By type
2022-05-30 05:07:00,741 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-30 05:07:01,382 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-30 05:07:01.979 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default May 30, 2022 5:07:03 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 30, 2022 5:07:03 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 30, 2022 5:07:03 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 30, 2022 5:07:03 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-30 05:07:03.820 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-30 05:07:04.007 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-05-30 05:07:04.117 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-30 05:07:04.630 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-30 05:07:04.632 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-05-30 05:07:04.633 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-30 05:07:04.636 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-30 05:07:04.665 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-30 05:07:04.668 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-05-30 05:07:04.745 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-05-30 05:07:05.155 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 30, 2022 5:07:05 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-30 05:07:05.821 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 5.626 seconds (JVM running for 6.652) May 30, 2022 5:07:30 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-30 05:07:56.581 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-30 05:07:56.587 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-30 05:07:56.611 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-30 05:07:56.614 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-30 05:07:56.625 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-30 05:07:56.627 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-30 05:07:56.628 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-30 05:07:56.630 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-30 05:07:56.630 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 05:07:56.633 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-30 05:07:56.638 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-30 05:07:56.641 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-30 05:07:56.668 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-30 05:07:56.678 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 05:07:56.678 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 05:07:56.681 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-30 05:07:57.247 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-30 05:07:57.249 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-30 05:07:57.249 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-30 05:07:57.250 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-30 05:07:57.256 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-30 05:07:57.257 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-30 05:07:57.258 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 05:07:57.258 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 05:07:57.258 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 05:07:57.268 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 05:07:57.268 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 05:07:57.268 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 05:07:57.272 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 05:07:57.273 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 05:07:57.273 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 05:07:57.274 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-30 05:07:57.295 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 302767312040666128227402915262832764041708715304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 30 05:05:03 UTC 2022 Final Date: Sat May 29 05:05:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3d:67:72:6b:99:c2:98:8b:1f:10:f0:9e:5c:42:2f:f6:21:50:72:5f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4cd3a1bdedc3104f1935dbb0312e1a45f57139e4 ec0bdbd54b504924a9eea47f135a7679d127a170 3e76c44647dd365edbabd1393a0dde2e43a61f07 7a7b0a3fbc6481dff8b38a523313e55ecee5444d a9a63297539fdee1d31595b7a99f1b0db1e439c2 92d5aa3a29c4dc10d5a942478221f7dd8b95f614 b694686ae3b29462980355e89d89b192444e5d52 78415cbfc2b0b4866408e8cce8146e15c82124bf cb4560bb84307331c9ebc1b8bf61b984d390d47a 4812d131f04588c72d467e16a187093331fcf70b c724ede46e3f2328e00d02f5a68ffa984ea62ab4 6ce39a6b1b46b477d21f4a85154e841acf619d5f a208d6a04b05779b9914aa7b0ab975cf11d31982 08f941fd4af31a2e00570dbfdb39a4501599abc8 794e86b613be21b994b54eb892a459e5b227bea5 26839bbddfa7ab6c6a365de9ee016c178178aac1 22713303a14ea3be651d7964180fbd00478f0609 ba0a5beebb7abbf26ee96abf553a430fbfecb631 4c6510c2fa721d59b841a6ddd763a40ccafe6be4 ea835f96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [83:b3:48:37:de:b7:e4:71:f2:40:da:43:c9:f4:1c:71:01:6d:aa:b5] modulus: