By type
2022-12-08 02:57:31,509 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-12-08 02:57:33,376 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-12-08 02:57:34.591 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Dec 08, 2022 2:57:37 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Dec 08, 2022 2:57:37 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Dec 08, 2022 2:57:37 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Dec 08, 2022 2:57:38 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-12-08 02:57:38.929 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-12-08 02:57:39.370 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-12-08 02:57:39.635 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-12-08 02:57:40.920 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-12-08 02:57:40.924 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-12-08 02:57:40.927 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-12-08 02:57:40.934 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-12-08 02:57:41.001 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-12-08 02:57:41.008 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-12-08 02:57:41.223 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-12-08 02:57:42.645 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Dec 08, 2022 2:57:44 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-12-08 02:57:44.396 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 14.765 seconds (JVM running for 17.844) Dec 08, 2022 2:58:04 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-12-08 02:58:33.067 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-08 02:58:33.082 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-08 02:58:33.148 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-08 02:58:33.155 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-08 02:58:33.204 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-08 02:58:33.208 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-08 02:58:33.209 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-08 02:58:33.210 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-08 02:58:33.211 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 02:58:33.217 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-08 02:58:33.237 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-08 02:58:33.242 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-08 02:58:33.358 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-08 02:58:33.384 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 02:58:33.387 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 02:58:33.398 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 02:58:34.212 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-08 02:58:34.216 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-08 02:58:34.217 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-08 02:58:34.219 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 02:58:34.238 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-08 02:58:34.245 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-08 02:58:34.246 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 02:58:34.246 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 02:58:34.246 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 02:58:34.287 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 02:58:34.292 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 02:58:34.293 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 02:58:34.308 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 02:58:34.309 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 02:58:34.310 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 02:58:34.312 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-08 02:58:34.403 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 589208839865928687635669034821277214525682892339 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 08 02:54:00 UTC 2022 Final Date: Tue Dec 07 02:53:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e c767e1a1713b61860efe4021ead385add8e09c81 73f28cc5765601cca4ce29094dc8bf2f6104671e 25964d7132ff9c84290a4570b09509679980d7bb 3708d126ff4dd3bdc5d0c2ae84452d76282673bc 7a8cf4c963b477b1d1e57e162c84113186b428db 026597e939843b205a76364cd258dceba8f463bd aa34339a1aada04d621fb1393bb2f5cfae1eed82 8137f00964a5a528dc7b86b5a2af2f89aeead98d 0359fb1994fb8bcfe4d2c7a6496879713d386878 f93bcafc38d3397af6d5acf9bc940889bae5e2fd 55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84 031973117c2143c930d1dfa178ab2202802b7f54 7304c52ad29d19c8418f06ab5439ee2809419e75 9dab5bfd10c010bf09d9d3d24db39e686ecd9946 14a6959374eb01142850d3f9e5c5c6ed6dbd328c 472b21f8078bad8c4fb450770fd4357adb4bf42b 5512d58b0391a920eefda1f14070eac0e3174aed 4d8be4f68858239cffc5520f1ac43b8496cae27a b22a56e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:9e:df:96:a4:d1:b7:d9:ad:ce:6b:78:a4:99:d0:86:c4:61:f9:27],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-08 04:29:24.850 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-08 04:29:24.857 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-08 04:29:24.864 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-08 04:29:24.865 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-08 04:29:24.866 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-08 04:29:24.868 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-08 04:29:24.870 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-08 04:29:24.871 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-08 04:29:24.872 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-08 04:29:24.873 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-08 04:29:24.884 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-08 04:29:24.886 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 04:29:24.887 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 04:29:24.888 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 04:29:25.097 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-08 04:29:25.099 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-08 04:29:25.100 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-08 04:29:25.101 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 04:29:25.103 