By type
2022-12-06 03:03:10,699 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-12-06 03:03:12,760 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-12-06 03:03:13.682 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Dec 06, 2022 3:03:15 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Dec 06, 2022 3:03:15 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Dec 06, 2022 3:03:15 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Dec 06, 2022 3:03:16 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-12-06 03:03:16.616 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-12-06 03:03:16.937 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-12-06 03:03:17.151 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-12-06 03:03:17.926 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-12-06 03:03:17.929 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-12-06 03:03:17.931 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-12-06 03:03:17.935 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-12-06 03:03:17.976 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-12-06 03:03:17.980 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-12-06 03:03:18.099 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-12-06 03:03:18.927 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Dec 06, 2022 3:03:19 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-12-06 03:03:20.013 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 10.593 seconds (JVM running for 13.058) Dec 06, 2022 3:03:39 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-12-06 03:03:49.813 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-06 03:03:49.823 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-06 03:03:49.861 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-06 03:03:49.864 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 03:03:49.889 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-06 03:03:49.891 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-06 03:03:49.892 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-06 03:03:49.894 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-06 03:03:49.894 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 03:03:49.898 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-06 03:03:49.908 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-06 03:03:49.913 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-06 03:03:49.966 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-06 03:03:49.975 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 03:03:49.975 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 03:03:49.979 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 03:03:50.600 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-06 03:03:50.604 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-06 03:03:50.605 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-06 03:03:50.607 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 03:03:50.619 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-06 03:03:50.620 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-06 03:03:50.621 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 03:03:50.622 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 03:03:50.622 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 03:03:50.637 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 03:03:50.638 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 03:03:50.638 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 03:03:50.644 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 03:03:50.645 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 03:03:50.645 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 03:03:50.649 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 03:03:50.679 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 469773687849548213302389279468020294913554401031 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 02:58:09 UTC 2022 Final Date: Sun Dec 05 02:58:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54 88394fbfd05d1a6aa203a4f899cd001b2c99ab7a 320c7f19760edd2832b79d5186ae1d2368c8b97b d9d555024cd8444d8fadb4b9b50de115e6749b3a 574de3430dbb42c6dd9fcddf59a0f37e41b0ce90 0b56e1a0034d460be907a991f255f7a7adaded13 193b8d62cb17ef81dd601dba33a384fbfe20d007 e113cebbb32937363acc2633bc47c37b5f332e0b 09e653e5afeaea519c946585b0b899f8828c3b25 7e87f3dc82d3e4989bb750dc5f88254aadb6ca30 389e8be9be7b19da0383b11d13fe3eaeec5fbedf cdad07d553ba9fb3e1f3e08cc47e581224ffbb13 0494aeb9b8a704728f0f63f50df6f298da7e0c67 f9630ff12505caa19a93bdf233d36730c2de803e 6dae63f48bc3e7782c20f26162e006740851c5e0 6f1de08797ff507eb27e5950169d60901dd9448b 4eb36ade8595ef6acd7baa5db389eed4fe83ad1f 67cc06d0bf8999fd3984ef89855bf861efdd6b83 770c66ea2729eb3fc0082cb668244a4285557746 5213a046 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [70:f7:ec:dd:d0:a3:97:33:56:ca:03:47:9f:68:59:23:9a:3d:27:96],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 04:39:19.849 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-06 04:39:19.852 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-06 04:39:19.855 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 04:39:19.856 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 04:39:19.856 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 04:39:19.857 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-06 04:39:19.858 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-06 04:39:19.858 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-06 04:39:19.859 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-06 04:39:19.859 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-06 04:39:19.864 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-06 04:39:19.865 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 04:39:19.865 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 04:39:19.866 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 04:39:20.086 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-06 04:39:20.087 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-06 04:39:20.088 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-06 04:39:20.089 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 04:39:20.092 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-06 04:39:20.093 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-06 