c7f2b76fd84f1c9dc5d9602e2e60fb83f18f1726f5e9c9461ddaad5d59255c6ecfa832a56eeae06d3f49e102c8bf0217d5eb2d332170d89f65011274deccf4e14e21130d04edf7767cf18cde59c4611e0a955b6c98f2d2b664f094e761e3fdb01ee793411ed3305c48af75c49b85c3044865ff8704ed9b3d35cb8d6bb8874875b62c2a3145bf64b4ecc50907dbffa2ddfae7b82019a49be88e1cad5c04c1fda8fe180c924174a808741e2c1aded997f2a3bea4693a38fc6c06e5757efa9799f867659378038428e9340309a47763bdb926bb58e16390312638b014292fb5b4943cc8e871b4d990977a85dd8233d6340f2fff08efb1494e3de56ae19b2a0463f1 public exponent: 10001 ] 2022-05-30 06:24:34.743 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-30 06:24:34.749 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-30 06:24:34.751 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-30 06:24:34.752 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-30 06:24:34.753 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-30 06:24:34.753 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-30 06:24:34.754 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-30 06:24:34.754 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-30 06:24:34.754 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-30 06:24:34.754 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-30 06:24:34.760 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-30 06:24:34.761 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 06:24:34.761 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 06:24:34.761 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-30 06:24:34.960 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-30 06:24:34.961 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-30 06:24:34.961 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-30 06:24:34.962 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-30 06:24:34.965 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-30 06:24:34.966 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-30 06:24:34.966 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:24:34.966 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:24:34.967 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:24:34.968 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:24:34.968 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:24:34.968 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:24:34.969 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:24:34.969 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:24:34.969 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:24:34.970 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-30 06:24:34.974 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 302767312040666128227402915262832764041708715304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 30 05:05:03 UTC 2022 Final Date: Sat May 29 05:05:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3d:67:72:6b:99:c2:98:8b:1f:10:f0:9e:5c:42:2f:f6:21:50:72:5f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4cd3a1bdedc3104f1935dbb0312e1a45f57139e4 ec0bdbd54b504924a9eea47f135a7679d127a170 3e76c44647dd365edbabd1393a0dde2e43a61f07 7a7b0a3fbc6481dff8b38a523313e55ecee5444d a9a63297539fdee1d31595b7a99f1b0db1e439c2 92d5aa3a29c4dc10d5a942478221f7dd8b95f614 b694686ae3b29462980355e89d89b192444e5d52 78415cbfc2b0b4866408e8cce8146e15c82124bf cb4560bb84307331c9ebc1b8bf61b984d390d47a 4812d131f04588c72d467e16a187093331fcf70b c724ede46e3f2328e00d02f5a68ffa984ea62ab4 6ce39a6b1b46b477d21f4a85154e841acf619d5f a208d6a04b05779b9914aa7b0ab975cf11d31982 08f941fd4af31a2e00570dbfdb39a4501599abc8 794e86b613be21b994b54eb892a459e5b227bea5 26839bbddfa7ab6c6a365de9ee016c178178aac1 22713303a14ea3be651d7964180fbd00478f0609 ba0a5beebb7abbf26ee96abf553a430fbfecb631 4c6510c2fa721d59b841a6ddd763a40ccafe6be4 ea835f96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8a:8e:51:de:b3:aa:7d:d1:4d:1f:fd:95:02:12:16:c2:3d:c3:0c:dd] modulus: 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 public exponent: 10001 ] 2022-05-30 06:26:07.796 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-30 06:26:07.797 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-30 06:26:07.798 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-30 06:26:07.799 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-30 06:26:07.799 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-30 06:26:07.799 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-30 06:26:07.799 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-30 06:26:07.800 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-30 06:26:07.800 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-30 06:26:07.800 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-30 06:26:07.807 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-30 06:26:07.807 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 06:26:07.808 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 06:26:07.808 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-30 06:26:07.939 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-30 06:26:07.939 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-30 06:26:07.940 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-30 06:26:07.940 