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-08 04:29:25.104 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-08 04:29:25.105 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:29:25.105 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:29:25.106 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:29:25.108 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:29:25.108 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:29:25.109 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:29:25.110 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:29:25.111 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:29:25.111 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:29:25.113 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-08 04:29:25.118 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 589208839865928687635669034821277214525682892339 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 08 02:54:00 UTC 2022 Final Date: Tue Dec 07 02:53:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4] modulus: 9070b0ddd3408bd1cbe40a2bfe897e3e183aa2220b00a62b68631b4e3ac6cf9d1b3fcac3f0c1b7a01827018214f3a070d20aa40f8bff04b01e38b2e9dd8c0d6f0bd85ca06d35ffe7417e655f55a99b6bc5e5247bd4ab9e3c867ca0973f1c5b719e741c6fee11234b22e601cf527ee1a73fce1d982c8ec111baeaa1e6cbc452c2d15a05a1e751d9c78ef7bab6203b4f26b3e51db2e37c576baab6ae65965f1323329a92e9970cbbe077066dce9fc4968b1bb4fab911c413c6158aee1207072226fb35e6b6d168e5be16ebba78acc7dcb52b6fe73a5ed335324e607d0353f72e0e08fd79efbce520a2fbd6f273bc3a0f1d8dccb56be578a1fdbc120b379253a8ee1cdd65289540726fb502248551f2c257775712ca163020136575f3787a7e2550c11ca49ed7f130fecc84f2af851c7bee7692119327efaa6aad004aca1594fa696a2cbf1071f0ac53cd9403046a29d93945cee7e2c2286b57fac8397e57c6770498ead74164ffbc3e85919c5c4be2fc59c02631884dc439a4709617c39b85b671 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e c767e1a1713b61860efe4021ead385add8e09c81 73f28cc5765601cca4ce29094dc8bf2f6104671e 25964d7132ff9c84290a4570b09509679980d7bb 3708d126ff4dd3bdc5d0c2ae84452d76282673bc 7a8cf4c963b477b1d1e57e162c84113186b428db 026597e939843b205a76364cd258dceba8f463bd aa34339a1aada04d621fb1393bb2f5cfae1eed82 8137f00964a5a528dc7b86b5a2af2f89aeead98d 0359fb1994fb8bcfe4d2c7a6496879713d386878 f93bcafc38d3397af6d5acf9bc940889bae5e2fd 55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84 031973117c2143c930d1dfa178ab2202802b7f54 7304c52ad29d19c8418f06ab5439ee2809419e75 9dab5bfd10c010bf09d9d3d24db39e686ecd9946 14a6959374eb01142850d3f9e5c5c6ed6dbd328c 472b21f8078bad8c4fb450770fd4357adb4bf42b 5512d58b0391a920eefda1f14070eac0e3174aed 4d8be4f68858239cffc5520f1ac43b8496cae27a b22a56e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [64:a6:f9:df:2b:f3:6d:57:99:45:f9:94:b5:1e:e4:58:8c:5d:5b:39],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-08 04:31:12.904 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-08 04:31:12.906 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-08 04:31:12.909 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-08 04:31:12.911 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-08 04:31:12.911 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-08 04:31:12.913 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-08 04:31:12.914 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-08 04:31:12.914 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-08 04:31:12.915 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-08 04:31:12.916 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-08 04:31:12.923 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-08 04:31:12.925 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 04:31:12.926 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 04:31:12.926 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 04:31:13.109 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-08 04:31:13.109 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-08 04:31:13.110 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-08 04:31:13.110 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 04:31:13.115 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-08 04:31:13.115 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-08 04:31:13.116 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:31:13.116 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:31:13.117 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:31:13.118 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:31:13.118 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:31:13.119 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:31:13.128 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:31:13.129 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:31:13.129 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:31:13.132 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-08 04:31:13.138 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 589208839865928687635669034821277214525682892339 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 08 02:54:00 UTC 2022 Final Date: Tue Dec 07 02:53:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e c767e1a1713b61860efe4021ead385add8e09c81 73f28cc5765601cca4ce29094dc8bf2f6104671e 25964d7132ff9c84290a4570b09509679980d7bb 3708d126ff4dd3bdc5d0c2ae84452d76282673bc 7a8cf4c963b477b1d1e57e162c84113186b428db 026597e939843b205a76364cd258dceba8f463bd aa34339a1aada04d621fb1393bb2f5cfae1eed82 8137f00964a5a528dc7b86b5a2af2f89aeead98d 0359fb1994fb8bcfe4d2c7a6496879713d386878 f93bcafc38d3397af6d5acf9bc940889bae5e2fd 55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84 031973117c2143c930d1dfa178ab2202802b7f54 7304c52ad29d19c8418f06ab5439ee2809419e75 9dab5bfd10c010bf09d9d3d24db39e686ecd9946 14a6959374eb01142850d3f9e5c5c6ed6dbd328c 472b21f8078bad8c4fb450770fd4357adb4bf42b 5512d58b0391a920eefda1f14070eac0e3174aed 4d8be4f68858239cffc5520f1ac43b8496cae27a b22a56e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:3c:41:a4:aa:45:bd:ec:b2:6d:4a:20:37:96:1a:25:bd:c1:af:e8],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-08 04:33:22.512 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-08 04:33:22.519 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-08 04:33:22.525 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-08 