04:39:20.094 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 04:39:20.094 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 04:39:20.095 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 04:39:20.096 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 04:39:20.097 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 04:39:20.097 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 04:39:20.099 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 04:39:20.099 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 04:39:20.100 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 04:39:20.101 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 04:39:20.107 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 469773687849548213302389279468020294913554401031 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 02:58:09 UTC 2022 Final Date: Sun Dec 05 02:58:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54 88394fbfd05d1a6aa203a4f899cd001b2c99ab7a 320c7f19760edd2832b79d5186ae1d2368c8b97b d9d555024cd8444d8fadb4b9b50de115e6749b3a 574de3430dbb42c6dd9fcddf59a0f37e41b0ce90 0b56e1a0034d460be907a991f255f7a7adaded13 193b8d62cb17ef81dd601dba33a384fbfe20d007 e113cebbb32937363acc2633bc47c37b5f332e0b 09e653e5afeaea519c946585b0b899f8828c3b25 7e87f3dc82d3e4989bb750dc5f88254aadb6ca30 389e8be9be7b19da0383b11d13fe3eaeec5fbedf cdad07d553ba9fb3e1f3e08cc47e581224ffbb13 0494aeb9b8a704728f0f63f50df6f298da7e0c67 f9630ff12505caa19a93bdf233d36730c2de803e 6dae63f48bc3e7782c20f26162e006740851c5e0 6f1de08797ff507eb27e5950169d60901dd9448b 4eb36ade8595ef6acd7baa5db389eed4fe83ad1f 67cc06d0bf8999fd3984ef89855bf861efdd6b83 770c66ea2729eb3fc0082cb668244a4285557746 5213a046 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:09:ba:ae:54:98:49:43:8a:22:59:94:13:a9:44:ce:3c:36:7f:f7],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 04:41:21.937 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-06 04:41:21.938 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-06 04:41:21.940 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-06 04:41:21.940 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 04:41:21.941 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-06 04:41:21.942 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-06 04:41:21.942 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-06 04:41:21.943 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-06 04:41:21.943 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-06 04:41:21.944 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-06 04:41:21.949 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-06 04:41:21.949 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 04:41:21.950 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 04:41:21.950 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 04:41:22.103 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-06 04:41:22.104 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-06 04:41:22.105 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-06 04:41:22.106 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 04:41:22.108 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-06 04:41:22.109 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-06 04:41:22.109 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 04:41:22.110 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 04:41:22.110 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 04:41:22.112 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 04:41:22.112 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 04:41:22.113 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 04:41:22.114 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 04:41:22.114 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 04:41:22.115 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 04:41:22.116 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 04:41:22.121 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 469773687849548213302389279468020294913554401031 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 02:58:09 UTC 2022 Final Date: Sun Dec 05 02:58:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54 88394fbfd05d1a6aa203a4f899cd001b2c99ab7a 320c7f19760edd2832b79d5186ae1d2368c8b97b d9d555024cd8444d8fadb4b9b50de115e6749b3a 574de3430dbb42c6dd9fcddf59a0f37e41b0ce90 0b56e1a0034d460be907a991f255f7a7adaded13 193b8d62cb17ef81dd601dba33a384fbfe20d007 e113cebbb32937363acc2633bc47c37b5f332e0b 09e653e5afeaea519c946585b0b899f8828c3b25 7e87f3dc82d3e4989bb750dc5f88254aadb6ca30 389e8be9be7b19da0383b11d13fe3eaeec5fbedf cdad07d553ba9fb3e1f3e08cc47e581224ffbb13 0494aeb9b8a704728f0f63f50df6f298da7e0c67 f9630ff12505caa19a93bdf233d36730c2de803e 6dae63f48bc3e7782c20f26162e006740851c5e0 6f1de08797ff507eb27e5950169d60901dd9448b 4eb36ade8595ef6acd7baa5db389eed4fe83ad1f 67cc06d0bf8999fd3984ef89855bf861efdd6b83 770c66ea2729eb3fc0082cb668244a4285557746 5213a046 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [48:32:5e:c7:b5:d7:87:f8:72:fd:54:54:ae:b3:7b:27:b7:15:a6:f3],[56:66:d1:a4] modulus: b4ad497dc21688e448c3509c75b6f797fe27e129ad0078ce701dd3c3539137cc287bb689848892bfac39e03465eb6c19feaad83a5b74985b32e1c66a52fc47747ec4991beab8bb2d6b6af91dbe02e99244074590bdf20c40c56e739214e917d7c540d192c5413b1b42119e473d06f8b029495eec760bb2e9d5a6e645bb9643c78cf6754f23c24479ffef6ef22090689a4f4b42da277044d64990067071735fb1e2b53164d1fe614effa9177244e7bdd17c9cd69d3f914cd48fdca32a30f8e712c1599aec4ff0e81988bb32fcda147f8efcc6bc0d536de026023592119c10e8c2ed8445220b8346205b2b20eaeef6c0bcbc25b47ca02df71a0f37227767e90dc1 public exponent: 10001 ] 2022-12-06 04:43:36.004 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-06 04:43:36.005 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-06 04:43:36.007 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-06 04:43:36.007 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 04:43:36.008 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-06 04:43:36.009 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-06 04:43:36.009 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-06 04:43:36.010 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-06 04:43:36.010 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-06 04:43:36.010 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-06 