By type
2022-12-01 13:58:14,890 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-12-01 13:58:16,362 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-12-01 13:58:17.309 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Dec 01, 2022 1:58:19 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Dec 01, 2022 1:58:19 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Dec 01, 2022 1:58:19 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Dec 01, 2022 1:58:19 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-12-01 13:58:20.472 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-12-01 13:58:20.847 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-12-01 13:58:21.055 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-12-01 13:58:21.942 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-12-01 13:58:21.947 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-12-01 13:58:21.951 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-12-01 13:58:21.957 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-12-01 13:58:22.011 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-12-01 13:58:22.016 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-12-01 13:58:22.196 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-12-01 13:58:23.103 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Dec 01, 2022 1:58:24 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-12-01 13:58:24.430 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 10.69 seconds (JVM running for 13.21) Dec 01, 2022 1:58:45 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-12-01 13:59:10.924 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 13:59:10.933 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 13:59:10.985 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-01 13:59:10.990 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 13:59:11.013 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-01 13:59:11.017 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 13:59:11.018 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 13:59:11.020 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 13:59:11.021 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 13:59:11.025 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 13:59:11.035 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 13:59:11.040 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 13:59:11.098 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 13:59:11.104 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 13:59:11.104 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 13:59:11.108 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 13:59:11.773 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 13:59:11.776 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 13:59:11.776 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 13:59:11.778 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 13:59:11.788 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 13:59:11.789 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 13:59:11.790 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 13:59:11.791 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 13:59:11.791 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 13:59:11.809 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 13:59:11.810 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 13:59:11.810 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 13:59:11.817 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 13:59:11.818 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 13:59:11.819 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 13:59:11.820 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 13:59:11.861 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 304823919416764381094918298569502862175302447872 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 13:51:31 UTC 2022 Final Date: Tue Nov 30 13:51:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [aa:e3:4d:5f:b9:3e:11:e6:f3:99:76:f9:dc:94:2d:2b:5c:2a:db:7a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36c8ad189c7976faea4a7ff3cdbd5df1c301615 908c431341907bacad1df1e6bcf180194839c94d 27df4d9c3d47321758f661f19c29ce957ec7dba4 dd06c7be8538c6ea05372f5ed7122a31fc051d2b 39182811e6cf5edf2b4379b4360b0db405f4a685 076804603a4780e1c82d5fdea91cfd8e8e3e70fc 2da279e8e63aa2962c6e119c7339123c9d86bfaa 062b7553801c9d70e33de40ca9518079c08e2a4e 564e38b6e032a28d2af96545f50aee8755abf150 578b47e6b1a8395fba2c1e5656f57db35bb33b0c eb1b4981ca21b06fa94c63821aecf4b93f3b8bba 97ba6abfbb9bb0cb32468c81090bf7befab82888 8c01efe8646debb59c8115f797ad37d32d527bac 1ed8abb6ab2817afa1a5a7f100b5fc07d0a64f46 b98c955c3552242ac24097b96dc6982b13b13998 66437a630f2115425d178ed01314f183364c5a85 20f7be75c1dd4ad97a503deea6f9e54dd4e993c5 559083e8ecaaaaadb1fda1418a4821ae480110c2 104be067d23eb6cd98498059762c807240019b39 943df908 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0d:5a:7a:2c:78:48:a3:a3:f6:c4:03:f1:28:1a:95:53:2a:be:90:c4],[56:66:d1:a4] modulus: c85fba1b164c05b8e007534aa5072cff81809e89ef54f153093b2209067ed4f9c218ee1e84639ffe57eff1c3f6ef68a618cb6b8487444f327cd8d1dca10ecd9a697d642225c1c9b6734ff186897e3cbd1cdb5c5d19bf2b860e49c5948c2d9a87c8d197f02e88419ea137d5e5d152c2b617ce256b9b134193e4d93fcf3d120cf7fdf2be644e81bdb1b1a5f14fd264bc6800607e7d98a4896fdefd520480f3386f71f5d78b0c155ca4f6e48f6bf3855fa89dbe4ee71f8ead974f2cff22be4e880118aa69c0f97ef767a030e4e803847bd7040ff97420ed2c3b7b4fe13e9880a4eac3826bd1ca2039f1e72f29a4344dca599864ee558adbb610c53b5dba9518c60f public exponent: 10001 ] 2022-12-01 15:56:16.051 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 15:56:16.054 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 15:56:16.059 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 15:56:16.061 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 15:56:16.062 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 15:56:16.063 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 15:56:16.063 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 15:56:16.064 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 15:56:16.065 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 15:56:16.065 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 15:56:16.072 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 15:56:16.074 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 15:56:16.076 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 15:56:16.076 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 15:56:16.420 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 15:56:16.421 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 15:56:16.422 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 15:56:16.422 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 15:56:16.425 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 15:56:16.425 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 15:56:16.426 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 15:56:16.426 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 15:56:16.427 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 15:56:16.428 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 15:56:16.428 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 15:56:16.428 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 15:56:16.429 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 15:56:16.430 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 15:56:16.430 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 15:56:16.431 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 15:56:16.441 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 304823919416764381094918298569502862175302447872 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 13:51:31 UTC 2022 Final Date: Tue Nov 30 