04:33:22.531 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-08 04:33:22.532 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-08 04:33:22.534 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-08 04:33:22.534 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-08 04:33:22.535 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-08 04:33:22.538 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-08 04:33:22.539 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-08 04:33:22.548 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-08 04:33:22.552 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 04:33:22.553 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 04:33:22.554 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 04:33:22.744 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-08 04:33:22.745 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-08 04:33:22.745 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-08 04:33:22.746 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 04:33:22.750 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-08 04:33:22.751 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-08 04:33:22.757 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:33:22.759 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:33:22.762 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:33:22.769 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:33:22.770 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:33:22.770 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:33:22.775 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:33:22.777 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:33:22.778 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:33:22.781 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-08 04:33:22.789 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 589208839865928687635669034821277214525682892339 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 08 02:54:00 UTC 2022 Final Date: Tue Dec 07 02:53:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e c767e1a1713b61860efe4021ead385add8e09c81 73f28cc5765601cca4ce29094dc8bf2f6104671e 25964d7132ff9c84290a4570b09509679980d7bb 3708d126ff4dd3bdc5d0c2ae84452d76282673bc 7a8cf4c963b477b1d1e57e162c84113186b428db 026597e939843b205a76364cd258dceba8f463bd aa34339a1aada04d621fb1393bb2f5cfae1eed82 8137f00964a5a528dc7b86b5a2af2f89aeead98d 0359fb1994fb8bcfe4d2c7a6496879713d386878 f93bcafc38d3397af6d5acf9bc940889bae5e2fd 55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84 031973117c2143c930d1dfa178ab2202802b7f54 7304c52ad29d19c8418f06ab5439ee2809419e75 9dab5bfd10c010bf09d9d3d24db39e686ecd9946 14a6959374eb01142850d3f9e5c5c6ed6dbd328c 472b21f8078bad8c4fb450770fd4357adb4bf42b 5512d58b0391a920eefda1f14070eac0e3174aed 4d8be4f68858239cffc5520f1ac43b8496cae27a b22a56e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [38:e5:03:d0:80:a5:e6:7f:cd:d6:b3:dd:b1:db:8a:60:0b:b5:f2:fe],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-08 04:36:21.939 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-08 04:36:21.943 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-08 04:36:21.946 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-08 04:36:21.947 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-08 04:36:21.948 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-08 04:36:21.949 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-08 04:36:21.949 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-08 04:36:21.950 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-08 04:36:21.950 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-08 04:36:21.951 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-08 04:36:21.955 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-08 04:36:21.958 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 04:36:21.959 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 04:36:21.964 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 04:36:22.141 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-08 04:36:22.142 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-08 04:36:22.142 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-08 04:36:22.143 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 04:36:22.145 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-08 04:36:22.146 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-08 04:36:22.147 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:36:22.147 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:36:22.148 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:36:22.149 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:36:22.149 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:36:22.149 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:36:22.150 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:36:22.150 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:36:22.151 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:36:22.152 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-08 04:36:22.155 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 589208839865928687635669034821277214525682892339 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 08 02:54:00 UTC 2022 Final Date: Tue Dec 07 02:53:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e c767e1a1713b61860efe4021ead385add8e09c81 73f28cc5765601cca4ce29094dc8bf2f6104671e 25964d7132ff9c84290a4570b09509679980d7bb 3708d126ff4dd3bdc5d0c2ae84452d76282673bc 7a8cf4c963b477b1d1e57e162c84113186b428db 026597e939843b205a76364cd258dceba8f463bd aa34339a1aada04d621fb1393bb2f5cfae1eed82 8137f00964a5a528dc7b86b5a2af2f89aeead98d 0359fb1994fb8bcfe4d2c7a6496879713d386878 f93bcafc38d3397af6d5acf9bc940889bae5e2fd 55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84 031973117c2143c930d1dfa178ab2202802b7f54 7304c52ad29d19c8418f06ab5439ee2809419e75 9dab5bfd10c010bf09d9d3d24db39e686ecd9946 14a6959374eb01142850d3f9e5c5c6ed6dbd328c 472b21f8078bad8c4fb450770fd4357adb4bf42b 5512d58b0391a920eefda1f14070eac0e3174aed 4d8be4f68858239cffc5520f1ac43b8496cae27a b22a56e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [62:7e:ce:ef:51:bb:2d:a0:3d:f9:73:e7:18:47:d7:6c:b5:87:5f:58],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-08 