By type
2023-01-24 03:20:30,238 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-24 03:20:31,316 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-24 03:20:32.010 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jan 24, 2023 3:20:33 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 24, 2023 3:20:33 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 24, 2023 3:20:33 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 24, 2023 3:20:33 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-24 03:20:34.408 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-24 03:20:34.674 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-01-24 03:20:34.829 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-24 03:20:35.528 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-24 03:20:35.531 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-24 03:20:35.532 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-24 03:20:35.535 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-24 03:20:35.573 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2023-01-24 03:20:35.576 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-01-24 03:20:35.696 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-01-24 03:20:36.248 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 24, 2023 3:20:36 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-24 03:20:37.101 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.827 seconds (JVM running for 9.49) Jan 24, 2023 3:21:00 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-24 03:21:19.616 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 03:21:19.624 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 03:21:19.663 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-24 03:21:19.666 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 03:21:19.682 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-24 03:21:19.685 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 03:21:19.686 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 03:21:19.688 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 03:21:19.689 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 03:21:19.693 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 03:21:19.705 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 03:21:19.709 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 03:21:19.765 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 03:21:19.773 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 03:21:19.774 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 03:21:19.777 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 03:21:21.049 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 03:21:21.052 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 03:21:21.053 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 03:21:21.058 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 03:21:21.071 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 03:21:21.072 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 03:21:21.073 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 03:21:21.074 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 03:21:21.076 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 03:21:21.101 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 03:21:21.102 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 03:21:21.102 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 03:21:21.113 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 03:21:21.114 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 03:21:21.114 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 03:21:21.116 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 03:21:21.161 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 615363494371566137961964144469137417779234395126 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 03:14:36 UTC 2023 Final Date: Sun Jan 23 03:14:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea 5b694c376a2dd27b1c548b068da6549403764180 654cbf69b1fc050e3ddb415cf337752a4da5d391 82b4126b8d9143e66d31305e48ce65857cc016e4 01ea6af928f922e990f1ce96b95c8522c7ad7da4 969649c91949046d9b853870bd7f3fdf35ef5118 48c1dffb21fd528fb7f4e4956fc9a342f947d726 4625cde5ac69932979a758efdcc72845d462440d f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b 748db0a0644d59b1b32a5253bb57868ae18ece05 79c63f8722056f990f46fbb6694fdaddb8e65e8a d912d3a540dde19b4c9605f1e395d16da19d3a1e 912bfe649edd7895204939c0f72304dc3d728792 5e30702541c8852b8d124f3966e46a7c99ae7941 8e929f3b96718456e60a56ce2ab10190e30a3bd5 ceab0cdfa5db320312a87ce598c36865e538c054 32361951ab81b6cfa5188ef8b9e0c6e248ae452d 5af71685bb20554fd7ccaef830ec2e259b94dcc0 cb6ad91125473d51fa9aae96a7697ab35c976000 c7ad1e04 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1f:fe:b4:9c:eb:97:b1:cd:fd:1a:3e:e6:07:53:22:32:65:7b:60:05],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 05:09:25.948 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 05:09:25.952 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 05:09:25.960 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 05:09:25.962 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 05:09:25.963 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 05:09:25.966 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 05:09:25.967 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 05:09:25.968 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 05:09:25.970 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 05:09:25.971 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 05:09:25.976 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 05:09:25.977 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:09:25.977 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:09:25.978 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:09:26.486 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 05:09:26.487 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 05:09:26.488 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 05:09:26.488 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:09:26.492 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 