04:43:36.014 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-06 04:43:36.015 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 04:43:36.015 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 04:43:36.016 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 04:43:36.147 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-06 04:43:36.148 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-06 04:43:36.148 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-06 04:43:36.149 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 04:43:36.151 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-06 04:43:36.151 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-06 04:43:36.152 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 04:43:36.152 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 04:43:36.152 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 04:43:36.153 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 04:43:36.153 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 04:43:36.154 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 04:43:36.155 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 04:43:36.155 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 04:43:36.155 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 04:43:36.156 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 04:43:36.160 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 469773687849548213302389279468020294913554401031 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 02:58:09 UTC 2022 Final Date: Sun Dec 05 02:58:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54 88394fbfd05d1a6aa203a4f899cd001b2c99ab7a 320c7f19760edd2832b79d5186ae1d2368c8b97b d9d555024cd8444d8fadb4b9b50de115e6749b3a 574de3430dbb42c6dd9fcddf59a0f37e41b0ce90 0b56e1a0034d460be907a991f255f7a7adaded13 193b8d62cb17ef81dd601dba33a384fbfe20d007 e113cebbb32937363acc2633bc47c37b5f332e0b 09e653e5afeaea519c946585b0b899f8828c3b25 7e87f3dc82d3e4989bb750dc5f88254aadb6ca30 389e8be9be7b19da0383b11d13fe3eaeec5fbedf cdad07d553ba9fb3e1f3e08cc47e581224ffbb13 0494aeb9b8a704728f0f63f50df6f298da7e0c67 f9630ff12505caa19a93bdf233d36730c2de803e 6dae63f48bc3e7782c20f26162e006740851c5e0 6f1de08797ff507eb27e5950169d60901dd9448b 4eb36ade8595ef6acd7baa5db389eed4fe83ad1f 67cc06d0bf8999fd3984ef89855bf861efdd6b83 770c66ea2729eb3fc0082cb668244a4285557746 5213a046 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e4:fc:d2:3a:3b:1c:7d:60:1e:8d:95:59:8e:2c:a2:26:ac:cb:c2:c1],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 04:46:05.584 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-06 04:46:05.586 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-06 04:46:05.587 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 04:46:05.588 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 04:46:05.588 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 04:46:05.589 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-06 04:46:05.589 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-06 04:46:05.590 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-06 04:46:05.590 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-06 04:46:05.591 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-06 04:46:05.595 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-06 04:46:05.596 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 04:46:05.596 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 04:46:05.596 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 04:46:05.724 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-06 04:46:05.725 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-06 04:46:05.725 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-06 04:46:05.725 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 04:46:05.726 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-06 04:46:05.727 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-06 04:46:05.727 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 04:46:05.728 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 04:46:05.728 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 04:46:05.729 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 04:46:05.729 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 04:46:05.729 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 04:46:05.730 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 04:46:05.730 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 04:46:05.730 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 04:46:05.731 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 04:46:05.735 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 469773687849548213302389279468020294913554401031 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 02:58:09 UTC 2022 Final Date: Sun Dec 05 02:58:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4] modulus: c77ddc6f52cd255d6aaffe97f74d8fe71df11a76075467171f4eae0c1bafebe904a853898ed0642ee2d66eb1a65eaf36f0e0d41df0fb520f8949c3cf828f7036a31b99beacee49e0a16e0868d289f8dc6db88f6dbaf57930b71939fc8c30ebc76b268858c570d37fb052444e791222fda9d61e4e0e19479acffbe800afa2e3621ab4b127ab060ba2b809e7f47fc1a1083cd8c860fdaf749869b87cd09388b51c3fe8c016817a95039f24310776e456cbba9d8fb2c9e6f8997fc011144656b3c8f46188380afea76a3857fb604c28604959d3ba262552f3d8c4ab75219191c72ea99b6329b52739d04d1665fdf0abda6655c774a02b3337a46b948c3590efff053f0e7546ec973528e19c5efefb78025f4d1db4dadf6e643ee60f2f867d49a611c7f0bfd915a2d87177ae34cf4d277edda9aa2ffc94c80d32f1c561b3dd7940c910aa42371e6bb41f76610bca5699dcf1e21846b0024a5039e95ac551d087e8cb2d72518e80d435e4ddf3fda09221ec339ac68549316dd83f8b37414fe3f8908d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54 88394fbfd05d1a6aa203a4f899cd001b2c99ab7a 320c7f19760edd2832b79d5186ae1d2368c8b97b d9d555024cd8444d8fadb4b9b50de115e6749b3a 574de3430dbb42c6dd9fcddf59a0f37e41b0ce90 0b56e1a0034d460be907a991f255f7a7adaded13 193b8d62cb17ef81dd601dba33a384fbfe20d007 e113cebbb32937363acc2633bc47c37b5f332e0b 09e653e5afeaea519c946585b0b899f8828c3b25 7e87f3dc82d3e4989bb750dc5f88254aadb6ca30 389e8be9be7b19da0383b11d13fe3eaeec5fbedf cdad07d553ba9fb3e1f3e08cc47e581224ffbb13 0494aeb9b8a704728f0f63f50df6f298da7e0c67 f9630ff12505caa19a93bdf233d36730c2de803e 6dae63f48bc3e7782c20f26162e006740851c5e0 6f1de08797ff507eb27e5950169d60901dd9448b 