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-30 06:26:07.942 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-30 06:26:07.942 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-30 06:26:07.943 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:26:07.943 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:26:07.943 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:26:07.944 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:26:07.944 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:26:07.944 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:26:07.945 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:26:07.945 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:26:07.945 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:26:07.946 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-30 06:26:07.948 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 302767312040666128227402915262832764041708715304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 30 05:05:03 UTC 2022 Final Date: Sat May 29 05:05:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3d:67:72:6b:99:c2:98:8b:1f:10:f0:9e:5c:42:2f:f6:21:50:72:5f] modulus: b741cd199c787fe7e3445867141bc6c84a3ea0f49642176f8df3ad7359dd52d26984477c5a33400c6864ceaa117d4750690258fe5fc3b251b57ad567b6c6fea6b2229b49bdf387c1b5843e230fc60fc1df444f94f7ef42720ae008d1209965e8d5beb78cc232f9f3d0496691d1e7cc146bcc8c9d9ebc752b032605d51754d094ca7bd20539b7fb6b0e2aa965887a19a44037b99ecbc02d61aa8e3723f401691146c9c9408c26806cf81e8f8e1101b0525b2d08279b8565687727237fb48767482a6bd9ec6442db0c5b841533dc264c751d3a3b639650f5463543c6abe1dfbb98b280aa7d70d76bc4f02eaf09041fafb3ed3814b336deab9b97940d1ee0f13f4e89487df8e2f6f43cf0e799f3e4bb5d0fb2c95d1f708b42688ba5ffe2b04e73aed2a904045395763ceb75bc3dd380544fd0e4a84e3839f714973ef0170988ebd83c7ed13537d84d16a312d673b1608bf41961e0c1a58b1c9075511ccf322f93fd16444accb0e4a0514273fa48ada5045cbccefa24d70bd631f477a1d0e14e589f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4cd3a1bdedc3104f1935dbb0312e1a45f57139e4 ec0bdbd54b504924a9eea47f135a7679d127a170 3e76c44647dd365edbabd1393a0dde2e43a61f07 7a7b0a3fbc6481dff8b38a523313e55ecee5444d a9a63297539fdee1d31595b7a99f1b0db1e439c2 92d5aa3a29c4dc10d5a942478221f7dd8b95f614 b694686ae3b29462980355e89d89b192444e5d52 78415cbfc2b0b4866408e8cce8146e15c82124bf cb4560bb84307331c9ebc1b8bf61b984d390d47a 4812d131f04588c72d467e16a187093331fcf70b c724ede46e3f2328e00d02f5a68ffa984ea62ab4 6ce39a6b1b46b477d21f4a85154e841acf619d5f a208d6a04b05779b9914aa7b0ab975cf11d31982 08f941fd4af31a2e00570dbfdb39a4501599abc8 794e86b613be21b994b54eb892a459e5b227bea5 26839bbddfa7ab6c6a365de9ee016c178178aac1 22713303a14ea3be651d7964180fbd00478f0609 ba0a5beebb7abbf26ee96abf553a430fbfecb631 4c6510c2fa721d59b841a6ddd763a40ccafe6be4 ea835f96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1e:76:65:5f:ec:a4:48:53:bc:17:74:1a:00:19:c0:1c:d5:76:82:bd] modulus: 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 public exponent: 10001 ] 2022-05-30 06:27:15.756 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-30 06:27:15.757 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-30 06:27:15.764 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-30 06:27:15.765 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-30 06:27:15.765 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-30 06:27:15.765 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-30 06:27:15.766 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-30 06:27:15.766 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-30 06:27:15.766 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-30 06:27:15.766 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-30 06:27:15.771 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-30 06:27:15.772 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 06:27:15.772 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 06:27:15.772 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-30 06:27:15.918 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-30 06:27:15.919 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-30 06:27:15.919 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-30 06:27:15.919 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-30 06:27:15.921 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-30 06:27:15.922 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-30 06:27:15.922 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:27:15.922 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:27:15.923 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:27:15.923 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:27:15.923 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:27:15.924 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:27:15.924 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:27:15.924 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:27:15.925 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:27:15.925 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-30 06:27:15.928 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 