05:09:26.493 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 05:09:26.494 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:09:26.494 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:09:26.495 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:09:26.496 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:09:26.497 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:09:26.497 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:09:26.498 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:09:26.499 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:09:26.499 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:09:26.500 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 05:09:26.505 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 615363494371566137961964144469137417779234395126 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 03:14:36 UTC 2023 Final Date: Sun Jan 23 03:14:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea 5b694c376a2dd27b1c548b068da6549403764180 654cbf69b1fc050e3ddb415cf337752a4da5d391 82b4126b8d9143e66d31305e48ce65857cc016e4 01ea6af928f922e990f1ce96b95c8522c7ad7da4 969649c91949046d9b853870bd7f3fdf35ef5118 48c1dffb21fd528fb7f4e4956fc9a342f947d726 4625cde5ac69932979a758efdcc72845d462440d f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b 748db0a0644d59b1b32a5253bb57868ae18ece05 79c63f8722056f990f46fbb6694fdaddb8e65e8a d912d3a540dde19b4c9605f1e395d16da19d3a1e 912bfe649edd7895204939c0f72304dc3d728792 5e30702541c8852b8d124f3966e46a7c99ae7941 8e929f3b96718456e60a56ce2ab10190e30a3bd5 ceab0cdfa5db320312a87ce598c36865e538c054 32361951ab81b6cfa5188ef8b9e0c6e248ae452d 5af71685bb20554fd7ccaef830ec2e259b94dcc0 cb6ad91125473d51fa9aae96a7697ab35c976000 c7ad1e04 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d2:6d:13:9b:be:36:3b:66:e0:47:f8:f8:92:c4:13:e5:26:c6:1d:df],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 05:11:11.763 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 05:11:11.765 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 05:11:11.767 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-24 05:11:11.769 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 05:11:11.769 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-24 05:11:11.771 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 05:11:11.772 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 05:11:11.773 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 05:11:11.773 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 05:11:11.775 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 05:11:11.782 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 05:11:11.783 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:11:11.784 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:11:11.785 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:11:11.979 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 05:11:11.980 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 05:11:11.985 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 05:11:11.986 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:11:11.988 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 05:11:11.989 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 05:11:11.990 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:11:11.990 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:11:11.990 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:11:11.991 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:11:11.992 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:11:11.992 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:11:11.993 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:11:11.993 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:11:12.000 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:11:12.004 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 05:11:12.010 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 615363494371566137961964144469137417779234395126 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 03:14:36 UTC 2023 Final Date: Sun Jan 23 03:14:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea 5b694c376a2dd27b1c548b068da6549403764180 654cbf69b1fc050e3ddb415cf337752a4da5d391 82b4126b8d9143e66d31305e48ce65857cc016e4 01ea6af928f922e990f1ce96b95c8522c7ad7da4 969649c91949046d9b853870bd7f3fdf35ef5118 48c1dffb21fd528fb7f4e4956fc9a342f947d726 4625cde5ac69932979a758efdcc72845d462440d f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b 748db0a0644d59b1b32a5253bb57868ae18ece05 79c63f8722056f990f46fbb6694fdaddb8e65e8a d912d3a540dde19b4c9605f1e395d16da19d3a1e 912bfe649edd7895204939c0f72304dc3d728792 5e30702541c8852b8d124f3966e46a7c99ae7941 8e929f3b96718456e60a56ce2ab10190e30a3bd5 ceab0cdfa5db320312a87ce598c36865e538c054 32361951ab81b6cfa5188ef8b9e0c6e248ae452d 5af71685bb20554fd7ccaef830ec2e259b94dcc0 cb6ad91125473d51fa9aae96a7697ab35c976000 c7ad1e04 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [39:0e:8c:81:0e:d8:d0:a4:47:bd:0f:93:26:20:82:74:e1:39:41:10],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 05:13:54.411 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 05:13:54.412 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 05:13:54.414 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-24 05:13:54.414 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 05:13:54.415 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-24 05:13:54.415 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 05:13:54.416 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 05:13:54.416 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 05:13:54.416 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 05:13:54.417 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 05:13:54.421 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 05:13:54.421 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:13:54.422 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:13:54.422 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:13:54.699 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 05:13:54.699 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 