4eb36ade8595ef6acd7baa5db389eed4fe83ad1f 67cc06d0bf8999fd3984ef89855bf861efdd6b83 770c66ea2729eb3fc0082cb668244a4285557746 5213a046 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [80:72:47:9c:b7:68:f2:7e:28:fb:78:c2:8f:6b:fa:5d:07:b4:e4:40],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 04:53:45.194 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-06 04:53:45.197 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-06 04:53:45.199 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 04:53:45.200 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 04:53:45.201 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 04:53:45.201 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-06 04:53:45.202 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-06 04:53:45.203 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-06 04:53:45.204 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-06 04:53:45.204 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-06 04:53:45.210 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-06 04:53:45.210 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 04:53:45.211 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 04:53:45.211 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 04:53:45.359 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-06 04:53:45.360 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-06 04:53:45.360 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-06 04:53:45.361 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 04:53:45.362 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-06 04:53:45.362 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-06 04:53:45.363 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 04:53:45.363 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 04:53:45.363 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 04:53:45.364 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 04:53:45.365 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 04:53:45.365 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 04:53:45.366 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 04:53:45.366 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 04:53:45.366 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 04:53:45.367 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 04:53:45.371 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 469773687849548213302389279468020294913554401031 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 02:58:09 UTC 2022 Final Date: Sun Dec 05 02:58:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54 88394fbfd05d1a6aa203a4f899cd001b2c99ab7a 320c7f19760edd2832b79d5186ae1d2368c8b97b d9d555024cd8444d8fadb4b9b50de115e6749b3a 574de3430dbb42c6dd9fcddf59a0f37e41b0ce90 0b56e1a0034d460be907a991f255f7a7adaded13 193b8d62cb17ef81dd601dba33a384fbfe20d007 e113cebbb32937363acc2633bc47c37b5f332e0b 09e653e5afeaea519c946585b0b899f8828c3b25 7e87f3dc82d3e4989bb750dc5f88254aadb6ca30 389e8be9be7b19da0383b11d13fe3eaeec5fbedf cdad07d553ba9fb3e1f3e08cc47e581224ffbb13 0494aeb9b8a704728f0f63f50df6f298da7e0c67 f9630ff12505caa19a93bdf233d36730c2de803e 6dae63f48bc3e7782c20f26162e006740851c5e0 6f1de08797ff507eb27e5950169d60901dd9448b 4eb36ade8595ef6acd7baa5db389eed4fe83ad1f 67cc06d0bf8999fd3984ef89855bf861efdd6b83 770c66ea2729eb3fc0082cb668244a4285557746 5213a046 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:2a:35:24:7b:ee:59:a8:0d:2d:63:82:0d:4b:e8:63:e4:f2:51:f5],[56:66:d1:a4] modulus: ca1bd65cf9c00392e5660e4c3d865d581703f368211fe9ea8df42c264840e505d3a9ee7a62c90d482ecbadbaf73bd03a1c8aa72b9ffebae1b72a015cac0bcb1392296dfd4c01bedf0b4777ff1382b51344b34696f5106169a9d899c85dfa58295fe8eeaa5952d72100c1b70fd4e7b4ca3dd44f1f5034aeb9f42227b5d06fa11db22244346714e55c76cda77ad1f4aa8bb2774cc846619b676c5fdb1f9b818d0eab2dc96bc1e9573585e05034c62db7d84096846ca307be93cdcd384fa2d6b27d97e5a45be8cf7b4c29b4939c04ff43e239da8eeba8c4d20575c4597edcfed70d6f035d4fec5e71e313bcfcabc7e3467b5ea2cd9fd195f90d6e12b74ab47b58e1 public exponent: 10001 ] 2022-12-06 04:59:09.835 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-06 04:59:09.837 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-06 04:59:09.840 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 04:59:09.841 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 04:59:09.842 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 04:59:09.843 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-06 04:59:09.843 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-06 04:59:09.844 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-06 04:59:09.844 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-06 04:59:09.845 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-06 04:59:09.849 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-06 04:59:09.850 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 04:59:09.850 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 04:59:09.851 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 04:59:09.981 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-06 04:59:09.981 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-06 04:59:09.982 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-06 04:59:09.982 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 04:59:09.983 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-06 04:59:09.984 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-06 04:59:09.984 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 04:59:09.984 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 04:59:09.985 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 04:59:09.985 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 04:59:09.986 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 04:59:09.986 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 04:59:09.987 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 04:59:09.987 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 04:59:09.987 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 04:59:09.988 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 04:59:09.991 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 469773687849548213302389279468020294913554401031 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 02:58:09 UTC 2022 Final Date: Sun Dec 05 