fce76d66d85059c7a383c2230fb5f4f58b2a 590277cbc02d362f57d37b33c3b67dc10df20098 4f26b76036a947283cda9bd7488c695a3a9bbfa3 ecedf711f448830a25ebabf8912b2859989a296c 2f90caf765e71f4addf72425dc9184121123427f 2f2f0579836044732738727bbed4209ce2c9d5cd 1593bafb39a4476cdfbe5c6b7fe5183672c4102c 99d95e15928af5def13ef2cea7a4655afd92b1ee fa5f6da2eb14d9936148282a6f45fd0a496b3735 940f75ce4f6fc73aa96455b3258e538c2cd7f794 bd268aff06def262fe1a18a439cd2d55a364645d 1403b81a3bd56dbcc7570f93d8ea45480b587595 026db63953d7aee74739bc1bab2d59a7a9575714 8457b6443994de997434fb8800621bc199e498e8 7bd03a2129062971f35a5a70e2cf860b5499efc5 42e33e306a350a576653313fc96fb76cc158d935 10f6bace Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [54:46:48:c9:ed:77:8b:94:be:77:07:78:69:3b:d5:42:d0:93:54:ad] modulus: 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 public exponent: 10001 ] 2022-09-29 09:03:45.488  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-29 09:03:45.491 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-29 09:03:45.494 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-29 09:03:45.495 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-29 09:03:45.496  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-29 09:03:45.496  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-29 09:03:45.497  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-29 09:03:45.498 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-29 09:03:45.498 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-29 09:03:45.499 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-29 09:03:45.504 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-29 09:03:45.505 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 09:03:45.506 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 09:03:45.506 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 09:03:45.693  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-29 09:03:45.694  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-29 09:03:45.695 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-29 09:03:45.695 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 09:03:45.697  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-29 09:03:45.698  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-29 09:03:45.698 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 09:03:45.699 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 09:03:45.699 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 09:03:45.700 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 09:03:45.700 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 09:03:45.701 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 09:03:45.702 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 09:03:45.703 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 09:03:45.703 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 09:03:45.704 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-29 09:03:45.709 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 147657153514016219317577921064520412949397535871 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 29 07:38:40 UTC 2022 Final Date: Tue Sep 28 07:38:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:66:c7:0b:62:90:9f:c9:78:5a:c4:b3:24:5a:e1:af:70:66:cd:7f] modulus: ab2b6485b189c2a85ede1705d1fc4c483f8825ffb827bc1bd57c9e1c753aafc5debba7052472e3f805b8a9fa989c99a1b80b7acebcf77f39474a1fba48ea0900eede21898effcf0414d05e05bd1a37dd8676393875ecacff4f2cf16d43c031b1d7e88fe365c6cca4716e0f21b016b025fc68965668ba86f14b830621790acc0da1465bdc8e39f1daca737e860b3003ec617b70801212de9e4f603e6b44c63894d4dfeb47278f7cdf765bc0e4ad5d11a286a8e4e442c4ac909468125eb4952a92935c94ae81023b867a0fc7a05f7e6e56c910c8ec06934ca6560c3ed05d31f429f6a0290ea2353c83dbdbee0c460819d1134aa3438ff24d4f17eff31aa1646d5d3a6b72d37726adab0dfc60e6ae052b791650be52af21d4818880454f4a1322e616f027ec135af00c3fbeb4e478032148392d2490735b00d2acf927813723c1c2c541108b1b5d3787a2b3eb6071d68dbec6bfada3d751a100d09d7a0f60bcc62a9a1ceae586a1ad8dd8924eda5dfa247e8ab4e19a4c35e1e73181ab0a9be4354b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79a8572e4c3c18fad0c4f574579b8373296c26a0 a95357f4259cfdd19496dee226df9989ccce6443 5aca73edde66ec78fe3c33db71cefd3f9756c1bd 5659fce76d66d85059c7a383c2230fb5f4f58b2a 590277cbc02d362f57d37b33c3b67dc10df20098 4f26b76036a947283cda9bd7488c695a3a9bbfa3 ecedf711f448830a25ebabf8912b2859989a296c 2f90caf765e71f4addf72425dc9184121123427f 2f2f0579836044732738727bbed4209ce2c9d5cd 1593bafb39a4476cdfbe5c6b7fe5183672c4102c 99d95e15928af5def13ef2cea7a4655afd92b1ee fa5f6da2eb14d9936148282a6f45fd0a496b3735 940f75ce4f6fc73aa96455b3258e538c2cd7f794 bd268aff06def262fe1a18a439cd2d55a364645d 1403b81a3bd56dbcc7570f93d8ea45480b587595 026db63953d7aee74739bc1bab2d59a7a9575714 8457b6443994de997434fb8800621bc199e498e8 7bd03a2129062971f35a5a70e2cf860b5499efc5 42e33e306a350a576653313fc96fb76cc158d935 10f6bace Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [57:3c:4d:86:db:11:bc:62:82:3c:03:1d:32:01:51:a0:e3:01:14:e8] modulus: cc1d7211ff401545ecee44e58e94e7b646982ab44e8f470bf4f7683e6c354c7d1157cf782f41b1bdd7da3963c1126a24d8bf561f7ff36abb4251721e03460ece344a59e64dc8547c83e7bf3916eefc95ebc59254471fe6a6bf014390b695b065fc70c8bd0bcb708acd57406a2febdab4d5faaf2ba7f211682111053385fde5452f9046e29833455f90bf45cc637802f3c045dfd09af4690f0f2459fcf8249a3caa7c4fd4c1c32d1e1512d66c23de411aae0812c6270aefce70759abc1ec98eb254f109f6a01a8729628062bd1034463e9841d0cf982224e5a1eb14afee826b72791d162a8dc6c2a090f1d8595df70e675a1b76901982f18098e40d5d2c67c037 