13:51:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [aa:e3:4d:5f:b9:3e:11:e6:f3:99:76:f9:dc:94:2d:2b:5c:2a:db:7a],[56:66:d1:a4] modulus: afdf982427dab2a19a022237b26b03e4d7649199d6ec1f76e716d182966b3fd642f036043f0d35accc86457cccd2ae9d9cf58d97ba1909c53cef464f8b464ed900c36ca49eaa50b24b63853e5822567786634d902703b258c643fd7dce8f8760d3441c1c8bc821fea6bc47c93b895199375f8d7b678c6aa41eb7a631fbd74c2a71aac509b828e6004d7749de91e4911bdddd3ffcb95b52d151751b6aa29e976b3de294fcce5e339de2ccdd68fd7edcba0cc0a0d9d6b5842700fc7b33dd0843b0cf7f32a8e2638667008e7848a82173b68aaad21e6e177d2236e9e2c81feb160a586fd07878382821a1c36d5c705645768714d2a752a27a0d6f79df71656766ca4605e6395ac1988c486e3327e745427dbcb9ccbdc0017e2325fe3f40e85b551689d08e7d2cf79fdcbb553ad72d71cd8e6beb3f08122d0e555261c9253563fcb4c2dd5e90e02f9e5188990b2c1a00c4141cae7ba2bc70f6bf0ea6c541bc37d6874d3a91c3700ea6a4ca7212a7d2d4a8cd8e2520b756c271d15ba0b0921506a829 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36c8ad189c7976faea4a7ff3cdbd5df1c301615 908c431341907bacad1df1e6bcf180194839c94d 27df4d9c3d47321758f661f19c29ce957ec7dba4 dd06c7be8538c6ea05372f5ed7122a31fc051d2b 39182811e6cf5edf2b4379b4360b0db405f4a685 076804603a4780e1c82d5fdea91cfd8e8e3e70fc 2da279e8e63aa2962c6e119c7339123c9d86bfaa 062b7553801c9d70e33de40ca9518079c08e2a4e 564e38b6e032a28d2af96545f50aee8755abf150 578b47e6b1a8395fba2c1e5656f57db35bb33b0c eb1b4981ca21b06fa94c63821aecf4b93f3b8bba 97ba6abfbb9bb0cb32468c81090bf7befab82888 8c01efe8646debb59c8115f797ad37d32d527bac 1ed8abb6ab2817afa1a5a7f100b5fc07d0a64f46 b98c955c3552242ac24097b96dc6982b13b13998 66437a630f2115425d178ed01314f183364c5a85 20f7be75c1dd4ad97a503deea6f9e54dd4e993c5 559083e8ecaaaaadb1fda1418a4821ae480110c2 104be067d23eb6cd98498059762c807240019b39 943df908 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4b:6c:30:c1:3c:a1:54:0e:6e:6b:98:57:29:4d:c7:54:4a:05:2e:47],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-01 15:57:58.400 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 15:57:58.402 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 15:57:58.405 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-01 15:57:58.406 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 15:57:58.406 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-01 15:57:58.407 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 15:57:58.408 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 15:57:58.408 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 15:57:58.409 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 15:57:58.409 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 15:57:58.416 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 15:57:58.417 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 15:57:58.417 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 15:57:58.418 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 15:57:58.580 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 15:57:58.581 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 15:57:58.582 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 15:57:58.582 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 15:57:58.586 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 15:57:58.587 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 15:57:58.587 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 15:57:58.587 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 15:57:58.588 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 15:57:58.589 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 15:57:58.589 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 15:57:58.589 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 15:57:58.590 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 15:57:58.591 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 15:57:58.591 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 15:57:58.594 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 15:57:58.601 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 304823919416764381094918298569502862175302447872 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 13:51:31 UTC 2022 Final Date: Tue Nov 30 13:51:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [aa:e3:4d:5f:b9:3e:11:e6:f3:99:76:f9:dc:94:2d:2b:5c:2a:db:7a],[56:66:d1:a4] modulus: afdf982427dab2a19a022237b26b03e4d7649199d6ec1f76e716d182966b3fd642f036043f0d35accc86457cccd2ae9d9cf58d97ba1909c53cef464f8b464ed900c36ca49eaa50b24b63853e5822567786634d902703b258c643fd7dce8f8760d3441c1c8bc821fea6bc47c93b895199375f8d7b678c6aa41eb7a631fbd74c2a71aac509b828e6004d7749de91e4911bdddd3ffcb95b52d151751b6aa29e976b3de294fcce5e339de2ccdd68fd7edcba0cc0a0d9d6b5842700fc7b33dd0843b0cf7f32a8e2638667008e7848a82173b68aaad21e6e177d2236e9e2c81feb160a586fd07878382821a1c36d5c705645768714d2a752a27a0d6f79df71656766ca4605e6395ac1988c486e3327e745427dbcb9ccbdc0017e2325fe3f40e85b551689d08e7d2cf79fdcbb553ad72d71cd8e6beb3f08122d0e555261c9253563fcb4c2dd5e90e02f9e5188990b2c1a00c4141cae7ba2bc70f6bf0ea6c541bc37d6874d3a91c3700ea6a4ca7212a7d2d4a8cd8e2520b756c271d15ba0b0921506a829 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36c8ad189c7976faea4a7ff3cdbd5df1c301615 908c431341907bacad1df1e6bcf180194839c94d 27df4d9c3d47321758f661f19c29ce957ec7dba4 dd06c7be8538c6ea05372f5ed7122a31fc051d2b 39182811e6cf5edf2b4379b4360b0db405f4a685 076804603a4780e1c82d5fdea91cfd8e8e3e70fc 2da279e8e63aa2962c6e119c7339123c9d86bfaa 062b7553801c9d70e33de40ca9518079c08e2a4e 564e38b6e032a28d2af96545f50aee8755abf150 578b47e6b1a8395fba2c1e5656f57db35bb33b0c eb1b4981ca21b06fa94c63821aecf4b93f3b8bba 97ba6abfbb9bb0cb32468c81090bf7befab82888 8c01efe8646debb59c8115f797ad37d32d527bac 1ed8abb6ab2817afa1a5a7f100b5fc07d0a64f46 b98c955c3552242ac24097b96dc6982b13b13998 66437a630f2115425d178ed01314f183364c5a85 20f7be75c1dd4ad97a503deea6f9e54dd4e993c5 559083e8ecaaaaadb1fda1418a4821ae480110c2 104be067d23eb6cd98498059762c807240019b39 943df908 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6f:e4:f4:89:25:1a:1a:4c:42:17:44:3d:69:fe:c1:43:b1:b0:d9:df],[56:66:d1:a4] modulus: d104c93bc9d1bacd00b07134e2403591169331a3fe208c9ca10e4a05ca4655dad5071a06ac3676f80563935fb811178d8744e6e8a11a841359f48ad6924616f54265f02ea8fe6422bec034adee3a3ee842d22be36b4ed2d3f15446294cfefeadb1f12a6b8370009c5d7cf9e3bb4d6923c5c45e38a00063ba8bacf8b285da93e445a2f344039a4007e70068fb1697fe84410a9e23d180f206f04b0c98de2b7c21354e857ec196548b892c146a266b1e38ba027556440e6a3dcdfa892bbef7d9154229485932335ddff9b7c5cbbccc211f36f997f8741772c10a36a537d381cff431f879c72910a32a333b01f0dcbea712a46e2f60de89368a5abb3afcef35a901 public exponent: 10001 ] 2022-12-01 15:59:54.836 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 15:59:54.847 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 15:59:54.849 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-01 15:59:54.855 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 15:59:54.856 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-01 15:59:54.857 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 15:59:54.858 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 15:59:54.858 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 15:59:54.859 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 15:59:54.859 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 15:59:54.869 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 15:59:54.870 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 15:59:54.870 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 15:59:54.870 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 15:59:55.109 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 15:59:55.110 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 15:59:55.111 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 15:59:55.111 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 15:59:55.114 