05:13:54.700 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 05:13:54.700 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:13:54.702 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 05:13:54.702 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 05:13:54.703 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:13:54.703 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:13:54.704 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:13:54.704 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:13:54.705 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:13:54.705 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:13:54.706 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:13:54.706 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:13:54.707 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:13:54.707 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 05:13:54.712 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 615363494371566137961964144469137417779234395126 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 03:14:36 UTC 2023 Final Date: Sun Jan 23 03:14:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea 5b694c376a2dd27b1c548b068da6549403764180 654cbf69b1fc050e3ddb415cf337752a4da5d391 82b4126b8d9143e66d31305e48ce65857cc016e4 01ea6af928f922e990f1ce96b95c8522c7ad7da4 969649c91949046d9b853870bd7f3fdf35ef5118 48c1dffb21fd528fb7f4e4956fc9a342f947d726 4625cde5ac69932979a758efdcc72845d462440d f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b 748db0a0644d59b1b32a5253bb57868ae18ece05 79c63f8722056f990f46fbb6694fdaddb8e65e8a d912d3a540dde19b4c9605f1e395d16da19d3a1e 912bfe649edd7895204939c0f72304dc3d728792 5e30702541c8852b8d124f3966e46a7c99ae7941 8e929f3b96718456e60a56ce2ab10190e30a3bd5 ceab0cdfa5db320312a87ce598c36865e538c054 32361951ab81b6cfa5188ef8b9e0c6e248ae452d 5af71685bb20554fd7ccaef830ec2e259b94dcc0 cb6ad91125473d51fa9aae96a7697ab35c976000 c7ad1e04 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [85:6d:01:f1:8f:2d:b8:4e:40:f5:b1:b7:71:f4:eb:a0:35:e3:e6:05],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 05:16:55.018 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 05:16:55.021 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 05:16:55.024 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 05:16:55.025 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 05:16:55.026 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 05:16:55.027 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 05:16:55.028 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 05:16:55.028 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 05:16:55.029 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 05:16:55.029 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 05:16:55.035 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 05:16:55.036 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:16:55.036 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:16:55.037 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:16:55.310 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 05:16:55.313 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 05:16:55.314 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 05:16:55.315 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:16:55.319 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 05:16:55.323 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 05:16:55.327 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:16:55.329 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:16:55.330 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:16:55.331 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:16:55.332 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:16:55.332 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:16:55.333 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:16:55.333 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:16:55.334 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:16:55.335 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 05:16:55.338 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 615363494371566137961964144469137417779234395126 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 03:14:36 UTC 2023 Final Date: Sun Jan 23 03:14:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea 5b694c376a2dd27b1c548b068da6549403764180 654cbf69b1fc050e3ddb415cf337752a4da5d391 82b4126b8d9143e66d31305e48ce65857cc016e4 01ea6af928f922e990f1ce96b95c8522c7ad7da4 969649c91949046d9b853870bd7f3fdf35ef5118 48c1dffb21fd528fb7f4e4956fc9a342f947d726 4625cde5ac69932979a758efdcc72845d462440d f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b 748db0a0644d59b1b32a5253bb57868ae18ece05 79c63f8722056f990f46fbb6694fdaddb8e65e8a d912d3a540dde19b4c9605f1e395d16da19d3a1e 912bfe649edd7895204939c0f72304dc3d728792 5e30702541c8852b8d124f3966e46a7c99ae7941 8e929f3b96718456e60a56ce2ab10190e30a3bd5 ceab0cdfa5db320312a87ce598c36865e538c054 32361951ab81b6cfa5188ef8b9e0c6e248ae452d 5af71685bb20554fd7ccaef830ec2e259b94dcc0 cb6ad91125473d51fa9aae96a7697ab35c976000 c7ad1e04 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a3:e0:a8:dc:49:31:a3:88:51:f6:80:7e:1b:f2:ee:66:18:16:95:17],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 05:24:11.556 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 05:24:11.559 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 05:24:11.561 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 05:24:11.562 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 05:24:11.563 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 05:24:11.564 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 05:24:11.564 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 05:24:11.565 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 05:24:11.570 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 05:24:11.570 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 05:24:11.578 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 05:24:11.580 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:24:11.581 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:24:11.581 