302767312040666128227402915262832764041708715304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 30 05:05:03 UTC 2022 Final Date: Sat May 29 05:05:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3d:67:72:6b:99:c2:98:8b:1f:10:f0:9e:5c:42:2f:f6:21:50:72:5f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4cd3a1bdedc3104f1935dbb0312e1a45f57139e4 ec0bdbd54b504924a9eea47f135a7679d127a170 3e76c44647dd365edbabd1393a0dde2e43a61f07 7a7b0a3fbc6481dff8b38a523313e55ecee5444d a9a63297539fdee1d31595b7a99f1b0db1e439c2 92d5aa3a29c4dc10d5a942478221f7dd8b95f614 b694686ae3b29462980355e89d89b192444e5d52 78415cbfc2b0b4866408e8cce8146e15c82124bf cb4560bb84307331c9ebc1b8bf61b984d390d47a 4812d131f04588c72d467e16a187093331fcf70b c724ede46e3f2328e00d02f5a68ffa984ea62ab4 6ce39a6b1b46b477d21f4a85154e841acf619d5f a208d6a04b05779b9914aa7b0ab975cf11d31982 08f941fd4af31a2e00570dbfdb39a4501599abc8 794e86b613be21b994b54eb892a459e5b227bea5 26839bbddfa7ab6c6a365de9ee016c178178aac1 22713303a14ea3be651d7964180fbd00478f0609 ba0a5beebb7abbf26ee96abf553a430fbfecb631 4c6510c2fa721d59b841a6ddd763a40ccafe6be4 ea835f96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [60:1b:2e:38:06:ae:8e:3d:2a:d3:47:35:f0:30:c7:b8:f4:ac:df:02] modulus: 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 public exponent: 10001 ] 2022-05-30 06:29:13.683 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-30 06:29:13.686 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-30 06:29:13.688 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-30 06:29:13.689 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-30 06:29:13.689 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-30 06:29:13.690 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-30 06:29:13.690 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-30 06:29:13.690 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-30 06:29:13.690 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-30 06:29:13.691 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-30 06:29:13.694 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-30 06:29:13.695 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 06:29:13.695 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 06:29:13.696 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-30 06:29:13.858 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-30 06:29:13.859 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-30 06:29:13.860 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-30 06:29:13.860 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-30 06:29:13.862 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-30 06:29:13.862 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-30 06:29:13.863 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:29:13.865 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:29:13.865 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:29:13.866 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:29:13.866 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:29:13.866 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:29:13.868 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:29:13.868 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:29:13.868 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:29:13.869 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-30 06:29:13.872 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 302767312040666128227402915262832764041708715304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 30 05:05:03 UTC 2022 Final Date: Sat May 29 05:05:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3d:67:72:6b:99:c2:98:8b:1f:10:f0:9e:5c:42:2f:f6:21:50:72:5f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4cd3a1bdedc3104f1935dbb0312e1a45f57139e4 ec0bdbd54b504924a9eea47f135a7679d127a170 3e76c44647dd365edbabd1393a0dde2e43a61f07 7a7b0a3fbc6481dff8b38a523313e55ecee5444d a9a63297539fdee1d31595b7a99f1b0db1e439c2 92d5aa3a29c4dc10d5a942478221f7dd8b95f614 b694686ae3b29462980355e89d89b192444e5d52 78415cbfc2b0b4866408e8cce8146e15c82124bf cb4560bb84307331c9ebc1b8bf61b984d390d47a 4812d131f04588c72d467e16a187093331fcf70b c724ede46e3f2328e00d02f5a68ffa984ea62ab4 6ce39a6b1b46b477d21f4a85154e841acf619d5f a208d6a04b05779b9914aa7b0ab975cf11d31982 08f941fd4af31a2e00570dbfdb39a4501599abc8 794e86b613be21b994b54eb892a459e5b227bea5 26839bbddfa7ab6c6a365de9ee016c178178aac1 22713303a14ea3be651d7964180fbd00478f0609 ba0a5beebb7abbf26ee96abf553a430fbfecb631 4c6510c2fa721d59b841a6ddd763a40ccafe6be4 ea835f96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:e2:17:61:fe:49:cd:ba:d3:bd:f6:69:a3:cd:13:81:13:db:48:25] modulus: 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 public exponent: 10001 ] 2022-05-30 06:29:14.324 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-30 06:29:14.325 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-30 06:29:14.326 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-30 06:29:14.327 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-30 06:29:14.327 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-30 06:29:14.327 