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 15:59:55.114 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 15:59:55.115 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 15:59:55.116 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 15:59:55.117 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 15:59:55.118 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 15:59:55.119 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 15:59:55.119 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 15:59:55.121 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 15:59:55.124 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 15:59:55.125 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 15:59:55.127 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 15:59:55.134 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 304823919416764381094918298569502862175302447872 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 13:51:31 UTC 2022 Final Date: Tue Nov 30 13:51:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [aa:e3:4d:5f:b9:3e:11:e6:f3:99:76:f9:dc:94:2d:2b:5c:2a:db:7a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36c8ad189c7976faea4a7ff3cdbd5df1c301615 908c431341907bacad1df1e6bcf180194839c94d 27df4d9c3d47321758f661f19c29ce957ec7dba4 dd06c7be8538c6ea05372f5ed7122a31fc051d2b 39182811e6cf5edf2b4379b4360b0db405f4a685 076804603a4780e1c82d5fdea91cfd8e8e3e70fc 2da279e8e63aa2962c6e119c7339123c9d86bfaa 062b7553801c9d70e33de40ca9518079c08e2a4e 564e38b6e032a28d2af96545f50aee8755abf150 578b47e6b1a8395fba2c1e5656f57db35bb33b0c eb1b4981ca21b06fa94c63821aecf4b93f3b8bba 97ba6abfbb9bb0cb32468c81090bf7befab82888 8c01efe8646debb59c8115f797ad37d32d527bac 1ed8abb6ab2817afa1a5a7f100b5fc07d0a64f46 b98c955c3552242ac24097b96dc6982b13b13998 66437a630f2115425d178ed01314f183364c5a85 20f7be75c1dd4ad97a503deea6f9e54dd4e993c5 559083e8ecaaaaadb1fda1418a4821ae480110c2 104be067d23eb6cd98498059762c807240019b39 943df908 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f1:40:25:7b:40:f6:f0:d5:af:60:07:0d:9c:52:45:44:b4:8b:70:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-01 16:04:01.542 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 16:04:01.545 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 16:04:01.550 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 16:04:01.551 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 16:04:01.552 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 16:04:01.553 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 16:04:01.554 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 16:04:01.556 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 16:04:01.556 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 16:04:01.557 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 16:04:01.563 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 16:04:01.565 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 16:04:01.565 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 16:04:01.566 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 16:04:01.846 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 16:04:01.847 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 16:04:01.847 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 16:04:01.848 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 16:04:01.850 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 16:04:01.852 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 16:04:01.853 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:04:01.854 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:04:01.854 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:04:01.856 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:04:01.856 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:04:01.860 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:04:01.862 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:04:01.863 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:04:01.863 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:04:01.865 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 16:04:01.869 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 304823919416764381094918298569502862175302447872 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 13:51:31 UTC 2022 Final Date: Tue Nov 30 13:51:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [aa:e3:4d:5f:b9:3e:11:e6:f3:99:76:f9:dc:94:2d:2b:5c:2a:db:7a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36c8ad189c7976faea4a7ff3cdbd5df1c301615 908c431341907bacad1df1e6bcf180194839c94d 27df4d9c3d47321758f661f19c29ce957ec7dba4 dd06c7be8538c6ea05372f5ed7122a31fc051d2b 39182811e6cf5edf2b4379b4360b0db405f4a685 076804603a4780e1c82d5fdea91cfd8e8e3e70fc 2da279e8e63aa2962c6e119c7339123c9d86bfaa 062b7553801c9d70e33de40ca9518079c08e2a4e 564e38b6e032a28d2af96545f50aee8755abf150 578b47e6b1a8395fba2c1e5656f57db35bb33b0c eb1b4981ca21b06fa94c63821aecf4b93f3b8bba 97ba6abfbb9bb0cb32468c81090bf7befab82888 8c01efe8646debb59c8115f797ad37d32d527bac 1ed8abb6ab2817afa1a5a7f100b5fc07d0a64f46 b98c955c3552242ac24097b96dc6982b13b13998 66437a630f2115425d178ed01314f183364c5a85 20f7be75c1dd4ad97a503deea6f9e54dd4e993c5 559083e8ecaaaaadb1fda1418a4821ae480110c2 104be067d23eb6cd98498059762c807240019b39 943df908 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [88:fe:33:e0:35:29:6c:70:47:11:cc:34:9a:c9:6f:14:93:b5:a9:b8],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-01 16:10:49.054 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 16:10:49.059 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 16:10:49.061 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 16:10:49.071 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 16:10:49.072 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 16:10:49.073 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 16:10:49.073 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 16:10:49.073 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 16:10:49.074 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 16:10:49.074 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 16:10:49.082 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 16:10:49.083 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 16:10:49.084 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 16:10:49.084 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 16:10:49.257 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 16:10:49.259 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 16:10:49.259 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 16:10:49.260 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 16:10:49.262 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 16:10:49.262 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 16:10:49.263 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:10:49.263 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:10:49.263 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:10:49.264 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:10:49.265 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:10:49.265 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:10:49.266 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:10:49.266 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:10:49.266 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:10:49.267 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 16:10:49.270 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 304823919416764381094918298569502862175302447872 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 13:51:31 UTC 2022 Final Date: Tue Nov 30 13:51:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [aa:e3:4d:5f:b9:3e:11:e6:f3:99:76:f9:dc:94:2d:2b:5c:2a:db:7a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36c8ad189c7976faea4a7ff3cdbd5df1c301615 