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:24:11.923 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 05:24:11.924 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 05:24:11.924 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 05:24:11.925 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:24:11.926 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 05:24:11.926 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 05:24:11.927 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:24:11.927 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:24:11.927 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:24:11.928 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:24:11.928 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:24:11.929 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:24:11.930 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:24:11.930 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:24:11.930 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:24:11.932 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 05:24:11.935 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 615363494371566137961964144469137417779234395126 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 03:14:36 UTC 2023 Final Date: Sun Jan 23 03:14:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea 5b694c376a2dd27b1c548b068da6549403764180 654cbf69b1fc050e3ddb415cf337752a4da5d391 82b4126b8d9143e66d31305e48ce65857cc016e4 01ea6af928f922e990f1ce96b95c8522c7ad7da4 969649c91949046d9b853870bd7f3fdf35ef5118 48c1dffb21fd528fb7f4e4956fc9a342f947d726 4625cde5ac69932979a758efdcc72845d462440d f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b 748db0a0644d59b1b32a5253bb57868ae18ece05 79c63f8722056f990f46fbb6694fdaddb8e65e8a d912d3a540dde19b4c9605f1e395d16da19d3a1e 912bfe649edd7895204939c0f72304dc3d728792 5e30702541c8852b8d124f3966e46a7c99ae7941 8e929f3b96718456e60a56ce2ab10190e30a3bd5 ceab0cdfa5db320312a87ce598c36865e538c054 32361951ab81b6cfa5188ef8b9e0c6e248ae452d 5af71685bb20554fd7ccaef830ec2e259b94dcc0 cb6ad91125473d51fa9aae96a7697ab35c976000 c7ad1e04 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [21:2c:fd:1c:4b:7d:0e:12:91:39:2a:8f:9f:7d:e9:8e:9a:33:3b:4a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 05:32:09.887 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 05:32:09.896 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 05:32:09.898 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 05:32:09.898 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 05:32:09.899 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 05:32:09.899 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 05:32:09.901 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 05:32:09.902 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 05:32:09.902 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 05:32:09.903 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 05:32:09.907 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 05:32:09.907 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:32:09.908 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:32:09.908 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:32:10.162 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 05:32:10.163 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 05:32:10.164 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 05:32:10.164 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:32:10.165 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 05:32:10.166 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 05:32:10.166 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:32:10.166 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:32:10.167 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:32:10.167 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:32:10.168 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:32:10.168 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:32:10.169 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:32:10.170 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:32:10.170 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:32:10.171 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 05:32:10.174 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 615363494371566137961964144469137417779234395126 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 03:14:36 UTC 2023 Final Date: Sun Jan 23 03:14:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea 5b694c376a2dd27b1c548b068da6549403764180 654cbf69b1fc050e3ddb415cf337752a4da5d391 82b4126b8d9143e66d31305e48ce65857cc016e4 01ea6af928f922e990f1ce96b95c8522c7ad7da4 969649c91949046d9b853870bd7f3fdf35ef5118 48c1dffb21fd528fb7f4e4956fc9a342f947d726 4625cde5ac69932979a758efdcc72845d462440d f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b 748db0a0644d59b1b32a5253bb57868ae18ece05 79c63f8722056f990f46fbb6694fdaddb8e65e8a d912d3a540dde19b4c9605f1e395d16da19d3a1e 912bfe649edd7895204939c0f72304dc3d728792 5e30702541c8852b8d124f3966e46a7c99ae7941 8e929f3b96718456e60a56ce2ab10190e30a3bd5 ceab0cdfa5db320312a87ce598c36865e538c054 32361951ab81b6cfa5188ef8b9e0c6e248ae452d 5af71685bb20554fd7ccaef830ec2e259b94dcc0 cb6ad91125473d51fa9aae96a7697ab35c976000 c7ad1e04 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b6:f3:4b:4d:0f:1a:bc:80:a7:53:8a:37:af:e4:4e:5e:5b:02:50:b0],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 05:39:30.260 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 05:39:30.262 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 05:39:30.264 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 05:39:30.265 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 05:39:30.266 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 05:39:30.266 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 05:39:30.267 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 05:39:30.267 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 05:39:30.268 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 05:39:30.268 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 