04:43:17.998 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-08 04:43:18.000 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-08 04:43:18.002 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-08 04:43:18.003 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-08 04:43:18.004 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-08 04:43:18.004 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-08 04:43:18.005 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-08 04:43:18.005 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-08 04:43:18.006 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-08 04:43:18.006 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-08 04:43:18.012 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-08 04:43:18.013 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 04:43:18.014 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 04:43:18.014 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 04:43:18.198 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-08 04:43:18.199 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-08 04:43:18.200 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-08 04:43:18.200 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 04:43:18.201 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-08 04:43:18.202 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-08 04:43:18.202 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:43:18.202 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:43:18.203 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:43:18.204 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:43:18.205 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:43:18.206 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:43:18.207 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:43:18.208 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:43:18.208 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:43:18.209 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-08 04:43:18.212 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 589208839865928687635669034821277214525682892339 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 08 02:54:00 UTC 2022 Final Date: Tue Dec 07 02:53:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e c767e1a1713b61860efe4021ead385add8e09c81 73f28cc5765601cca4ce29094dc8bf2f6104671e 25964d7132ff9c84290a4570b09509679980d7bb 3708d126ff4dd3bdc5d0c2ae84452d76282673bc 7a8cf4c963b477b1d1e57e162c84113186b428db 026597e939843b205a76364cd258dceba8f463bd aa34339a1aada04d621fb1393bb2f5cfae1eed82 8137f00964a5a528dc7b86b5a2af2f89aeead98d 0359fb1994fb8bcfe4d2c7a6496879713d386878 f93bcafc38d3397af6d5acf9bc940889bae5e2fd 55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84 031973117c2143c930d1dfa178ab2202802b7f54 7304c52ad29d19c8418f06ab5439ee2809419e75 9dab5bfd10c010bf09d9d3d24db39e686ecd9946 14a6959374eb01142850d3f9e5c5c6ed6dbd328c 472b21f8078bad8c4fb450770fd4357adb4bf42b 5512d58b0391a920eefda1f14070eac0e3174aed 4d8be4f68858239cffc5520f1ac43b8496cae27a b22a56e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:ea:db:34:0a:59:bb:3b:c1:f4:93:b0:01:18:0b:b2:12:b2:97:1d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-08 04:48:55.385 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-08 04:48:55.387 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-08 04:48:55.391 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-08 04:48:55.393 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-08 04:48:55.393 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-08 04:48:55.394 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-08 04:48:55.395 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-08 04:48:55.395 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-08 04:48:55.396 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-08 04:48:55.397 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-08 04:48:55.404 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-08 04:48:55.406 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 04:48:55.406 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 04:48:55.407 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 04:48:55.590 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-08 04:48:55.591 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-08 04:48:55.592 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-08 04:48:55.592 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 04:48:55.594 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-08 04:48:55.594 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-08 04:48:55.595 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:48:55.595 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:48:55.595 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:48:55.596 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:48:55.597 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:48:55.597 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:48:55.598 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:48:55.598 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:48:55.599 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:48:55.599 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-08 04:48:55.604 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 589208839865928687635669034821277214525682892339 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 08 02:54:00 UTC 2022 Final Date: Tue Dec 07 02:53:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e c767e1a1713b61860efe4021ead385add8e09c81 73f28cc5765601cca4ce29094dc8bf2f6104671e 25964d7132ff9c84290a4570b09509679980d7bb 3708d126ff4dd3bdc5d0c2ae84452d76282673bc 7a8cf4c963b477b1d1e57e162c84113186b428db 026597e939843b205a76364cd258dceba8f463bd aa34339a1aada04d621fb1393bb2f5cfae1eed82 8137f00964a5a528dc7b86b5a2af2f89aeead98d 0359fb1994fb8bcfe4d2c7a6496879713d386878 f93bcafc38d3397af6d5acf9bc940889bae5e2fd 55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84 031973117c2143c930d1dfa178ab2202802b7f54 7304c52ad29d19c8418f06ab5439ee2809419e75 9dab5bfd10c010bf09d9d3d24db39e686ecd9946 14a6959374eb01142850d3f9e5c5c6ed6dbd328c 472b21f8078bad8c4fb450770fd4357adb4bf42b 