02:58:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54 88394fbfd05d1a6aa203a4f899cd001b2c99ab7a 320c7f19760edd2832b79d5186ae1d2368c8b97b d9d555024cd8444d8fadb4b9b50de115e6749b3a 574de3430dbb42c6dd9fcddf59a0f37e41b0ce90 0b56e1a0034d460be907a991f255f7a7adaded13 193b8d62cb17ef81dd601dba33a384fbfe20d007 e113cebbb32937363acc2633bc47c37b5f332e0b 09e653e5afeaea519c946585b0b899f8828c3b25 7e87f3dc82d3e4989bb750dc5f88254aadb6ca30 389e8be9be7b19da0383b11d13fe3eaeec5fbedf cdad07d553ba9fb3e1f3e08cc47e581224ffbb13 0494aeb9b8a704728f0f63f50df6f298da7e0c67 f9630ff12505caa19a93bdf233d36730c2de803e 6dae63f48bc3e7782c20f26162e006740851c5e0 6f1de08797ff507eb27e5950169d60901dd9448b 4eb36ade8595ef6acd7baa5db389eed4fe83ad1f 67cc06d0bf8999fd3984ef89855bf861efdd6b83 770c66ea2729eb3fc0082cb668244a4285557746 5213a046 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:f6:f3:73:1e:96:75:6c:9c:b9:e1:ab:64:6f:78:2c:63:8b:96:f0],[56:66:d1:a4] modulus: aa1f79ca8fe64beebb6f8166de866a379730c950d4fcba08ad98614d0eb2135e70666cf89743d45344d7a28daf87bbf24e1b9597f37c72a9647030b8fd13924384bbf85e0486ac3a1c86cc12a52c8596381a906ec013cc51b85a7034be7e831d106a5df650374a11e6223e9c8a2afdaef96d0bc75210010b565f82a6de6ed7bbf1a87adc680fa9f45c75ae42f0ca63bfbdd2c3a08406346d129753fc36d20818db5757463dcbcd1438e48a9df261e40bb7c7dd953b525800e8d68e805633e8871822eac84c9408e87e8b30f2c28c9dc44d4c522db8f9e9e84829035397b144921eb590124de09b439272b6def9592fdd71d0d9f8f33c12d831319ab58d50c0cb public exponent: 10001 ] 2022-12-06 05:05:37.895 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-06 05:05:37.899 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-06 05:05:37.903 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 05:05:37.905 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 05:05:37.906 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 05:05:37.907 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-06 05:05:37.907 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-06 05:05:37.908 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-06 05:05:37.908 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-06 05:05:37.909 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-06 05:05:37.913 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-06 05:05:37.914 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 05:05:37.915 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 05:05:37.915 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 05:05:38.095 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-06 05:05:38.096 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-06 05:05:38.096 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-06 05:05:38.096 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 05:05:38.098 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-06 05:05:38.099 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-06 05:05:38.099 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:05:38.100 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:05:38.100 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:05:38.101 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:05:38.101 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:05:38.102 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:05:38.103 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:05:38.103 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:05:38.103 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:05:38.104 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 05:05:38.108 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 469773687849548213302389279468020294913554401031 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 02:58:09 UTC 2022 Final Date: Sun Dec 05 02:58:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54 88394fbfd05d1a6aa203a4f899cd001b2c99ab7a 320c7f19760edd2832b79d5186ae1d2368c8b97b d9d555024cd8444d8fadb4b9b50de115e6749b3a 574de3430dbb42c6dd9fcddf59a0f37e41b0ce90 0b56e1a0034d460be907a991f255f7a7adaded13 193b8d62cb17ef81dd601dba33a384fbfe20d007 e113cebbb32937363acc2633bc47c37b5f332e0b 09e653e5afeaea519c946585b0b899f8828c3b25 7e87f3dc82d3e4989bb750dc5f88254aadb6ca30 389e8be9be7b19da0383b11d13fe3eaeec5fbedf cdad07d553ba9fb3e1f3e08cc47e581224ffbb13 0494aeb9b8a704728f0f63f50df6f298da7e0c67 f9630ff12505caa19a93bdf233d36730c2de803e 6dae63f48bc3e7782c20f26162e006740851c5e0 6f1de08797ff507eb27e5950169d60901dd9448b 4eb36ade8595ef6acd7baa5db389eed4fe83ad1f 67cc06d0bf8999fd3984ef89855bf861efdd6b83 770c66ea2729eb3fc0082cb668244a4285557746 5213a046 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [73:1a:2b:4a:43:dc:d1:bb:e0:e2:29:ac:2a:e0:d4:68:02:38:9e:c2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 05:11:07.012 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-06 05:11:07.014 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-06 05:11:07.017 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 05:11:07.017 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 05:11:07.018 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 05:11:07.018 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-06 05:11:07.018 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-06 05:11:07.019 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-06 05:11:07.019 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-06 05:11:07.019 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-06 05:11:07.023 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-06 05:11:07.023 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 05:11:07.024 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 05:11:07.024 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 05:11:07.193 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-06 05:11:07.194 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-06 05:11:07.194 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-06 05:11:07.195 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 05:11:07.196 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-06 05:11:07.197 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-06 05:11:07.197 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:11:07.197 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:11:07.198 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:11:07.198 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:11:07.199 