908c431341907bacad1df1e6bcf180194839c94d 27df4d9c3d47321758f661f19c29ce957ec7dba4 dd06c7be8538c6ea05372f5ed7122a31fc051d2b 39182811e6cf5edf2b4379b4360b0db405f4a685 076804603a4780e1c82d5fdea91cfd8e8e3e70fc 2da279e8e63aa2962c6e119c7339123c9d86bfaa 062b7553801c9d70e33de40ca9518079c08e2a4e 564e38b6e032a28d2af96545f50aee8755abf150 578b47e6b1a8395fba2c1e5656f57db35bb33b0c eb1b4981ca21b06fa94c63821aecf4b93f3b8bba 97ba6abfbb9bb0cb32468c81090bf7befab82888 8c01efe8646debb59c8115f797ad37d32d527bac 1ed8abb6ab2817afa1a5a7f100b5fc07d0a64f46 b98c955c3552242ac24097b96dc6982b13b13998 66437a630f2115425d178ed01314f183364c5a85 20f7be75c1dd4ad97a503deea6f9e54dd4e993c5 559083e8ecaaaaadb1fda1418a4821ae480110c2 104be067d23eb6cd98498059762c807240019b39 943df908 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [65:d2:fb:16:9e:27:d9:bb:4e:71:52:f6:d1:23:54:b8:1e:79:e2:4e],[56:66:d1:a4] modulus: ad748aaf63df920ef15e870c9e6f5ecf10307b59e3f1a6958afece606b63dea9e74a221de69f5b72284b25d40116f2695a879e9823d31fb2cf9ce6e2255de47262990d496eb286ffccf21b764f1f8c5b1b724b3be5227c4560c6b2324c055aed6f897e2fd0052f0b13e0ab6f3cc9079722ecbd45f6bd115c43d3fd9db299841f8d723400a3c8a49fd6effcaa7905fe2aa87c386092fa8672df2d499477e0da9a1fb13add52181e97295893a15d8492d7608ee5894b102649c35c28653287416816f359f94ac5ac00dd0f2e865049fa64df023008c1be26d14f5f71ed0daf7f42b383bb9ad994044464babb1e856b58deffbb69989e9044eb3c7d24eab9fdc3a7 public exponent: 10001 ] 2022-12-01 16:16:37.835 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 16:16:37.839 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 16:16:37.843 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 16:16:37.844 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 16:16:37.845 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 16:16:37.846 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 16:16:37.847 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 16:16:37.848 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 16:16:37.848 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 16:16:37.849 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 16:16:37.855 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 16:16:37.857 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 16:16:37.857 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 16:16:37.858 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 16:16:38.080 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 16:16:38.081 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 16:16:38.082 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 16:16:38.083 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 16:16:38.085 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 16:16:38.086 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 16:16:38.087 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:16:38.087 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:16:38.088 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:16:38.089 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:16:38.090 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:16:38.090 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:16:38.092 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:16:38.092 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:16:38.093 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:16:38.094 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 16:16:38.099 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 304823919416764381094918298569502862175302447872 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 13:51:31 UTC 2022 Final Date: Tue Nov 30 13:51:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [aa:e3:4d:5f:b9:3e:11:e6:f3:99:76:f9:dc:94:2d:2b:5c:2a:db:7a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36c8ad189c7976faea4a7ff3cdbd5df1c301615 908c431341907bacad1df1e6bcf180194839c94d 27df4d9c3d47321758f661f19c29ce957ec7dba4 dd06c7be8538c6ea05372f5ed7122a31fc051d2b 39182811e6cf5edf2b4379b4360b0db405f4a685 076804603a4780e1c82d5fdea91cfd8e8e3e70fc 2da279e8e63aa2962c6e119c7339123c9d86bfaa 062b7553801c9d70e33de40ca9518079c08e2a4e 564e38b6e032a28d2af96545f50aee8755abf150 578b47e6b1a8395fba2c1e5656f57db35bb33b0c eb1b4981ca21b06fa94c63821aecf4b93f3b8bba 97ba6abfbb9bb0cb32468c81090bf7befab82888 8c01efe8646debb59c8115f797ad37d32d527bac 1ed8abb6ab2817afa1a5a7f100b5fc07d0a64f46 b98c955c3552242ac24097b96dc6982b13b13998 66437a630f2115425d178ed01314f183364c5a85 20f7be75c1dd4ad97a503deea6f9e54dd4e993c5 559083e8ecaaaaadb1fda1418a4821ae480110c2 104be067d23eb6cd98498059762c807240019b39 943df908 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [56:5a:2c:e9:41:a0:54:19:a4:3f:e2:e0:0a:05:82:8c:55:df:91:49],[56:66:d1:a4] modulus: d89cb49881bc490cbf48e24efd4db8750063fb45815d0053826bb7a3e73e88d4b0a13bfd58497edd62af1a7f0f319b03df7ed446a1b576a42df3b61a59fc40dac7a957fcb3ad3ba6102ce7fa76f248a0101b8289dafdba2de1688c6605770f27b921ed4aa84d3d64253d8f800b98f6161833896faa3250b30777bf961794cedd7ab746a4979f9829ded379653b0948483719abfa3acc1a9b77aea006ef0d4a84c1a230845d4ea697a90f1d9d1b03d8aacaf68333dde01444e1c39b465abaf702c67cfd9aed983fb3e2efe905bf596d0232455f818b547c586777244e4d444fe1009cecc7cbb5fc31b415656426ffccdbd199a4ad91718a70c9ffaef5a2f6269f public exponent: 10001 ] 2022-12-01 16:23:25.051 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 16:23:25.060 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 16:23:25.066 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 16:23:25.085 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 16:23:25.086 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 16:23:25.087 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 16:23:25.088 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 16:23:25.089 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 16:23:25.090 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 16:23:25.096 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 16:23:25.103 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 16:23:25.105 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 16:23:25.105 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 16:23:25.106 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 16:23:25.291 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 16:23:25.292 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 16:23:25.293 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 16:23:25.293 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 16:23:25.294 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 16:23:25.295 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 16:23:25.296 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:23:25.298 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:23:25.299 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:23:25.300 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:23:25.300 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:23:25.300 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:23:25.301 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:23:25.302 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:23:25.302 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:23:25.310 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 16:23:25.316 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 304823919416764381094918298569502862175302447872 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 13:51:31 UTC 2022 Final Date: Tue Nov 30 13:51:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [aa:e3:4d:5f:b9:3e:11:e6:f3:99:76:f9:dc:94:2d:2b:5c:2a:db:7a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36c8ad189c7976faea4a7ff3cdbd5df1c301615 908c431341907bacad1df1e6bcf180194839c94d 27df4d9c3d47321758f661f19c29ce957ec7dba4 dd06c7be8538c6ea05372f5ed7122a31fc051d2b 