05:39:30.273 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 05:39:30.274 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:39:30.274 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:39:30.275 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:39:30.612 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 05:39:30.613 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 05:39:30.613 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 05:39:30.614 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:39:30.615 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 05:39:30.616 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 05:39:30.616 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:39:30.616 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:39:30.617 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:39:30.618 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:39:30.618 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:39:30.618 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:39:30.619 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:39:30.619 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:39:30.620 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:39:30.620 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 05:39:30.624 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 615363494371566137961964144469137417779234395126 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 03:14:36 UTC 2023 Final Date: Sun Jan 23 03:14:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea 5b694c376a2dd27b1c548b068da6549403764180 654cbf69b1fc050e3ddb415cf337752a4da5d391 82b4126b8d9143e66d31305e48ce65857cc016e4 01ea6af928f922e990f1ce96b95c8522c7ad7da4 969649c91949046d9b853870bd7f3fdf35ef5118 48c1dffb21fd528fb7f4e4956fc9a342f947d726 4625cde5ac69932979a758efdcc72845d462440d f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b 748db0a0644d59b1b32a5253bb57868ae18ece05 79c63f8722056f990f46fbb6694fdaddb8e65e8a d912d3a540dde19b4c9605f1e395d16da19d3a1e 912bfe649edd7895204939c0f72304dc3d728792 5e30702541c8852b8d124f3966e46a7c99ae7941 8e929f3b96718456e60a56ce2ab10190e30a3bd5 ceab0cdfa5db320312a87ce598c36865e538c054 32361951ab81b6cfa5188ef8b9e0c6e248ae452d 5af71685bb20554fd7ccaef830ec2e259b94dcc0 cb6ad91125473d51fa9aae96a7697ab35c976000 c7ad1e04 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2a:cf:a9:28:85:b8:f3:39:04:0f:52:5d:68:3a:ac:60:0a:8e:52:4d],[56:66:d1:a4] modulus: c15452490b564492b3721b6a70e083ab0197d239473650ed543661937f8cd761b02009f57c273d9c0d76e2dfdc6924676cb8cccd0231a04826d12a5f5704536f1c77fcbf67d78b595db951f86679d271bb16c7fee49e6d2f7fa39c171f9bf7f0d293a0844b0aec25766b7d25d68b32054d20b4a413f276bd30e9982c1f2eed1c191b6ea6249e3cdad922d72ca59fd97d23d8758666b9187753e54af086b5fffbd1328fbd298dcb3a8dffa7dc6d6a388cb0e824ec006133f9a82ce66acbd8742ce8160147fe1ee2dbae7d954c75ee80b0f108621e2d51bcb685a2f6d36e3e89d4963160c66a35fcd3cd5ca62fb1fef90c1afca4f758b8e25cc145617e780b3945 public exponent: 10001 ] 2023-01-24 05:47:07.234 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 05:47:07.236 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 05:47:07.239 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 05:47:07.240 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 05:47:07.240 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 05:47:07.241 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 05:47:07.241 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 05:47:07.242 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 05:47:07.242 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 05:47:07.242 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 05:47:07.246 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 05:47:07.247 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:47:07.247 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:47:07.248 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:47:07.492 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 05:47:07.493 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 05:47:07.493 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 05:47:07.494 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:47:07.496 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 05:47:07.496 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 05:47:07.497 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:47:07.497 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:47:07.498 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:47:07.499 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:47:07.500 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:47:07.500 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:47:07.501 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:47:07.501 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:47:07.502 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:47:07.503 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 05:47:07.507 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 615363494371566137961964144469137417779234395126 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 03:14:36 UTC 2023 Final Date: Sun Jan 23 03:14:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea 5b694c376a2dd27b1c548b068da6549403764180 654cbf69b1fc050e3ddb415cf337752a4da5d391 82b4126b8d9143e66d31305e48ce65857cc016e4 01ea6af928f922e990f1ce96b95c8522c7ad7da4 969649c91949046d9b853870bd7f3fdf35ef5118 48c1dffb21fd528fb7f4e4956fc9a342f947d726 4625cde5ac69932979a758efdcc72845d462440d f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b 748db0a0644d59b1b32a5253bb57868ae18ece05 79c63f8722056f990f46fbb6694fdaddb8e65e8a d912d3a540dde19b4c9605f1e395d16da19d3a1e 912bfe649edd7895204939c0f72304dc3d728792 5e30702541c8852b8d124f3966e46a7c99ae7941 8e929f3b96718456e60a56ce2ab10190e30a3bd5 ceab0cdfa5db320312a87ce598c36865e538c054 32361951ab81b6cfa5188ef8b9e0c6e248ae452d 5af71685bb20554fd7ccaef830ec2e259b94dcc0 cb6ad91125473d51fa9aae96a7697ab35c976000 c7ad1e04 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e1:98:6a:36:60:ab:50:ab:df:f9:07:59:a0:fb:af:6c:f5:47:1e:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 