5512d58b0391a920eefda1f14070eac0e3174aed 4d8be4f68858239cffc5520f1ac43b8496cae27a b22a56e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:17:d5:aa:78:96:94:46:8b:64:3c:c2:c6:b6:e4:9b:08:d1:b6:57],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-08 04:55:57.882 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-08 04:55:57.886 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-08 04:55:57.889 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-08 04:55:57.890 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-08 04:55:57.891 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-08 04:55:57.892 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-08 04:55:57.892 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-08 04:55:57.893 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-08 04:55:57.893 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-08 04:55:57.894 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-08 04:55:57.901 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-08 04:55:57.902 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 04:55:57.903 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 04:55:57.903 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 04:55:58.066 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-08 04:55:58.067 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-08 04:55:58.067 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-08 04:55:58.067 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 04:55:58.069 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-08 04:55:58.070 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-08 04:55:58.071 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:55:58.072 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:55:58.072 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:55:58.074 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:55:58.074 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:55:58.074 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:55:58.075 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 04:55:58.075 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 04:55:58.076 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 04:55:58.076 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-08 04:55:58.080 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 589208839865928687635669034821277214525682892339 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 08 02:54:00 UTC 2022 Final Date: Tue Dec 07 02:53:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e c767e1a1713b61860efe4021ead385add8e09c81 73f28cc5765601cca4ce29094dc8bf2f6104671e 25964d7132ff9c84290a4570b09509679980d7bb 3708d126ff4dd3bdc5d0c2ae84452d76282673bc 7a8cf4c963b477b1d1e57e162c84113186b428db 026597e939843b205a76364cd258dceba8f463bd aa34339a1aada04d621fb1393bb2f5cfae1eed82 8137f00964a5a528dc7b86b5a2af2f89aeead98d 0359fb1994fb8bcfe4d2c7a6496879713d386878 f93bcafc38d3397af6d5acf9bc940889bae5e2fd 55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84 031973117c2143c930d1dfa178ab2202802b7f54 7304c52ad29d19c8418f06ab5439ee2809419e75 9dab5bfd10c010bf09d9d3d24db39e686ecd9946 14a6959374eb01142850d3f9e5c5c6ed6dbd328c 472b21f8078bad8c4fb450770fd4357adb4bf42b 5512d58b0391a920eefda1f14070eac0e3174aed 4d8be4f68858239cffc5520f1ac43b8496cae27a b22a56e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ab:91:2c:54:8e:36:e4:46:ed:08:72:cb:91:cf:4a:d0:ab:56:30:75],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-08 05:01:56.192 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-08 05:01:56.196 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-08 05:01:56.199 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-08 05:01:56.200 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-08 05:01:56.201 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-08 05:01:56.202 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-08 05:01:56.202 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-08 05:01:56.203 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-08 05:01:56.203 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-08 05:01:56.204 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-08 05:01:56.209 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-08 05:01:56.210 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 05:01:56.211 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 05:01:56.212 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 05:01:56.421 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-08 05:01:56.421 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-08 05:01:56.422 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-08 05:01:56.423 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 05:01:56.424 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-08 05:01:56.425 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-08 05:01:56.426 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 05:01:56.426 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 05:01:56.426 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 05:01:56.427 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 05:01:56.427 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 05:01:56.428 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 05:01:56.428 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 05:01:56.428 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 05:01:56.429 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 05:01:56.429 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-08 05:01:56.433 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 589208839865928687635669034821277214525682892339 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 08 02:54:00 UTC 2022 Final Date: Tue Dec 07 02:53:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e c767e1a1713b61860efe4021ead385add8e09c81 73f28cc5765601cca4ce29094dc8bf2f6104671e 25964d7132ff9c84290a4570b09509679980d7bb 3708d126ff4dd3bdc5d0c2ae84452d76282673bc 7a8cf4c963b477b1d1e57e162c84113186b428db 026597e939843b205a76364cd258dceba8f463bd aa34339a1aada04d621fb1393bb2f5cfae1eed82 8137f00964a5a528dc7b86b5a2af2f89aeead98d 0359fb1994fb8bcfe4d2c7a6496879713d386878 f93bcafc38d3397af6d5acf9bc940889bae5e2fd 