39182811e6cf5edf2b4379b4360b0db405f4a685 076804603a4780e1c82d5fdea91cfd8e8e3e70fc 2da279e8e63aa2962c6e119c7339123c9d86bfaa 062b7553801c9d70e33de40ca9518079c08e2a4e 564e38b6e032a28d2af96545f50aee8755abf150 578b47e6b1a8395fba2c1e5656f57db35bb33b0c eb1b4981ca21b06fa94c63821aecf4b93f3b8bba 97ba6abfbb9bb0cb32468c81090bf7befab82888 8c01efe8646debb59c8115f797ad37d32d527bac 1ed8abb6ab2817afa1a5a7f100b5fc07d0a64f46 b98c955c3552242ac24097b96dc6982b13b13998 66437a630f2115425d178ed01314f183364c5a85 20f7be75c1dd4ad97a503deea6f9e54dd4e993c5 559083e8ecaaaaadb1fda1418a4821ae480110c2 104be067d23eb6cd98498059762c807240019b39 943df908 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ea:6d:22:52:e0:68:99:0e:49:cc:5f:48:75:55:52:c9:ea:68:f9:6d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-01 16:29:09.698 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 16:29:09.700 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 16:29:09.702 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 16:29:09.703 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 16:29:09.704 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-01 16:29:09.705 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 16:29:09.705 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 16:29:09.706 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 16:29:09.706 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 16:29:09.707 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 16:29:09.711 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 16:29:09.712 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 16:29:09.712 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 16:29:09.713 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 16:29:09.873 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 16:29:09.874 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 16:29:09.874 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 16:29:09.875 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 16:29:09.880 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 16:29:09.881 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 16:29:09.881 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:29:09.882 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:29:09.882 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:29:09.883 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:29:09.884 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:29:09.884 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:29:09.885 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:29:09.885 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:29:09.885 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:29:09.886 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 16:29:09.892 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 304823919416764381094918298569502862175302447872 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 13:51:31 UTC 2022 Final Date: Tue Nov 30 13:51:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [aa:e3:4d:5f:b9:3e:11:e6:f3:99:76:f9:dc:94:2d:2b:5c:2a:db:7a],[56:66:d1:a4] modulus: afdf982427dab2a19a022237b26b03e4d7649199d6ec1f76e716d182966b3fd642f036043f0d35accc86457cccd2ae9d9cf58d97ba1909c53cef464f8b464ed900c36ca49eaa50b24b63853e5822567786634d902703b258c643fd7dce8f8760d3441c1c8bc821fea6bc47c93b895199375f8d7b678c6aa41eb7a631fbd74c2a71aac509b828e6004d7749de91e4911bdddd3ffcb95b52d151751b6aa29e976b3de294fcce5e339de2ccdd68fd7edcba0cc0a0d9d6b5842700fc7b33dd0843b0cf7f32a8e2638667008e7848a82173b68aaad21e6e177d2236e9e2c81feb160a586fd07878382821a1c36d5c705645768714d2a752a27a0d6f79df71656766ca4605e6395ac1988c486e3327e745427dbcb9ccbdc0017e2325fe3f40e85b551689d08e7d2cf79fdcbb553ad72d71cd8e6beb3f08122d0e555261c9253563fcb4c2dd5e90e02f9e5188990b2c1a00c4141cae7ba2bc70f6bf0ea6c541bc37d6874d3a91c3700ea6a4ca7212a7d2d4a8cd8e2520b756c271d15ba0b0921506a829 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36c8ad189c7976faea4a7ff3cdbd5df1c301615 908c431341907bacad1df1e6bcf180194839c94d 27df4d9c3d47321758f661f19c29ce957ec7dba4 dd06c7be8538c6ea05372f5ed7122a31fc051d2b 39182811e6cf5edf2b4379b4360b0db405f4a685 076804603a4780e1c82d5fdea91cfd8e8e3e70fc 2da279e8e63aa2962c6e119c7339123c9d86bfaa 062b7553801c9d70e33de40ca9518079c08e2a4e 564e38b6e032a28d2af96545f50aee8755abf150 578b47e6b1a8395fba2c1e5656f57db35bb33b0c eb1b4981ca21b06fa94c63821aecf4b93f3b8bba 97ba6abfbb9bb0cb32468c81090bf7befab82888 8c01efe8646debb59c8115f797ad37d32d527bac 1ed8abb6ab2817afa1a5a7f100b5fc07d0a64f46 b98c955c3552242ac24097b96dc6982b13b13998 66437a630f2115425d178ed01314f183364c5a85 20f7be75c1dd4ad97a503deea6f9e54dd4e993c5 559083e8ecaaaaadb1fda1418a4821ae480110c2 104be067d23eb6cd98498059762c807240019b39 943df908 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bb:74:32:2a:ee:e4:35:42:ff:a8:e9:00:9e:4b:9a:03:ce:f4:6e:0b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-01 16:36:42.949 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 16:36:42.953 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 16:36:42.956 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-01 16:36:42.958 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 16:36:42.958 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-01 16:36:42.959 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 16:36:42.959 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 16:36:42.959 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 16:36:42.960 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 16:36:42.960 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 16:36:42.965 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 16:36:42.967 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 16:36:42.967 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 16:36:42.967 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 16:36:43.131 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 16:36:43.132 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 16:36:43.133 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 16:36:43.133 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 16:36:43.135 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 16:36:43.136 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 16:36:43.136 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:36:43.136 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:36:43.137 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:36:43.138 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:36:43.138 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:36:43.138 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:36:43.139 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:36:43.139 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:36:43.139 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:36:43.140 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 16:36:43.143 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 304823919416764381094918298569502862175302447872 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 13:51:31 UTC 2022 Final Date: Tue Nov 30 13:51:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [aa:e3:4d:5f:b9:3e:11:e6:f3:99:76:f9:dc:94:2d:2b:5c:2a:db:7a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36c8ad189c7976faea4a7ff3cdbd5df1c301615 908c431341907bacad1df1e6bcf180194839c94d 27df4d9c3d47321758f661f19c29ce957ec7dba4 dd06c7be8538c6ea05372f5ed7122a31fc051d2b 39182811e6cf5edf2b4379b4360b0db405f4a685 076804603a4780e1c82d5fdea91cfd8e8e3e70fc 2da279e8e63aa2962c6e119c7339123c9d86bfaa 062b7553801c9d70e33de40ca9518079c08e2a4e 564e38b6e032a28d2af96545f50aee8755abf150 578b47e6b1a8395fba2c1e5656f57db35bb33b0c eb1b4981ca21b06fa94c63821aecf4b93f3b8bba 97ba6abfbb9bb0cb32468c81090bf7befab82888 8c01efe8646debb59c8115f797ad37d32d527bac 