05:54:20.803 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 05:54:20.804 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 05:54:20.806 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-24 05:54:20.807 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 05:54:20.807 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-24 05:54:20.808 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 05:54:20.808 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 05:54:20.808 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 05:54:20.809 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 05:54:20.809 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 05:54:20.813 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 05:54:20.813 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:54:20.814 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:54:20.814 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:54:21.102 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 05:54:21.102 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 05:54:21.103 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 05:54:21.103 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:54:21.104 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 05:54:21.104 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 05:54:21.105 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:54:21.106 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:54:21.106 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:54:21.108 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:54:21.108 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:54:21.108 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:54:21.109 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:54:21.109 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:54:21.110 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:54:21.110 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 05:54:21.113 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 615363494371566137961964144469137417779234395126 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 03:14:36 UTC 2023 Final Date: Sun Jan 23 03:14:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea 5b694c376a2dd27b1c548b068da6549403764180 654cbf69b1fc050e3ddb415cf337752a4da5d391 82b4126b8d9143e66d31305e48ce65857cc016e4 01ea6af928f922e990f1ce96b95c8522c7ad7da4 969649c91949046d9b853870bd7f3fdf35ef5118 48c1dffb21fd528fb7f4e4956fc9a342f947d726 4625cde5ac69932979a758efdcc72845d462440d f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b 748db0a0644d59b1b32a5253bb57868ae18ece05 79c63f8722056f990f46fbb6694fdaddb8e65e8a d912d3a540dde19b4c9605f1e395d16da19d3a1e 912bfe649edd7895204939c0f72304dc3d728792 5e30702541c8852b8d124f3966e46a7c99ae7941 8e929f3b96718456e60a56ce2ab10190e30a3bd5 ceab0cdfa5db320312a87ce598c36865e538c054 32361951ab81b6cfa5188ef8b9e0c6e248ae452d 5af71685bb20554fd7ccaef830ec2e259b94dcc0 cb6ad91125473d51fa9aae96a7697ab35c976000 c7ad1e04 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ad:5f:66:81:a4:18:f1:46:bb:e9:0d:10:4c:a8:1c:e7:5a:ee:19:2a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 06:02:15.598 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 06:02:15.602 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 06:02:15.606 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-24 06:02:15.607 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 06:02:15.607 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-24 06:02:15.608 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 06:02:15.609 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 06:02:15.609 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 06:02:15.610 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 06:02:15.611 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 06:02:15.624 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 06:02:15.625 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 06:02:15.625 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 06:02:15.626 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 06:02:16.100 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 06:02:16.101 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 06:02:16.101 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 06:02:16.102 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 06:02:16.103 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 06:02:16.103 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 06:02:16.104 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 06:02:16.104 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 06:02:16.104 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 06:02:16.105 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 06:02:16.105 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 06:02:16.106 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 06:02:16.106 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 06:02:16.107 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 06:02:16.107 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 06:02:16.108 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 06:02:16.111 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 615363494371566137961964144469137417779234395126 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 03:14:36 UTC 2023 Final Date: Sun Jan 23 03:14:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4] modulus: 9e869a1c115bbe7ef5a9329d00fe50ef1bb1a2a1c66e89b88ac870953993c03711502d75b653cf8e51aa037ee6409b8ffbf490473d24137c20a3c36ab8943d7b5a9b9d9623d1d354108c6891f7c73743cec809869ff2e686dfdbad23b5367cdf9c71c75341fca4bf939822977dd3cd182a2acec35900ab2493cd13b91091a6fb5a2a166c13ed610ceecfb5461734dc4bc60eb8145c057ad69574c40a4a958a12fc2396082b8a874cba60d7b13212010870695f066a40394f35b8499cb85699b5887efd682b6cb9f99654e2255949e1e09f9b5b1a86e99544e909b4aac9504a769d02bc2fe8932823f767b077d5c232b167c3d69c88bdb49501ab5fa7663b50c95bb4fa08caab05272886dc8827479ee3a6bdf653bbfa44ba875d3bf50218eca728cf6edc184469209c5fd603c6c3ccf4506567fe8c6596d52eaab1d75c995f5e2d58da0b483d30a09e8c7ed15032095ae589ddc0958c8b54f0d0bd98e43431573fef0b8d587d0724a0daafdd149c7ffb315c1954b5bf5e3d058e058016d72a37 