55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84 031973117c2143c930d1dfa178ab2202802b7f54 7304c52ad29d19c8418f06ab5439ee2809419e75 9dab5bfd10c010bf09d9d3d24db39e686ecd9946 14a6959374eb01142850d3f9e5c5c6ed6dbd328c 472b21f8078bad8c4fb450770fd4357adb4bf42b 5512d58b0391a920eefda1f14070eac0e3174aed 4d8be4f68858239cffc5520f1ac43b8496cae27a b22a56e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [03:5a:32:8b:7f:0f:74:12:3f:f9:82:05:4d:33:4b:7d:ee:dd:e8:58],[56:66:d1:a4] modulus: d1fd256ed94423a44c9cbaa5196c69aac5664fa2d42b7f6c51b1203f62f58f47fc3e723ae74a9db5294cc1016d99e6c51eabc08ad5a8b6c31caa97b9e145da17a9ade9ab81fe751d9c3799eca19bffa2ac4d75405d2c144b41557925c7ab44cf99e31238a4914b35348157c28022f6cf6b09e80147463fc8b5993007d7fae5049f6fb2c468ec75a9de10455918625937d0a8c2168d6b567675b5a4d5a8fc325d4522915e4f0e1b6d3cfd3d17300fcbeede9569dd0c1b7b1a781b3e34195b2b7fa085830d08defc24f63bf16e720e898320c9fed35089e62fc3719ef3945c09f1b7797d27fd1035f2a01d2aadea7ee43c8cab5e4a1f0f7ddfe9e5c78faae22cc1 public exponent: 10001 ] 2022-12-08 05:09:17.417 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-08 05:09:17.421 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-08 05:09:17.425 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-08 05:09:17.426 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-08 05:09:17.427 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-08 05:09:17.427 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-08 05:09:17.428 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-08 05:09:17.430 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-08 05:09:17.431 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-08 05:09:17.431 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-08 05:09:17.444 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-08 05:09:17.445 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 05:09:17.445 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 05:09:17.446 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 05:09:17.625 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-08 05:09:17.626 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-08 05:09:17.626 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-08 05:09:17.626 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 05:09:17.628 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-08 05:09:17.628 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-08 05:09:17.629 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 05:09:17.629 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 05:09:17.629 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 05:09:17.630 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 05:09:17.631 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 05:09:17.636 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 05:09:17.637 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 05:09:17.638 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 05:09:17.638 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 05:09:17.639 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-08 05:09:17.646 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 589208839865928687635669034821277214525682892339 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 08 02:54:00 UTC 2022 Final Date: Tue Dec 07 02:53:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e c767e1a1713b61860efe4021ead385add8e09c81 73f28cc5765601cca4ce29094dc8bf2f6104671e 25964d7132ff9c84290a4570b09509679980d7bb 3708d126ff4dd3bdc5d0c2ae84452d76282673bc 7a8cf4c963b477b1d1e57e162c84113186b428db 026597e939843b205a76364cd258dceba8f463bd aa34339a1aada04d621fb1393bb2f5cfae1eed82 8137f00964a5a528dc7b86b5a2af2f89aeead98d 0359fb1994fb8bcfe4d2c7a6496879713d386878 f93bcafc38d3397af6d5acf9bc940889bae5e2fd 55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84 031973117c2143c930d1dfa178ab2202802b7f54 7304c52ad29d19c8418f06ab5439ee2809419e75 9dab5bfd10c010bf09d9d3d24db39e686ecd9946 14a6959374eb01142850d3f9e5c5c6ed6dbd328c 472b21f8078bad8c4fb450770fd4357adb4bf42b 5512d58b0391a920eefda1f14070eac0e3174aed 4d8be4f68858239cffc5520f1ac43b8496cae27a b22a56e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [60:2e:82:27:44:6e:83:f2:d8:91:fe:d0:6b:5c:25:13:57:24:b7:fe],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-08 05:15:46.210 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-08 05:15:46.213 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-08 05:15:46.216 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-08 05:15:46.216 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-08 05:15:46.217 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-08 05:15:46.218 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-08 05:15:46.218 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-08 05:15:46.218 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-08 05:15:46.219 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-08 05:15:46.219 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-08 05:15:46.223 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-08 05:15:46.224 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 05:15:46.224 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 05:15:46.225 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 05:15:46.398 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-08 05:15:46.399 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-08 05:15:46.399 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-08 05:15:46.399 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 05:15:46.401 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-08 05:15:46.402 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-08 05:15:46.402 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 05:15:46.403 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 05:15:46.403 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 05:15:46.404 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 05:15:46.404 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 05:15:46.405 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 05:15:46.405 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 05:15:46.406 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 05:15:46.406 