1ed8abb6ab2817afa1a5a7f100b5fc07d0a64f46 b98c955c3552242ac24097b96dc6982b13b13998 66437a630f2115425d178ed01314f183364c5a85 20f7be75c1dd4ad97a503deea6f9e54dd4e993c5 559083e8ecaaaaadb1fda1418a4821ae480110c2 104be067d23eb6cd98498059762c807240019b39 943df908 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fb:bb:ff:a9:89:f7:e7:59:a0:6d:b5:1b:3a:e2:d0:0f:98:6c:9a:be],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-01 16:43:26.645 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 16:43:26.648 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 16:43:26.651 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-01 16:43:26.652 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 16:43:26.653 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-01 16:43:26.654 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 16:43:26.655 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 16:43:26.656 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 16:43:26.656 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 16:43:26.657 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 16:43:26.661 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 16:43:26.662 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 16:43:26.662 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 16:43:26.663 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 16:43:26.830 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 16:43:26.831 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 16:43:26.832 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 16:43:26.832 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 16:43:26.842 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 16:43:26.845 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 16:43:26.846 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:43:26.846 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:43:26.846 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:43:26.848 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:43:26.848 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:43:26.848 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:43:26.849 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:43:26.850 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:43:26.851 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:43:26.859 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 16:43:26.875 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 304823919416764381094918298569502862175302447872 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 13:51:31 UTC 2022 Final Date: Tue Nov 30 13:51:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [aa:e3:4d:5f:b9:3e:11:e6:f3:99:76:f9:dc:94:2d:2b:5c:2a:db:7a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36c8ad189c7976faea4a7ff3cdbd5df1c301615 908c431341907bacad1df1e6bcf180194839c94d 27df4d9c3d47321758f661f19c29ce957ec7dba4 dd06c7be8538c6ea05372f5ed7122a31fc051d2b 39182811e6cf5edf2b4379b4360b0db405f4a685 076804603a4780e1c82d5fdea91cfd8e8e3e70fc 2da279e8e63aa2962c6e119c7339123c9d86bfaa 062b7553801c9d70e33de40ca9518079c08e2a4e 564e38b6e032a28d2af96545f50aee8755abf150 578b47e6b1a8395fba2c1e5656f57db35bb33b0c eb1b4981ca21b06fa94c63821aecf4b93f3b8bba 97ba6abfbb9bb0cb32468c81090bf7befab82888 8c01efe8646debb59c8115f797ad37d32d527bac 1ed8abb6ab2817afa1a5a7f100b5fc07d0a64f46 b98c955c3552242ac24097b96dc6982b13b13998 66437a630f2115425d178ed01314f183364c5a85 20f7be75c1dd4ad97a503deea6f9e54dd4e993c5 559083e8ecaaaaadb1fda1418a4821ae480110c2 104be067d23eb6cd98498059762c807240019b39 943df908 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [77:fd:26:5e:81:f5:72:b7:39:41:62:8c:34:8b:cf:54:ac:73:5d:9f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-01 16:44:03.612 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 16:44:03.614 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 16:44:03.616 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-01 16:44:03.616 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 16:44:03.617 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-01 16:44:03.617 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 16:44:03.618 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 16:44:03.618 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 16:44:03.619 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 16:44:03.619 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 16:44:03.623 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 16:44:03.623 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 16:44:03.623 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 16:44:03.624 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 16:44:03.777 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 16:44:03.778 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 16:44:03.779 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 16:44:03.779 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 16:44:03.781 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 16:44:03.781 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 16:44:03.781 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:44:03.782 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:44:03.782 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:44:03.783 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:44:03.783 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:44:03.783 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:44:03.784 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 16:44:03.785 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 16:44:03.785 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 16:44:03.786 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 16:44:03.790 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 304823919416764381094918298569502862175302447872 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 13:51:31 UTC 2022 Final Date: Tue Nov 30 13:51:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [aa:e3:4d:5f:b9:3e:11:e6:f3:99:76:f9:dc:94:2d:2b:5c:2a:db:7a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36c8ad189c7976faea4a7ff3cdbd5df1c301615 908c431341907bacad1df1e6bcf180194839c94d 27df4d9c3d47321758f661f19c29ce957ec7dba4 dd06c7be8538c6ea05372f5ed7122a31fc051d2b 39182811e6cf5edf2b4379b4360b0db405f4a685 076804603a4780e1c82d5fdea91cfd8e8e3e70fc 2da279e8e63aa2962c6e119c7339123c9d86bfaa 062b7553801c9d70e33de40ca9518079c08e2a4e 564e38b6e032a28d2af96545f50aee8755abf150 578b47e6b1a8395fba2c1e5656f57db35bb33b0c eb1b4981ca21b06fa94c63821aecf4b93f3b8bba 97ba6abfbb9bb0cb32468c81090bf7befab82888 8c01efe8646debb59c8115f797ad37d32d527bac 1ed8abb6ab2817afa1a5a7f100b5fc07d0a64f46 b98c955c3552242ac24097b96dc6982b13b13998 66437a630f2115425d178ed01314f183364c5a85 20f7be75c1dd4ad97a503deea6f9e54dd4e993c5 559083e8ecaaaaadb1fda1418a4821ae480110c2 104be067d23eb6cd98498059762c807240019b39 943df908 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [54:88:48:28:77:1d:ab:88:97:c4:7e:0c:04:a1:6f:89:bc:36:2c:fa],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-01 17:18:59.450 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 17:18:59.453 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 17:18:59.456 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-01 17:18:59.457 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 17:18:59.457 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-01 17:18:59.458 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 17:18:59.458 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 17:18:59.459 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 17:18:59.459 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 17:18:59.460 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 17:18:59.467 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 