public exponent: 10001 ] 2022-09-29 09:09:33.255  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-29 09:09:33.258 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-29 09:09:33.261 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-09-29 09:09:33.263 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-29 09:09:33.264  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-09-29 09:09:33.264  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-29 09:09:33.265  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-29 09:09:33.265 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-29 09:09:33.265 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-29 09:09:33.266 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-29 09:09:33.274 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-29 09:09:33.274 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 09:09:33.275 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 09:09:33.275 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 09:09:33.479  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-29 09:09:33.480  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-29 09:09:33.480 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-29 09:09:33.481 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 09:09:33.482  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-29 09:09:33.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-29 09:09:33.483 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 09:09:33.483 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 09:09:33.483 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 09:09:33.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 09:09:33.485 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 09:09:33.485 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 09:09:33.486 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 09:09:33.486 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 09:09:33.486 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 09:09:33.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-29 09:09:33.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 147657153514016219317577921064520412949397535871 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 29 07:38:40 UTC 2022 Final Date: Tue Sep 28 07:38:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:66:c7:0b:62:90:9f:c9:78:5a:c4:b3:24:5a:e1:af:70:66:cd:7f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79a8572e4c3c18fad0c4f574579b8373296c26a0 a95357f4259cfdd19496dee226df9989ccce6443 5aca73edde66ec78fe3c33db71cefd3f9756c1bd 5659fce76d66d85059c7a383c2230fb5f4f58b2a 590277cbc02d362f57d37b33c3b67dc10df20098 4f26b76036a947283cda9bd7488c695a3a9bbfa3 ecedf711f448830a25ebabf8912b2859989a296c 2f90caf765e71f4addf72425dc9184121123427f 2f2f0579836044732738727bbed4209ce2c9d5cd 1593bafb39a4476cdfbe5c6b7fe5183672c4102c 99d95e15928af5def13ef2cea7a4655afd92b1ee fa5f6da2eb14d9936148282a6f45fd0a496b3735 940f75ce4f6fc73aa96455b3258e538c2cd7f794 bd268aff06def262fe1a18a439cd2d55a364645d 1403b81a3bd56dbcc7570f93d8ea45480b587595 026db63953d7aee74739bc1bab2d59a7a9575714 8457b6443994de997434fb8800621bc199e498e8 7bd03a2129062971f35a5a70e2cf860b5499efc5 42e33e306a350a576653313fc96fb76cc158d935 10f6bace Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cb:57:54:ab:f6:e5:45:de:64:f7:f3:ce:4b:95:db:b5:8c:6c:73:e5] modulus: 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 public exponent: 10001 ] 2022-09-29 09:14:19.146  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-29 09:14:19.148 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-29 09:14:19.150 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-29 09:14:19.151 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-29 09:14:19.152  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-29 09:14:19.152  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-29 09:14:19.153  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-29 09:14:19.153 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-29 09:14:19.154 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-29 09:14:19.154 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-29 09:14:19.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-29 09:14:19.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 09:14:19.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 09:14:19.