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-30 06:29:14.328 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-30 06:29:14.328 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-30 06:29:14.328 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-30 06:29:14.328 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-30 06:29:14.332 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-30 06:29:14.332 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 06:29:14.333 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 06:29:14.333 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-30 06:29:14.413 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-30 06:29:14.414 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-30 06:29:14.414 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-30 06:29:14.414 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-30 06:29:14.415 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-30 06:29:14.416 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-30 06:29:14.416 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:29:14.416 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:29:14.417 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:29:14.418 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:29:14.418 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:29:14.418 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:29:14.419 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:29:14.419 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:29:14.419 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:29:14.420 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-30 06:29:14.423 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 302767312040666128227402915262832764041708715304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 30 05:05:03 UTC 2022 Final Date: Sat May 29 05:05:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3d:67:72:6b:99:c2:98:8b:1f:10:f0:9e:5c:42:2f:f6:21:50:72:5f] modulus: b741cd199c787fe7e3445867141bc6c84a3ea0f49642176f8df3ad7359dd52d26984477c5a33400c6864ceaa117d4750690258fe5fc3b251b57ad567b6c6fea6b2229b49bdf387c1b5843e230fc60fc1df444f94f7ef42720ae008d1209965e8d5beb78cc232f9f3d0496691d1e7cc146bcc8c9d9ebc752b032605d51754d094ca7bd20539b7fb6b0e2aa965887a19a44037b99ecbc02d61aa8e3723f401691146c9c9408c26806cf81e8f8e1101b0525b2d08279b8565687727237fb48767482a6bd9ec6442db0c5b841533dc264c751d3a3b639650f5463543c6abe1dfbb98b280aa7d70d76bc4f02eaf09041fafb3ed3814b336deab9b97940d1ee0f13f4e89487df8e2f6f43cf0e799f3e4bb5d0fb2c95d1f708b42688ba5ffe2b04e73aed2a904045395763ceb75bc3dd380544fd0e4a84e3839f714973ef0170988ebd83c7ed13537d84d16a312d673b1608bf41961e0c1a58b1c9075511ccf322f93fd16444accb0e4a0514273fa48ada5045cbccefa24d70bd631f477a1d0e14e589f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4cd3a1bdedc3104f1935dbb0312e1a45f57139e4 ec0bdbd54b504924a9eea47f135a7679d127a170 3e76c44647dd365edbabd1393a0dde2e43a61f07 7a7b0a3fbc6481dff8b38a523313e55ecee5444d a9a63297539fdee1d31595b7a99f1b0db1e439c2 92d5aa3a29c4dc10d5a942478221f7dd8b95f614 b694686ae3b29462980355e89d89b192444e5d52 78415cbfc2b0b4866408e8cce8146e15c82124bf cb4560bb84307331c9ebc1b8bf61b984d390d47a 4812d131f04588c72d467e16a187093331fcf70b c724ede46e3f2328e00d02f5a68ffa984ea62ab4 6ce39a6b1b46b477d21f4a85154e841acf619d5f a208d6a04b05779b9914aa7b0ab975cf11d31982 08f941fd4af31a2e00570dbfdb39a4501599abc8 794e86b613be21b994b54eb892a459e5b227bea5 26839bbddfa7ab6c6a365de9ee016c178178aac1 22713303a14ea3be651d7964180fbd00478f0609 ba0a5beebb7abbf26ee96abf553a430fbfecb631 4c6510c2fa721d59b841a6ddd763a40ccafe6be4 ea835f96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ea:b9:27:3b:2d:06:11:50:6a:76:30:33:b8:04:0f:b1:dc:94:4c:c3] modulus: 98257ed98059eeb73d100f64d3ca7d402377197b5c14bb957e47370a467350c46100cb9e56d77bec8a410610cd340aa9ce396f478af865dee4db71a05b9a318ea209a220a8620bef12c02b39ca13f9c649e3645b2a540aaf86cd55b4ce61458c5e5a4588c6a6747d436155d25bba1aca32bab5f18ee75d66f6a1a0f84cd674407a5f37216b7990947aebd5f53c960f70d5f715d601f06401dcb4473d8032b653e9dfdeaa593a20359cf172289f5b38714e7b75c3a715e4f42f0f0120e220663d898261ab89d3132c2e044d05d36b296ae67880e5f11edcc72eef0ee246758b6aab3a95d990896622e7d0d80151692af94cd091dc6131724c38faab57700ab5cb public exponent: 10001 ] 2022-05-30 06:50:15.677 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-30 06:50:15.680 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-30 06:50:15.683 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-30 06:50:15.684 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-30 06:50:15.685 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-30 06:50:15.685 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-30 06:50:15.685 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-30 06:50:15.686 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-30 06:50:15.686 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-30 06:50:15.686 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-30 06:50:15.690 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-30 06:50:15.691 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 