17:18:59.469 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 17:18:59.469 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 17:18:59.470 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 17:18:59.625 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 17:18:59.626 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 17:18:59.626 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 17:18:59.627 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 17:18:59.628 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 17:18:59.629 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 17:18:59.630 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 17:18:59.630 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 17:18:59.631 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 17:18:59.631 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 17:18:59.632 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 17:18:59.632 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 17:18:59.633 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 17:18:59.633 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 17:18:59.633 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 17:18:59.634 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 17:18:59.637 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 304823919416764381094918298569502862175302447872 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 13:51:31 UTC 2022 Final Date: Tue Nov 30 13:51:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [aa:e3:4d:5f:b9:3e:11:e6:f3:99:76:f9:dc:94:2d:2b:5c:2a:db:7a],[56:66:d1:a4] modulus: afdf982427dab2a19a022237b26b03e4d7649199d6ec1f76e716d182966b3fd642f036043f0d35accc86457cccd2ae9d9cf58d97ba1909c53cef464f8b464ed900c36ca49eaa50b24b63853e5822567786634d902703b258c643fd7dce8f8760d3441c1c8bc821fea6bc47c93b895199375f8d7b678c6aa41eb7a631fbd74c2a71aac509b828e6004d7749de91e4911bdddd3ffcb95b52d151751b6aa29e976b3de294fcce5e339de2ccdd68fd7edcba0cc0a0d9d6b5842700fc7b33dd0843b0cf7f32a8e2638667008e7848a82173b68aaad21e6e177d2236e9e2c81feb160a586fd07878382821a1c36d5c705645768714d2a752a27a0d6f79df71656766ca4605e6395ac1988c486e3327e745427dbcb9ccbdc0017e2325fe3f40e85b551689d08e7d2cf79fdcbb553ad72d71cd8e6beb3f08122d0e555261c9253563fcb4c2dd5e90e02f9e5188990b2c1a00c4141cae7ba2bc70f6bf0ea6c541bc37d6874d3a91c3700ea6a4ca7212a7d2d4a8cd8e2520b756c271d15ba0b0921506a829 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36c8ad189c7976faea4a7ff3cdbd5df1c301615 908c431341907bacad1df1e6bcf180194839c94d 27df4d9c3d47321758f661f19c29ce957ec7dba4 dd06c7be8538c6ea05372f5ed7122a31fc051d2b 39182811e6cf5edf2b4379b4360b0db405f4a685 076804603a4780e1c82d5fdea91cfd8e8e3e70fc 2da279e8e63aa2962c6e119c7339123c9d86bfaa 062b7553801c9d70e33de40ca9518079c08e2a4e 564e38b6e032a28d2af96545f50aee8755abf150 578b47e6b1a8395fba2c1e5656f57db35bb33b0c eb1b4981ca21b06fa94c63821aecf4b93f3b8bba 97ba6abfbb9bb0cb32468c81090bf7befab82888 8c01efe8646debb59c8115f797ad37d32d527bac 1ed8abb6ab2817afa1a5a7f100b5fc07d0a64f46 b98c955c3552242ac24097b96dc6982b13b13998 66437a630f2115425d178ed01314f183364c5a85 20f7be75c1dd4ad97a503deea6f9e54dd4e993c5 559083e8ecaaaaadb1fda1418a4821ae480110c2 104be067d23eb6cd98498059762c807240019b39 943df908 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fa:0a:8f:78:f2:54:b9:d6:79:29:99:f6:c4:32:91:6a:61:fc:6c:9e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-01 17:19:04.879 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 17:19:04.881 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 17:19:04.882 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-01 17:19:04.883 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 17:19:04.883 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-01 17:19:04.883 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 17:19:04.884 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 17:19:04.884 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 17:19:04.884 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 17:19:04.885 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 17:19:04.890 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 17:19:04.891 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 17:19:04.891 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 17:19:04.892 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 17:19:05.012 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 17:19:05.013 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 17:19:05.013 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 17:19:05.013 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 17:19:05.015 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 17:19:05.015 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 17:19:05.016 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 17:19:05.016 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 17:19:05.016 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 17:19:05.017 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 17:19:05.017 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 17:19:05.017 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 17:19:05.018 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 17:19:05.018 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 17:19:05.018 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 17:19:05.019 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 17:19:05.023 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 304823919416764381094918298569502862175302447872 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 13:51:31 UTC 2022 Final Date: Tue Nov 30 13:51:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [aa:e3:4d:5f:b9:3e:11:e6:f3:99:76:f9:dc:94:2d:2b:5c:2a:db:7a],[56:66:d1:a4] modulus: afdf982427dab2a19a022237b26b03e4d7649199d6ec1f76e716d182966b3fd642f036043f0d35accc86457cccd2ae9d9cf58d97ba1909c53cef464f8b464ed900c36ca49eaa50b24b63853e5822567786634d902703b258c643fd7dce8f8760d3441c1c8bc821fea6bc47c93b895199375f8d7b678c6aa41eb7a631fbd74c2a71aac509b828e6004d7749de91e4911bdddd3ffcb95b52d151751b6aa29e976b3de294fcce5e339de2ccdd68fd7edcba0cc0a0d9d6b5842700fc7b33dd0843b0cf7f32a8e2638667008e7848a82173b68aaad21e6e177d2236e9e2c81feb160a586fd07878382821a1c36d5c705645768714d2a752a27a0d6f79df71656766ca4605e6395ac1988c486e3327e745427dbcb9ccbdc0017e2325fe3f40e85b551689d08e7d2cf79fdcbb553ad72d71cd8e6beb3f08122d0e555261c9253563fcb4c2dd5e90e02f9e5188990b2c1a00c4141cae7ba2bc70f6bf0ea6c541bc37d6874d3a91c3700ea6a4ca7212a7d2d4a8cd8e2520b756c271d15ba0b0921506a829 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36c8ad189c7976faea4a7ff3cdbd5df1c301615 908c431341907bacad1df1e6bcf180194839c94d 27df4d9c3d47321758f661f19c29ce957ec7dba4 dd06c7be8538c6ea05372f5ed7122a31fc051d2b 39182811e6cf5edf2b4379b4360b0db405f4a685 076804603a4780e1c82d5fdea91cfd8e8e3e70fc 2da279e8e63aa2962c6e119c7339123c9d86bfaa 062b7553801c9d70e33de40ca9518079c08e2a4e 564e38b6e032a28d2af96545f50aee8755abf150 578b47e6b1a8395fba2c1e5656f57db35bb33b0c eb1b4981ca21b06fa94c63821aecf4b93f3b8bba 97ba6abfbb9bb0cb32468c81090bf7befab82888 8c01efe8646debb59c8115f797ad37d32d527bac 1ed8abb6ab2817afa1a5a7f100b5fc07d0a64f46 b98c955c3552242ac24097b96dc6982b13b13998 66437a630f2115425d178ed01314f183364c5a85 20f7be75c1dd4ad97a503deea6f9e54dd4e993c5 559083e8ecaaaaadb1fda1418a4821ae480110c2 104be067d23eb6cd98498059762c807240019b39 943df908 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e6:b5:61:d2:98:79:31:4f:84:45:d3:04:c2:a9:3f:4b:ed:01:8d:6e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-01 17:43:05.960 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 17:43:05.963 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 17:43:05.966 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-01 17:43:05.969 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 