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 05:15:46.407 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-08 05:15:46.411 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 589208839865928687635669034821277214525682892339 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 08 02:54:00 UTC 2022 Final Date: Tue Dec 07 02:53:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e c767e1a1713b61860efe4021ead385add8e09c81 73f28cc5765601cca4ce29094dc8bf2f6104671e 25964d7132ff9c84290a4570b09509679980d7bb 3708d126ff4dd3bdc5d0c2ae84452d76282673bc 7a8cf4c963b477b1d1e57e162c84113186b428db 026597e939843b205a76364cd258dceba8f463bd aa34339a1aada04d621fb1393bb2f5cfae1eed82 8137f00964a5a528dc7b86b5a2af2f89aeead98d 0359fb1994fb8bcfe4d2c7a6496879713d386878 f93bcafc38d3397af6d5acf9bc940889bae5e2fd 55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84 031973117c2143c930d1dfa178ab2202802b7f54 7304c52ad29d19c8418f06ab5439ee2809419e75 9dab5bfd10c010bf09d9d3d24db39e686ecd9946 14a6959374eb01142850d3f9e5c5c6ed6dbd328c 472b21f8078bad8c4fb450770fd4357adb4bf42b 5512d58b0391a920eefda1f14070eac0e3174aed 4d8be4f68858239cffc5520f1ac43b8496cae27a b22a56e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:5f:01:eb:29:a5:f6:9c:25:85:0c:bc:3c:35:ac:44:9e:76:fa:bd],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-08 05:16:05.231 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-08 05:16:05.237 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-08 05:16:05.240 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-08 05:16:05.241 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-08 05:16:05.241 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-08 05:16:05.242 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-08 05:16:05.243 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-08 05:16:05.243 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-08 05:16:05.244 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-08 05:16:05.244 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-08 05:16:05.249 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-08 05:16:05.252 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 05:16:05.252 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 05:16:05.252 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 05:16:05.359 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-08 05:16:05.360 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-08 05:16:05.360 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-08 05:16:05.361 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 05:16:05.363 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-08 05:16:05.364 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-08 05:16:05.365 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 05:16:05.365 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 05:16:05.365 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 05:16:05.367 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 05:16:05.368 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 05:16:05.368 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 05:16:05.372 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 05:16:05.372 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 05:16:05.372 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 05:16:05.373 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-08 05:16:05.383 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 589208839865928687635669034821277214525682892339 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 08 02:54:00 UTC 2022 Final Date: Tue Dec 07 02:53:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4] modulus: 9070b0ddd3408bd1cbe40a2bfe897e3e183aa2220b00a62b68631b4e3ac6cf9d1b3fcac3f0c1b7a01827018214f3a070d20aa40f8bff04b01e38b2e9dd8c0d6f0bd85ca06d35ffe7417e655f55a99b6bc5e5247bd4ab9e3c867ca0973f1c5b719e741c6fee11234b22e601cf527ee1a73fce1d982c8ec111baeaa1e6cbc452c2d15a05a1e751d9c78ef7bab6203b4f26b3e51db2e37c576baab6ae65965f1323329a92e9970cbbe077066dce9fc4968b1bb4fab911c413c6158aee1207072226fb35e6b6d168e5be16ebba78acc7dcb52b6fe73a5ed335324e607d0353f72e0e08fd79efbce520a2fbd6f273bc3a0f1d8dccb56be578a1fdbc120b379253a8ee1cdd65289540726fb502248551f2c257775712ca163020136575f3787a7e2550c11ca49ed7f130fecc84f2af851c7bee7692119327efaa6aad004aca1594fa696a2cbf1071f0ac53cd9403046a29d93945cee7e2c2286b57fac8397e57c6770498ead74164ffbc3e85919c5c4be2fc59c02631884dc439a4709617c39b85b671 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e c767e1a1713b61860efe4021ead385add8e09c81 73f28cc5765601cca4ce29094dc8bf2f6104671e 25964d7132ff9c84290a4570b09509679980d7bb 3708d126ff4dd3bdc5d0c2ae84452d76282673bc 7a8cf4c963b477b1d1e57e162c84113186b428db 026597e939843b205a76364cd258dceba8f463bd aa34339a1aada04d621fb1393bb2f5cfae1eed82 8137f00964a5a528dc7b86b5a2af2f89aeead98d 0359fb1994fb8bcfe4d2c7a6496879713d386878 f93bcafc38d3397af6d5acf9bc940889bae5e2fd 55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84 031973117c2143c930d1dfa178ab2202802b7f54 7304c52ad29d19c8418f06ab5439ee2809419e75 9dab5bfd10c010bf09d9d3d24db39e686ecd9946 14a6959374eb01142850d3f9e5c5c6ed6dbd328c 472b21f8078bad8c4fb450770fd4357adb4bf42b 5512d58b0391a920eefda1f14070eac0e3174aed 4d8be4f68858239cffc5520f1ac43b8496cae27a b22a56e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [88:2a:43:23:f2:d2:e4:58:5e:04:e5:e9:77:8e:40:71:29:fc:8f:b8],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-08 05:39:40.040 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-08 05:39:40.043 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-08 05:39:40.046 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-08 05:39:40.046 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-08 05:39:40.047 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-08 05:39:40.048 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-08 05:39:40.048 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-08 05:39:40.048 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-08 05:39:40.049 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-08 05:39:40.049 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-08 05:39:40.055 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-08 05:39:40.057 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 05:39:40.057 