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:11:07.199 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:11:07.200 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:11:07.200 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:11:07.201 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:11:07.201 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 05:11:07.204 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 469773687849548213302389279468020294913554401031 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 02:58:09 UTC 2022 Final Date: Sun Dec 05 02:58:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54 88394fbfd05d1a6aa203a4f899cd001b2c99ab7a 320c7f19760edd2832b79d5186ae1d2368c8b97b d9d555024cd8444d8fadb4b9b50de115e6749b3a 574de3430dbb42c6dd9fcddf59a0f37e41b0ce90 0b56e1a0034d460be907a991f255f7a7adaded13 193b8d62cb17ef81dd601dba33a384fbfe20d007 e113cebbb32937363acc2633bc47c37b5f332e0b 09e653e5afeaea519c946585b0b899f8828c3b25 7e87f3dc82d3e4989bb750dc5f88254aadb6ca30 389e8be9be7b19da0383b11d13fe3eaeec5fbedf cdad07d553ba9fb3e1f3e08cc47e581224ffbb13 0494aeb9b8a704728f0f63f50df6f298da7e0c67 f9630ff12505caa19a93bdf233d36730c2de803e 6dae63f48bc3e7782c20f26162e006740851c5e0 6f1de08797ff507eb27e5950169d60901dd9448b 4eb36ade8595ef6acd7baa5db389eed4fe83ad1f 67cc06d0bf8999fd3984ef89855bf861efdd6b83 770c66ea2729eb3fc0082cb668244a4285557746 5213a046 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1a:80:d8:cc:5e:81:8d:66:4d:47:81:f2:e0:c9:7d:08:9d:9b:89:73],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 05:17:57.004 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-06 05:17:57.008 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-06 05:17:57.011 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-06 05:17:57.013 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 05:17:57.013 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-06 05:17:57.014 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-06 05:17:57.014 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-06 05:17:57.015 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-06 05:17:57.016 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-06 05:17:57.017 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-06 05:17:57.023 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-06 05:17:57.024 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 05:17:57.024 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 05:17:57.025 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 05:17:57.195 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-06 05:17:57.196 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-06 05:17:57.196 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-06 05:17:57.197 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 05:17:57.198 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-06 05:17:57.199 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-06 05:17:57.199 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:17:57.200 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:17:57.200 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:17:57.201 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:17:57.201 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:17:57.202 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:17:57.202 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:17:57.202 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:17:57.203 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:17:57.203 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 05:17:57.207 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 469773687849548213302389279468020294913554401031 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 02:58:09 UTC 2022 Final Date: Sun Dec 05 02:58:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54 88394fbfd05d1a6aa203a4f899cd001b2c99ab7a 320c7f19760edd2832b79d5186ae1d2368c8b97b d9d555024cd8444d8fadb4b9b50de115e6749b3a 574de3430dbb42c6dd9fcddf59a0f37e41b0ce90 0b56e1a0034d460be907a991f255f7a7adaded13 193b8d62cb17ef81dd601dba33a384fbfe20d007 e113cebbb32937363acc2633bc47c37b5f332e0b 09e653e5afeaea519c946585b0b899f8828c3b25 7e87f3dc82d3e4989bb750dc5f88254aadb6ca30 389e8be9be7b19da0383b11d13fe3eaeec5fbedf cdad07d553ba9fb3e1f3e08cc47e581224ffbb13 0494aeb9b8a704728f0f63f50df6f298da7e0c67 f9630ff12505caa19a93bdf233d36730c2de803e 6dae63f48bc3e7782c20f26162e006740851c5e0 6f1de08797ff507eb27e5950169d60901dd9448b 4eb36ade8595ef6acd7baa5db389eed4fe83ad1f 67cc06d0bf8999fd3984ef89855bf861efdd6b83 770c66ea2729eb3fc0082cb668244a4285557746 5213a046 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [44:9e:42:a9:36:6d:0f:4b:0a:9f:cc:52:7d:b9:42:31:5c:8d:4f:c2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 05:24:29.631 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-06 05:24:29.635 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-06 05:24:29.639 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-06 05:24:29.640 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 05:24:29.641 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-06 05:24:29.641 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-06 05:24:29.642 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-06 05:24:29.642 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-06 05:24:29.643 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-06 05:24:29.643 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-06 05:24:29.647 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-06 05:24:29.648 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 05:24:29.649 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 05:24:29.650 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 05:24:29.820 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-06 05:24:29.820 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-06 05:24:29.821 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-06 05:24:29.821 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 05:24:29.822 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-06 05:24:29.823 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-06 05:24:29.823 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:24:29.823 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:24:29.823 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:24:29.824 