17:43:05.970 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-01 17:43:05.971 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 17:43:05.971 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 17:43:05.972 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 17:43:05.972 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 17:43:05.976 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 17:43:05.980 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 17:43:05.982 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 17:43:05.982 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 17:43:05.983 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 17:43:06.169 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 17:43:06.170 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 17:43:06.170 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 17:43:06.171 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 17:43:06.172 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 17:43:06.173 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 17:43:06.176 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 17:43:06.177 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 17:43:06.178 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 17:43:06.180 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 17:43:06.180 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 17:43:06.181 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 17:43:06.182 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 17:43:06.182 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 17:43:06.183 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 17:43:06.184 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 17:43:06.191 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 304823919416764381094918298569502862175302447872 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 13:51:31 UTC 2022 Final Date: Tue Nov 30 13:51:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [aa:e3:4d:5f:b9:3e:11:e6:f3:99:76:f9:dc:94:2d:2b:5c:2a:db:7a],[56:66:d1:a4] modulus: afdf982427dab2a19a022237b26b03e4d7649199d6ec1f76e716d182966b3fd642f036043f0d35accc86457cccd2ae9d9cf58d97ba1909c53cef464f8b464ed900c36ca49eaa50b24b63853e5822567786634d902703b258c643fd7dce8f8760d3441c1c8bc821fea6bc47c93b895199375f8d7b678c6aa41eb7a631fbd74c2a71aac509b828e6004d7749de91e4911bdddd3ffcb95b52d151751b6aa29e976b3de294fcce5e339de2ccdd68fd7edcba0cc0a0d9d6b5842700fc7b33dd0843b0cf7f32a8e2638667008e7848a82173b68aaad21e6e177d2236e9e2c81feb160a586fd07878382821a1c36d5c705645768714d2a752a27a0d6f79df71656766ca4605e6395ac1988c486e3327e745427dbcb9ccbdc0017e2325fe3f40e85b551689d08e7d2cf79fdcbb553ad72d71cd8e6beb3f08122d0e555261c9253563fcb4c2dd5e90e02f9e5188990b2c1a00c4141cae7ba2bc70f6bf0ea6c541bc37d6874d3a91c3700ea6a4ca7212a7d2d4a8cd8e2520b756c271d15ba0b0921506a829 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36c8ad189c7976faea4a7ff3cdbd5df1c301615 908c431341907bacad1df1e6bcf180194839c94d 27df4d9c3d47321758f661f19c29ce957ec7dba4 dd06c7be8538c6ea05372f5ed7122a31fc051d2b 39182811e6cf5edf2b4379b4360b0db405f4a685 076804603a4780e1c82d5fdea91cfd8e8e3e70fc 2da279e8e63aa2962c6e119c7339123c9d86bfaa 062b7553801c9d70e33de40ca9518079c08e2a4e 564e38b6e032a28d2af96545f50aee8755abf150 578b47e6b1a8395fba2c1e5656f57db35bb33b0c eb1b4981ca21b06fa94c63821aecf4b93f3b8bba 97ba6abfbb9bb0cb32468c81090bf7befab82888 8c01efe8646debb59c8115f797ad37d32d527bac 1ed8abb6ab2817afa1a5a7f100b5fc07d0a64f46 b98c955c3552242ac24097b96dc6982b13b13998 66437a630f2115425d178ed01314f183364c5a85 20f7be75c1dd4ad97a503deea6f9e54dd4e993c5 559083e8ecaaaaadb1fda1418a4821ae480110c2 104be067d23eb6cd98498059762c807240019b39 943df908 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:92:65:38:a9:50:ca:cc:04:bd:85:55:84:c6:98:50:75:68:7a:e0],[56:66:d1:a4] modulus: d7bc51034fa4624d84db6ed792e838045be04603dd7aecf1bb3b8854297a0804742e850ae6882c1c050a8af44fa48f2a532005f83c69941daf01b93e896c115cffb4a9def8ff933b845d0266b38902be9eadbe24eda179030a53484817811e0179b57cf6e529a2d8bd8ca687c3b64364939fb7744c65d6e311f1e0efd8d7ab10d75a4052454b7f7decf287bc9082ce9949da00b85ab5f7d74f2f9092c69309ab11c85fa98cbd95dc52f4f6762c6dd91133491c7dbd222afc86ae1981052639549010ee6843f3d37e6211a4bac61600d13f6f63bbbbe7c1e0bfd432bef5f160204ae17ea380dc3f67ca080a592a36ed8a4d8e6c4362740e1e1a73f265e2a1f8c1 public exponent: 10001 ] 2022-12-01 17:43:10.898 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-01 17:43:10.899 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-01 17:43:10.901 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-01 17:43:10.902 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-01 17:43:10.902 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-01 17:43:10.903 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-01 17:43:10.904 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-01 17:43:10.904 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-01 17:43:10.904 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-01 17:43:10.905 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-01 17:43:10.910 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-01 17:43:10.911 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 17:43:10.911 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-01 17:43:10.911 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 17:43:11.030 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-01 17:43:11.032 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-01 17:43:11.032 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-01 17:43:11.032 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-01 17:43:11.034 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-01 17:43:11.034 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-01 17:43:11.035 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 17:43:11.035 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 17:43:11.036 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 17:43:11.037 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 17:43:11.037 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 17:43:11.038 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 17:43:11.038 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-01 17:43:11.039 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-01 17:43:11.039 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-01 17:43:11.040 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-01 17:43:11.044 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 304823919416764381094918298569502862175302447872 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 01 13:51:31 UTC 2022 Final Date: Tue Nov 30 13:51:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [aa:e3:4d:5f:b9:3e:11:e6:f3:99:76:f9:dc:94:2d:2b:5c:2a:db:7a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36c8ad189c7976faea4a7ff3cdbd5df1c301615 908c431341907bacad1df1e6bcf180194839c94d 27df4d9c3d47321758f661f19c29ce957ec7dba4 dd06c7be8538c6ea05372f5ed7122a31fc051d2b 39182811e6cf5edf2b4379b4360b0db405f4a685 076804603a4780e1c82d5fdea91cfd8e8e3e70fc 2da279e8e63aa2962c6e119c7339123c9d86bfaa 062b7553801c9d70e33de40ca9518079c08e2a4e 564e38b6e032a28d2af96545f50aee8755abf150 578b47e6b1a8395fba2c1e5656f57db35bb33b0c eb1b4981ca21b06fa94c63821aecf4b93f3b8bba 97ba6abfbb9bb0cb32468c81090bf7befab82888 8c01efe8646debb59c8115f797ad37d32d527bac 1ed8abb6ab2817afa1a5a7f100b5fc07d0a64f46 b98c955c3552242ac24097b96dc6982b13b13998 66437a630f2115425d178ed01314f183364c5a85 20f7be75c1dd4ad97a503deea6f9e54dd4e993c5 559083e8ecaaaaadb1fda1418a4821ae480110c2 104be067d23eb6cd98498059762c807240019b39 943df908 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2f:33:77:75:8f:ec:06:0f:fd:85:88:0a:d4:cb:12:21:1a:ee:52:0c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]