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 05:39:40.058 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 05:39:40.269 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-08 05:39:40.270 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-08 05:39:40.270 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-08 05:39:40.271 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 05:39:40.272 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-08 05:39:40.273 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-08 05:39:40.274 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 05:39:40.274 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 05:39:40.274 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 05:39:40.276 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 05:39:40.276 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 05:39:40.276 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 05:39:40.277 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 05:39:40.278 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 05:39:40.278 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 05:39:40.279 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-08 05:39:40.284 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 589208839865928687635669034821277214525682892339 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 08 02:54:00 UTC 2022 Final Date: Tue Dec 07 02:53:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e c767e1a1713b61860efe4021ead385add8e09c81 73f28cc5765601cca4ce29094dc8bf2f6104671e 25964d7132ff9c84290a4570b09509679980d7bb 3708d126ff4dd3bdc5d0c2ae84452d76282673bc 7a8cf4c963b477b1d1e57e162c84113186b428db 026597e939843b205a76364cd258dceba8f463bd aa34339a1aada04d621fb1393bb2f5cfae1eed82 8137f00964a5a528dc7b86b5a2af2f89aeead98d 0359fb1994fb8bcfe4d2c7a6496879713d386878 f93bcafc38d3397af6d5acf9bc940889bae5e2fd 55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84 031973117c2143c930d1dfa178ab2202802b7f54 7304c52ad29d19c8418f06ab5439ee2809419e75 9dab5bfd10c010bf09d9d3d24db39e686ecd9946 14a6959374eb01142850d3f9e5c5c6ed6dbd328c 472b21f8078bad8c4fb450770fd4357adb4bf42b 5512d58b0391a920eefda1f14070eac0e3174aed 4d8be4f68858239cffc5520f1ac43b8496cae27a b22a56e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:24:6e:30:2b:b0:32:0c:03:04:d8:9e:d7:d6:4e:15:8b:31:ea:7f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-08 05:39:47.356 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-12-08 05:39:47.357 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-12-08 05:39:47.359 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-08 05:39:47.360 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-08 05:39:47.360 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-08 05:39:47.361 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-12-08 05:39:47.362 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-12-08 05:39:47.362 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-12-08 05:39:47.362 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-12-08 05:39:47.364 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-12-08 05:39:47.368 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-12-08 05:39:47.368 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 05:39:47.369 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-12-08 05:39:47.369 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 05:39:47.497 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-12-08 05:39:47.498 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-12-08 05:39:47.498 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-12-08 05:39:47.498 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-12-08 05:39:47.499 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-12-08 05:39:47.500 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-12-08 05:39:47.500 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 05:39:47.500 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 05:39:47.501 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 05:39:47.501 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 05:39:47.501 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 05:39:47.501 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 05:39:47.502 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-08 05:39:47.502 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-12-08 05:39:47.502 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-12-08 05:39:47.503 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-08 05:39:47.507 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 589208839865928687635669034821277214525682892339 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 08 02:54:00 UTC 2022 Final Date: Tue Dec 07 02:53:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e c767e1a1713b61860efe4021ead385add8e09c81 73f28cc5765601cca4ce29094dc8bf2f6104671e 25964d7132ff9c84290a4570b09509679980d7bb 3708d126ff4dd3bdc5d0c2ae84452d76282673bc 7a8cf4c963b477b1d1e57e162c84113186b428db 026597e939843b205a76364cd258dceba8f463bd aa34339a1aada04d621fb1393bb2f5cfae1eed82 8137f00964a5a528dc7b86b5a2af2f89aeead98d 0359fb1994fb8bcfe4d2c7a6496879713d386878 f93bcafc38d3397af6d5acf9bc940889bae5e2fd 55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84 031973117c2143c930d1dfa178ab2202802b7f54 7304c52ad29d19c8418f06ab5439ee2809419e75 9dab5bfd10c010bf09d9d3d24db39e686ecd9946 14a6959374eb01142850d3f9e5c5c6ed6dbd328c 472b21f8078bad8c4fb450770fd4357adb4bf42b 5512d58b0391a920eefda1f14070eac0e3174aed 4d8be4f68858239cffc5520f1ac43b8496cae27a b22a56e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ab:02:49:e8:cf:43:1c:87:bc:3e:d6:89:5b:cf:c1:e8:36:56:78:a9],[56:66:d1:a4] modulus: c2061ee8937e5040d44103dd849e1df95ddf789bc16c122e0a252930fe78e0b6a23f6bd9f28d1e6f8f1850fdaadfc2d825a1c9c537621860fb8877b0534fe6cdc551772e6df7a9aa6ce479f548afc703985c3e6d5b29a7742b29165133ade7a80d1653ebca3e03e955a29ef7785617d1c438c052631ec4648edc61325a98f940112d600a229d79fb25b91bde8e036441f9d4a1035c9798916caf752efa1f392e8aae159c39cc1ab297dc545286acbc9d186c98e1d21d4d0770d56b3940b7cd588b5ae65868081caf843dc4ecd5b839a6108c8dec2638d414a00d70e8c0e31618f1f1ab65dc0eefbbd3245fc8c5686a9d393a86b64724eceee0487ad8aa0010bb public exponent: 10001 ]