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:24:29.825 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:24:29.825 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:24:29.825 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:24:29.826 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:24:29.826 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:24:29.827 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 05:24:29.831 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 469773687849548213302389279468020294913554401031 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 02:58:09 UTC 2022 Final Date: Sun Dec 05 02:58:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54 88394fbfd05d1a6aa203a4f899cd001b2c99ab7a 320c7f19760edd2832b79d5186ae1d2368c8b97b d9d555024cd8444d8fadb4b9b50de115e6749b3a 574de3430dbb42c6dd9fcddf59a0f37e41b0ce90 0b56e1a0034d460be907a991f255f7a7adaded13 193b8d62cb17ef81dd601dba33a384fbfe20d007 e113cebbb32937363acc2633bc47c37b5f332e0b 09e653e5afeaea519c946585b0b899f8828c3b25 7e87f3dc82d3e4989bb750dc5f88254aadb6ca30 389e8be9be7b19da0383b11d13fe3eaeec5fbedf cdad07d553ba9fb3e1f3e08cc47e581224ffbb13 0494aeb9b8a704728f0f63f50df6f298da7e0c67 f9630ff12505caa19a93bdf233d36730c2de803e 6dae63f48bc3e7782c20f26162e006740851c5e0 6f1de08797ff507eb27e5950169d60901dd9448b 4eb36ade8595ef6acd7baa5db389eed4fe83ad1f 67cc06d0bf8999fd3984ef89855bf861efdd6b83 770c66ea2729eb3fc0082cb668244a4285557746 5213a046 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:44:bb:07:92:d7:46:04:3c:d0:fc:44:ba:ff:a3:49:af:3b:49:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 05:24:46.668 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-06 05:24:46.669 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-06 05:24:46.670 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-06 05:24:46.671 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 05:24:46.671 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-06 05:24:46.672 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-06 05:24:46.672 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-06 05:24:46.673 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-06 05:24:46.673 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-06 05:24:46.673 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-06 05:24:46.677 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-06 05:24:46.677 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 05:24:46.678 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 05:24:46.678 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 05:24:46.785 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-06 05:24:46.786 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-06 05:24:46.786 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-06 05:24:46.786 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 05:24:46.788 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-06 05:24:46.788 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-06 05:24:46.788 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:24:46.789 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:24:46.789 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:24:46.790 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:24:46.790 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:24:46.791 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:24:46.792 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:24:46.792 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:24:46.792 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:24:46.793 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 05:24:46.795 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 469773687849548213302389279468020294913554401031 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 02:58:09 UTC 2022 Final Date: Sun Dec 05 02:58:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54 88394fbfd05d1a6aa203a4f899cd001b2c99ab7a 320c7f19760edd2832b79d5186ae1d2368c8b97b d9d555024cd8444d8fadb4b9b50de115e6749b3a 574de3430dbb42c6dd9fcddf59a0f37e41b0ce90 0b56e1a0034d460be907a991f255f7a7adaded13 193b8d62cb17ef81dd601dba33a384fbfe20d007 e113cebbb32937363acc2633bc47c37b5f332e0b 09e653e5afeaea519c946585b0b899f8828c3b25 7e87f3dc82d3e4989bb750dc5f88254aadb6ca30 389e8be9be7b19da0383b11d13fe3eaeec5fbedf cdad07d553ba9fb3e1f3e08cc47e581224ffbb13 0494aeb9b8a704728f0f63f50df6f298da7e0c67 f9630ff12505caa19a93bdf233d36730c2de803e 6dae63f48bc3e7782c20f26162e006740851c5e0 6f1de08797ff507eb27e5950169d60901dd9448b 4eb36ade8595ef6acd7baa5db389eed4fe83ad1f 67cc06d0bf8999fd3984ef89855bf861efdd6b83 770c66ea2729eb3fc0082cb668244a4285557746 5213a046 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6a:57:1a:8b:22:26:f7:90:65:70:0b:57:6a:9d:78:f3:83:c6:59:99],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 05:48:28.528 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-06 05:48:28.531 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-06 05:48:28.534 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-06 05:48:28.535 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 05:48:28.536 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-06 05:48:28.536 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-06 05:48:28.537 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-06 05:48:28.538 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-06 05:48:28.538 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-06 05:48:28.539 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-06 05:48:28.543 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-06 05:48:28.545 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 05:48:28.545 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 05:48:28.545 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 05:48:28.688 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-06 05:48:28.689 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-06 05:48:28.689 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-06 05:48:28.689 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 05:48:28.691 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-06 05:48:28.691 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-06 05:48:28.691 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:48:28.692 