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea 5b694c376a2dd27b1c548b068da6549403764180 654cbf69b1fc050e3ddb415cf337752a4da5d391 82b4126b8d9143e66d31305e48ce65857cc016e4 01ea6af928f922e990f1ce96b95c8522c7ad7da4 969649c91949046d9b853870bd7f3fdf35ef5118 48c1dffb21fd528fb7f4e4956fc9a342f947d726 4625cde5ac69932979a758efdcc72845d462440d f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b 748db0a0644d59b1b32a5253bb57868ae18ece05 79c63f8722056f990f46fbb6694fdaddb8e65e8a d912d3a540dde19b4c9605f1e395d16da19d3a1e 912bfe649edd7895204939c0f72304dc3d728792 5e30702541c8852b8d124f3966e46a7c99ae7941 8e929f3b96718456e60a56ce2ab10190e30a3bd5 ceab0cdfa5db320312a87ce598c36865e538c054 32361951ab81b6cfa5188ef8b9e0c6e248ae452d 5af71685bb20554fd7ccaef830ec2e259b94dcc0 cb6ad91125473d51fa9aae96a7697ab35c976000 c7ad1e04 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [88:b2:6f:82:40:f7:1e:63:b8:c1:61:10:72:b0:7e:00:32:48:9f:e3],[56:66:d1:a4] modulus: ac3fccb36243e1bd2ccd9455b2807a91c14fb667563dd58acad42d5287931c34a9e39fd64fb9c1e069c4a6d6f4e23d8170e96e718b46553e7d553c2123180fe86345cea34669f974da10aaf86170ac5eb5e23b60ad3f39c9edbf29aa8a7d6e8edda456454e329b4b87822fb847caf6abf4c8eb35373199c337691ecb8a0ba1c97ec259ae3e0b525e8abcb512347ae38d83e203e3a7f12cfeb5f464423c15da4230dd8ed1e90a1d5c55e6cf8df48da4c0243a98c72ec7f5d0ea2e61367b001dfd92bf95c0b10c3d871262fae5375f24146d02d08cafabe6fd3ca3fdc3339d42f034bc25163e52ed504f4160437a44809f6224f78fc46f36c5ab1e65514049cc45 public exponent: 10001 ] 2023-01-24 06:02:48.801 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 06:02:48.802 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 06:02:48.804 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-24 06:02:48.804 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 06:02:48.805 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-24 06:02:48.806 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 06:02:48.806 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 06:02:48.807 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 06:02:48.807 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 06:02:48.807 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 06:02:48.811 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 06:02:48.812 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 06:02:48.812 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 06:02:48.812 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 06:02:49.052 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 06:02:49.052 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 06:02:49.052 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 06:02:49.053 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 06:02:49.054 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 06:02:49.054 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 06:02:49.054 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 06:02:49.055 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 06:02:49.055 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 06:02:49.056 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 06:02:49.056 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 06:02:49.056 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 06:02:49.057 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 06:02:49.057 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 06:02:49.057 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 06:02:49.058 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 06:02:49.060 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 615363494371566137961964144469137417779234395126 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 03:14:36 UTC 2023 Final Date: Sun Jan 23 03:14:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea 5b694c376a2dd27b1c548b068da6549403764180 654cbf69b1fc050e3ddb415cf337752a4da5d391 82b4126b8d9143e66d31305e48ce65857cc016e4 01ea6af928f922e990f1ce96b95c8522c7ad7da4 969649c91949046d9b853870bd7f3fdf35ef5118 48c1dffb21fd528fb7f4e4956fc9a342f947d726 4625cde5ac69932979a758efdcc72845d462440d f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b 748db0a0644d59b1b32a5253bb57868ae18ece05 79c63f8722056f990f46fbb6694fdaddb8e65e8a d912d3a540dde19b4c9605f1e395d16da19d3a1e 912bfe649edd7895204939c0f72304dc3d728792 5e30702541c8852b8d124f3966e46a7c99ae7941 8e929f3b96718456e60a56ce2ab10190e30a3bd5 ceab0cdfa5db320312a87ce598c36865e538c054 32361951ab81b6cfa5188ef8b9e0c6e248ae452d 5af71685bb20554fd7ccaef830ec2e259b94dcc0 cb6ad91125473d51fa9aae96a7697ab35c976000 c7ad1e04 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [aa:6a:10:c1:3c:5e:4e:b4:17:73:76:34:e4:ba:ed:1a:0f:c7:cb:76],[56:66:d1:a4] modulus: b0df2e002fbbb7c0998712951fbf4a7ffc8446ca5540ebf9f199ab75e6a95cad47ca59449d56465a16f64521807585b3cbeada22bf544dc6934720bcfb3e2e07fffc6656dfca3d27c1ed9efb306853774a0b409eed4acf2b67c2f96170080364f94c131358e0dbbc3e9a8f6ec7a157d22c43cc4d1de32df1d42fa11f6932f6f6ed4ce7153c5c18ecc7da9470159085eb4b2bf176d0319b2b1405bc7fac38e9a823669c87300c0a305691f1cd5d7a86ef122472af379fb6659ce5e6bebd9230588f75afe272bfc57de95775eafab595b9a3bf6a9af085cd243cc01dab7920b47ee3237549ee6ab66c0cdd95d218a35ea35eb495778d5fc51d51fdb5af53a7121d public exponent: 10001 ] 2023-01-24 06:31:36.812 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 06:31:36.815 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 06:31:36.818 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-24 06:31:36.819 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 06:31:36.819 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-24 06:31:36.820 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 06:31:36.821 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 06:31:36.821 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 06:31:36.822 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 06:31:36.822 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 06:31:36.826 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 06:31:36.827 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 