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 09:14:19.317  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-29 09:14:19.318  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-29 09:14:19.318 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-29 09:14:19.318 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 09:14:19.320  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-29 09:14:19.320  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-29 09:14:19.321 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 09:14:19.321 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 09:14:19.321 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 09:14:19.323 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 09:14:19.326 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 09:14:19.326 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 09:14:19.327 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 09:14:19.328 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 09:14:19.328 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 09:14:19.329 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-29 09:14:19.332 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 147657153514016219317577921064520412949397535871 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 29 07:38:40 UTC 2022 Final Date: Tue Sep 28 07:38:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:66:c7:0b:62:90:9f:c9:78:5a:c4:b3:24:5a:e1:af:70:66:cd:7f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79a8572e4c3c18fad0c4f574579b8373296c26a0 a95357f4259cfdd19496dee226df9989ccce6443 5aca73edde66ec78fe3c33db71cefd3f9756c1bd 5659fce76d66d85059c7a383c2230fb5f4f58b2a 590277cbc02d362f57d37b33c3b67dc10df20098 4f26b76036a947283cda9bd7488c695a3a9bbfa3 ecedf711f448830a25ebabf8912b2859989a296c 2f90caf765e71f4addf72425dc9184121123427f 2f2f0579836044732738727bbed4209ce2c9d5cd 1593bafb39a4476cdfbe5c6b7fe5183672c4102c 99d95e15928af5def13ef2cea7a4655afd92b1ee fa5f6da2eb14d9936148282a6f45fd0a496b3735 940f75ce4f6fc73aa96455b3258e538c2cd7f794 bd268aff06def262fe1a18a439cd2d55a364645d 1403b81a3bd56dbcc7570f93d8ea45480b587595 026db63953d7aee74739bc1bab2d59a7a9575714 8457b6443994de997434fb8800621bc199e498e8 7bd03a2129062971f35a5a70e2cf860b5499efc5 42e33e306a350a576653313fc96fb76cc158d935 10f6bace Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [57:10:c0:3f:ea:6d:c6:2c:b6:d7:8e:ea:b1:08:e6:25:88:7d:21:37] modulus: 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 public exponent: 10001 ] 2022-09-29 09:14:38.343  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-29 09:14:38.345 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-29 09:14:38.346 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-29 09:14:38.347 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-29 09:14:38.347  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-29 09:14:38.348  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-29 09:14:38.348  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-29 09:14:38.348 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-29 09:14:38.349 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-29 09:14:38.349 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-29 09:14:38.354 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-29 09:14:38.355 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 09:14:38.355 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-29 09:14:38.356 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 09:14:38.523  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-29 09:14:38.524  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-29 09:14:38.524 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-29 09:14:38.524 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-29 09:14:38.526  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-29 09:14:38.526  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-29 09:14:38.527 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 09:14:38.527 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 09:14:38.527 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 09:14:38.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 09:14:38.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 09:14:38.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 09:14:38.529 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-29 09:14:38.529 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-29 09:14:38.529 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-29 09:14:38.530 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-29 09:14:38.534 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 147657153514016219317577921064520412949397535871 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 29 07:38:40 UTC 2022 Final Date: Tue Sep 28 07:38:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e4:66:c7:0b:62:90:9f:c9:78:5a:c4:b3:24:5a:e1:af:70:66:cd:7f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79a8572e4c3c18fad0c4f574579b8373296c26a0 a95357f4259cfdd19496dee226df9989ccce6443 5aca73edde66ec78fe3c33db71cefd3f9756c1bd 5659fce76d66d85059c7a383c2230fb5f4f58b2a 590277cbc02d362f57d37b33c3b67dc10df20098 4f26b76036a947283cda9bd7488c695a3a9bbfa3 ecedf711f448830a25ebabf8912b2859989a296c 2f90caf765e71f4addf72425dc9184121123427f 2f2f0579836044732738727bbed4209ce2c9d5cd 1593bafb39a4476cdfbe5c6b7fe5183672c4102c 99d95e15928af5def13ef2cea7a4655afd92b1ee fa5f6da2eb14d9936148282a6f45fd0a496b3735 940f75ce4f6fc73aa96455b3258e538c2cd7f794 bd268aff06def262fe1a18a439cd2d55a364645d 1403b81a3bd56dbcc7570f93d8ea45480b587595 026db63953d7aee74739bc1bab2d59a7a9575714 8457b6443994de997434fb8800621bc199e498e8 7bd03a2129062971f35a5a70e2cf860b5499efc5 42e33e306a350a576653313fc96fb76cc158d935 10f6bace Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cc:da:39:32:d2:07:01:9d:b9:b2:33:cb:33:fb:6a:19:77:7f:67:07] modulus: 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 public exponent: 10001 ]