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:48:28.692 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:48:28.693 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:48:28.693 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:48:28.693 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:48:28.694 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:48:28.694 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:48:28.694 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:48:28.695 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 05:48:28.698 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 469773687849548213302389279468020294913554401031 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 02:58:09 UTC 2022 Final Date: Sun Dec 05 02:58:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4] modulus: c77ddc6f52cd255d6aaffe97f74d8fe71df11a76075467171f4eae0c1bafebe904a853898ed0642ee2d66eb1a65eaf36f0e0d41df0fb520f8949c3cf828f7036a31b99beacee49e0a16e0868d289f8dc6db88f6dbaf57930b71939fc8c30ebc76b268858c570d37fb052444e791222fda9d61e4e0e19479acffbe800afa2e3621ab4b127ab060ba2b809e7f47fc1a1083cd8c860fdaf749869b87cd09388b51c3fe8c016817a95039f24310776e456cbba9d8fb2c9e6f8997fc011144656b3c8f46188380afea76a3857fb604c28604959d3ba262552f3d8c4ab75219191c72ea99b6329b52739d04d1665fdf0abda6655c774a02b3337a46b948c3590efff053f0e7546ec973528e19c5efefb78025f4d1db4dadf6e643ee60f2f867d49a611c7f0bfd915a2d87177ae34cf4d277edda9aa2ffc94c80d32f1c561b3dd7940c910aa42371e6bb41f76610bca5699dcf1e21846b0024a5039e95ac551d087e8cb2d72518e80d435e4ddf3fda09221ec339ac68549316dd83f8b37414fe3f8908d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54 88394fbfd05d1a6aa203a4f899cd001b2c99ab7a 320c7f19760edd2832b79d5186ae1d2368c8b97b d9d555024cd8444d8fadb4b9b50de115e6749b3a 574de3430dbb42c6dd9fcddf59a0f37e41b0ce90 0b56e1a0034d460be907a991f255f7a7adaded13 193b8d62cb17ef81dd601dba33a384fbfe20d007 e113cebbb32937363acc2633bc47c37b5f332e0b 09e653e5afeaea519c946585b0b899f8828c3b25 7e87f3dc82d3e4989bb750dc5f88254aadb6ca30 389e8be9be7b19da0383b11d13fe3eaeec5fbedf cdad07d553ba9fb3e1f3e08cc47e581224ffbb13 0494aeb9b8a704728f0f63f50df6f298da7e0c67 f9630ff12505caa19a93bdf233d36730c2de803e 6dae63f48bc3e7782c20f26162e006740851c5e0 6f1de08797ff507eb27e5950169d60901dd9448b 4eb36ade8595ef6acd7baa5db389eed4fe83ad1f 67cc06d0bf8999fd3984ef89855bf861efdd6b83 770c66ea2729eb3fc0082cb668244a4285557746 5213a046 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d7:0c:4f:a2:f7:81:4e:b5:47:f6:16:27:9c:25:43:a6:95:51:db:c8],[56:66:d1:a4] modulus: a06adbb8821dd74c873724944ac4194a182f54178c270bb2e8916e07ee3946463113e5353477973adebd6b4c1933d46c7931e1beec927e3865bad0fd4addebd8fbed496c2e5d914b96e971a3137e5acd39a4d8be86d89a0a233615a4d3111aa5512f5d302e38a3715d3a68ad1db61e8e9bddf87ae50ae71634966f758737d90011bc8e18ab80760aa2931b230acaa03cde7d3785ae8e5c2963c0d99d3dd63f32728602e8877adae78bbf967e5336ed91c571687b546a8432c6cf07cb1135949f31190ad29d0028ba2059b874f59ca2f2318051d10f51147583b4abecd8fcf898ef6afd2efde06d8a37ea54559dd498ae1e494016712db44eee41742fae2cc0b5 public exponent: 10001 ] 2022-12-06 05:48:35.496 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-06 05:48:35.498 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-06 05:48:35.499 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-06 05:48:35.500 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 05:48:35.500 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-06 05:48:35.501 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-06 05:48:35.502 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-06 05:48:35.502 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-06 05:48:35.502 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-06 05:48:35.503 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-06 05:48:35.506 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-06 05:48:35.506 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 05:48:35.506 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-06 05:48:35.507 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 05:48:35.621 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-06 05:48:35.622 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-06 05:48:35.622 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-06 05:48:35.623 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 05:48:35.625 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-06 05:48:35.625 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-06 05:48:35.626 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:48:35.627 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:48:35.627 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:48:35.628 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:48:35.628 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:48:35.629 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:48:35.629 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 05:48:35.630 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-06 05:48:35.630 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-06 05:48:35.631 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 05:48:35.633 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 469773687849548213302389279468020294913554401031 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 02:58:09 UTC 2022 Final Date: Sun Dec 05 02:58:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54 88394fbfd05d1a6aa203a4f899cd001b2c99ab7a 320c7f19760edd2832b79d5186ae1d2368c8b97b d9d555024cd8444d8fadb4b9b50de115e6749b3a 574de3430dbb42c6dd9fcddf59a0f37e41b0ce90 0b56e1a0034d460be907a991f255f7a7adaded13 193b8d62cb17ef81dd601dba33a384fbfe20d007 e113cebbb32937363acc2633bc47c37b5f332e0b 09e653e5afeaea519c946585b0b899f8828c3b25 7e87f3dc82d3e4989bb750dc5f88254aadb6ca30 389e8be9be7b19da0383b11d13fe3eaeec5fbedf cdad07d553ba9fb3e1f3e08cc47e581224ffbb13 0494aeb9b8a704728f0f63f50df6f298da7e0c67 f9630ff12505caa19a93bdf233d36730c2de803e 6dae63f48bc3e7782c20f26162e006740851c5e0 6f1de08797ff507eb27e5950169d60901dd9448b 4eb36ade8595ef6acd7baa5db389eed4fe83ad1f 67cc06d0bf8999fd3984ef89855bf861efdd6b83 770c66ea2729eb3fc0082cb668244a4285557746 5213a046 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [93:b8:8d:b6:67:87:bc:10:99:29:40:dc:ff:da:e5:c7:69:34:33:da],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]