06:31:36.828 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 06:31:36.828 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 06:31:37.211 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 06:31:37.212 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 06:31:37.212 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 06:31:37.213 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 06:31:37.214 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 06:31:37.214 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 06:31:37.214 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 06:31:37.215 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 06:31:37.215 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 06:31:37.216 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 06:31:37.216 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 06:31:37.216 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 06:31:37.217 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 06:31:37.217 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 06:31:37.217 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 06:31:37.218 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 06:31:37.221 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 615363494371566137961964144469137417779234395126 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 03:14:36 UTC 2023 Final Date: Sun Jan 23 03:14:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea 5b694c376a2dd27b1c548b068da6549403764180 654cbf69b1fc050e3ddb415cf337752a4da5d391 82b4126b8d9143e66d31305e48ce65857cc016e4 01ea6af928f922e990f1ce96b95c8522c7ad7da4 969649c91949046d9b853870bd7f3fdf35ef5118 48c1dffb21fd528fb7f4e4956fc9a342f947d726 4625cde5ac69932979a758efdcc72845d462440d f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b 748db0a0644d59b1b32a5253bb57868ae18ece05 79c63f8722056f990f46fbb6694fdaddb8e65e8a d912d3a540dde19b4c9605f1e395d16da19d3a1e 912bfe649edd7895204939c0f72304dc3d728792 5e30702541c8852b8d124f3966e46a7c99ae7941 8e929f3b96718456e60a56ce2ab10190e30a3bd5 ceab0cdfa5db320312a87ce598c36865e538c054 32361951ab81b6cfa5188ef8b9e0c6e248ae452d 5af71685bb20554fd7ccaef830ec2e259b94dcc0 cb6ad91125473d51fa9aae96a7697ab35c976000 c7ad1e04 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [02:1a:fb:a9:6a:53:36:d9:11:28:46:04:45:6d:07:f8:eb:6b:e4:61],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 06:31:45.124 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 06:31:45.125 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 06:31:45.126 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-24 06:31:45.127 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 06:31:45.127 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-24 06:31:45.127 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 06:31:45.128 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 06:31:45.128 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 06:31:45.128 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 06:31:45.129 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 06:31:45.132 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 06:31:45.132 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 06:31:45.133 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 06:31:45.133 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 06:31:45.305 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 06:31:45.306 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 06:31:45.307 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 06:31:45.307 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 06:31:45.308 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 06:31:45.309 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 06:31:45.309 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 06:31:45.309 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 06:31:45.310 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 06:31:45.311 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 06:31:45.312 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 06:31:45.312 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 06:31:45.312 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 06:31:45.313 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 06:31:45.313 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 06:31:45.314 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 06:31:45.318 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 615363494371566137961964144469137417779234395126 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 03:14:36 UTC 2023 Final Date: Sun Jan 23 03:14:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea 5b694c376a2dd27b1c548b068da6549403764180 654cbf69b1fc050e3ddb415cf337752a4da5d391 82b4126b8d9143e66d31305e48ce65857cc016e4 01ea6af928f922e990f1ce96b95c8522c7ad7da4 969649c91949046d9b853870bd7f3fdf35ef5118 48c1dffb21fd528fb7f4e4956fc9a342f947d726 4625cde5ac69932979a758efdcc72845d462440d f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b 748db0a0644d59b1b32a5253bb57868ae18ece05 79c63f8722056f990f46fbb6694fdaddb8e65e8a d912d3a540dde19b4c9605f1e395d16da19d3a1e 912bfe649edd7895204939c0f72304dc3d728792 5e30702541c8852b8d124f3966e46a7c99ae7941 8e929f3b96718456e60a56ce2ab10190e30a3bd5 ceab0cdfa5db320312a87ce598c36865e538c054 32361951ab81b6cfa5188ef8b9e0c6e248ae452d 5af71685bb20554fd7ccaef830ec2e259b94dcc0 cb6ad91125473d51fa9aae96a7697ab35c976000 c7ad1e04 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d2:44:bd:50:30:4e:ab:c2:7f:fb:29:c8:0e:50:fb:1a:df:7f:52:e0],[56:66:d1:a4] modulus: b80d364529cb33b0dcc85a437108d0e0ba84558b5340f597371689d6aa9d8e1e0f9071c10ae46b28f5c59eb82a4dc6fb107166610a2985e764b14bad2ac6bf2ee1950eb11e9f3faa9345101f58e9e57fd49cba043bb482bfa3ab3af2e2da7444dde4183a2a7ea335709d2b3079507bef91fd5d3c32d22a0c53b7407901f179ac186e35ae0449b9ac6f64e4c09d19771f90815c9716a81fc802d4c8ade7b8f105affb28ca7c5d9592388618512cb8a7fd4b0fcc9b034050dfa78a2d584bcedff9fe397b464823d262528c3c06163ff8041fcc1ff97d468f1677391865ab3cefcb771d8ca036473dedfa59b31e7fe6454089d346e4988e8ba776b4efdc009d1f65 public exponent: 10001 ]