06:50:15.691 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 06:50:15.691 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-30 06:50:15.826 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-30 06:50:15.827 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-30 06:50:15.827 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-30 06:50:15.827 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-30 06:50:15.829 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-30 06:50:15.829 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-30 06:50:15.830 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:50:15.830 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:50:15.830 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:50:15.831 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:50:15.831 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:50:15.831 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:50:15.832 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:50:15.832 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:50:15.832 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:50:15.833 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-30 06:50:15.838 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 302767312040666128227402915262832764041708715304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 30 05:05:03 UTC 2022 Final Date: Sat May 29 05:05:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3d:67:72:6b:99:c2:98:8b:1f:10:f0:9e:5c:42:2f:f6:21:50:72:5f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4cd3a1bdedc3104f1935dbb0312e1a45f57139e4 ec0bdbd54b504924a9eea47f135a7679d127a170 3e76c44647dd365edbabd1393a0dde2e43a61f07 7a7b0a3fbc6481dff8b38a523313e55ecee5444d a9a63297539fdee1d31595b7a99f1b0db1e439c2 92d5aa3a29c4dc10d5a942478221f7dd8b95f614 b694686ae3b29462980355e89d89b192444e5d52 78415cbfc2b0b4866408e8cce8146e15c82124bf cb4560bb84307331c9ebc1b8bf61b984d390d47a 4812d131f04588c72d467e16a187093331fcf70b c724ede46e3f2328e00d02f5a68ffa984ea62ab4 6ce39a6b1b46b477d21f4a85154e841acf619d5f a208d6a04b05779b9914aa7b0ab975cf11d31982 08f941fd4af31a2e00570dbfdb39a4501599abc8 794e86b613be21b994b54eb892a459e5b227bea5 26839bbddfa7ab6c6a365de9ee016c178178aac1 22713303a14ea3be651d7964180fbd00478f0609 ba0a5beebb7abbf26ee96abf553a430fbfecb631 4c6510c2fa721d59b841a6ddd763a40ccafe6be4 ea835f96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [53:d0:f1:9b:25:0a:ed:61:e2:16:70:12:55:b6:35:4d:f2:69:c0:2a] modulus: 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 public exponent: 10001 ] 2022-05-30 06:56:44.167 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-30 06:56:44.169 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-30 06:56:44.172 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-30 06:56:44.173 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-30 06:56:44.173 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-30 06:56:44.174 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-30 06:56:44.174 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-30 06:56:44.175 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-30 06:56:44.175 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-30 06:56:44.175 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-30 06:56:44.179 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-30 06:56:44.180 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 06:56:44.180 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 06:56:44.180 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-30 06:56:44.319 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-30 06:56:44.320 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-30 06:56:44.320 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-30 06:56:44.320 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-30 06:56:44.321 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-30 06:56:44.322 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-30 06:56:44.322 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:56:44.322 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:56:44.322 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:56:44.323 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:56:44.323 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:56:44.323 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:56:44.323 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:56:44.324 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:56:44.324 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:56:44.324 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-30 06:56:44.327 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 302767312040666128227402915262832764041708715304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 30 05:05:03 UTC 2022 Final Date: Sat May 29 05:05:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3d:67:72:6b:99:c2:98:8b:1f:10:f0:9e:5c:42:2f:f6:21:50:72:5f] modulus: b741cd199c787fe7e3445867141bc6c84a3ea0f49642176f8df3ad7359dd52d26984477c5a33400c6864ceaa117d4750690258fe5fc3b251b57ad567b6c6fea6b2229b49bdf387c1b5843e230fc60fc1df444f94f7ef42720ae008d1209965e8d5beb78cc232f9f3d0496691d1e7cc146bcc8c9d9ebc752b032605d51754d094ca7bd20539b7fb6b0e2aa965887a19a44037b99ecbc02d61aa8e3723f401691146c9c9408c26806cf81e8f8e1101b0525b2d08279b8565687727237fb48767482a6bd9ec6442db0c5b841533dc264c751d3a3b639650f5463543c6abe1dfbb98b280aa7d70d76bc4f02eaf09041fafb3ed3814b336deab9b97940d1ee0f13f4e89487df8e2f6f43cf0e799f3e4bb5d0fb2c95d1f708b42688ba5ffe2b04e73aed2a904045395763ceb75bc3dd380544fd0e4a84e3839f714973ef0170988ebd83c7ed13537d84d16a312d673b1608bf41961e0c1a58b1c9075511ccf322f93fd16444accb0e4a0514273fa48ada5045cbccefa24d70bd631f477a1d0e14e589f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4cd3a1bdedc3104f1935dbb0312e1a45f57139e4 ec0bdbd54b504924a9eea47f135a7679d127a170 3e76c44647dd365edbabd1393a0dde2e43a61f07 7a7b0a3fbc6481dff8b38a523313e55ecee5444d a9a63297539fdee1d31595b7a99f1b0db1e439c2 92d5aa3a29c4dc10d5a942478221f7dd8b95f614 b694686ae3b29462980355e89d89b192444e5d52 78415cbfc2b0b4866408e8cce8146e15c82124bf cb4560bb84307331c9ebc1b8bf61b984d390d47a 4812d131f04588c72d467e16a187093331fcf70b c724ede46e3f2328e00d02f5a68ffa984ea62ab4 6ce39a6b1b46b477d21f4a85154e841acf619d5f a208d6a04b05779b9914aa7b0ab975cf11d31982 08f941fd4af31a2e00570dbfdb39a4501599abc8 794e86b613be21b994b54eb892a459e5b227bea5 26839bbddfa7ab6c6a365de9ee016c178178aac1 22713303a14ea3be651d7964180fbd00478f0609 ba0a5beebb7abbf26ee96abf553a430fbfecb631 4c6510c2fa721d59b841a6ddd763a40ccafe6be4 ea835f96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [02:b7:ed:22:a7:fb:97:ba:81:00:35:a4:b4:8d:55:08:e5:ed:ca:8e] modulus: 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 public exponent: 10001 ] 2022-05-30 06:57:03.459 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-30 06:57:03.461 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-30 06:57:03.464 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-30 06:57:03.465 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-30 06:57:03.465 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-30 06:57:03.466 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-30 06:57:03.466 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-30 06:57:03.466 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-30 06:57:03.467 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-30 06:57:03.467 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-30 06:57:03.470 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-30 06:57:03.476 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 06:57:03.476 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-30 06:57:03.477 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-30 06:57:03.583 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-30 06:57:03.583 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-30 06:57:03.584 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-30 06:57:03.584 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-30 06:57:03.585 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-30 06:57:03.585 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-30 06:57:03.586 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:57:03.586 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:57:03.586 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:57:03.586 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:57:03.587 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:57:03.587 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:57:03.587 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-30 06:57:03.587 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-30 06:57:03.587 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-30 06:57:03.588 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-30 06:57:03.590 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 302767312040666128227402915262832764041708715304 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 30 05:05:03 UTC 2022 Final Date: Sat May 29 05:05:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3d:67:72:6b:99:c2:98:8b:1f:10:f0:9e:5c:42:2f:f6:21:50:72:5f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4cd3a1bdedc3104f1935dbb0312e1a45f57139e4 ec0bdbd54b504924a9eea47f135a7679d127a170 3e76c44647dd365edbabd1393a0dde2e43a61f07 7a7b0a3fbc6481dff8b38a523313e55ecee5444d a9a63297539fdee1d31595b7a99f1b0db1e439c2 92d5aa3a29c4dc10d5a942478221f7dd8b95f614 b694686ae3b29462980355e89d89b192444e5d52 78415cbfc2b0b4866408e8cce8146e15c82124bf cb4560bb84307331c9ebc1b8bf61b984d390d47a 4812d131f04588c72d467e16a187093331fcf70b c724ede46e3f2328e00d02f5a68ffa984ea62ab4 6ce39a6b1b46b477d21f4a85154e841acf619d5f a208d6a04b05779b9914aa7b0ab975cf11d31982 08f941fd4af31a2e00570dbfdb39a4501599abc8 794e86b613be21b994b54eb892a459e5b227bea5 26839bbddfa7ab6c6a365de9ee016c178178aac1 22713303a14ea3be651d7964180fbd00478f0609 ba0a5beebb7abbf26ee96abf553a430fbfecb631 4c6510c2fa721d59b841a6ddd763a40ccafe6be4 ea835f96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:fb:b0:2a:fb:7b:bf:f2:81:58:7a:11:f9:b4:be:23:01:08:47:f6] modulus: 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 public exponent: 10001 ]