2022-10-22 05:00:56,946 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-10-22 05:00:58,183 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-10-22 05:00:59.453  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Oct 22, 2022 5:01:01 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Oct 22, 2022 5:01:01 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Oct 22, 2022 5:01:01 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Oct 22, 2022 5:01:02 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-10-22 05:01:02.584 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-10-22 05:01:02.870  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-10-22 05:01:03.035  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-10-22 05:01:03.782 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-10-22 05:01:03.784 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-10-22 05:01:03.786 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-10-22 05:01:03.789 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-10-22 05:01:03.852 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-10-22 05:01:03.855 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-10-22 05:01:03.984 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-10-22 05:01:05.016 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Oct 22, 2022 5:01:05 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-10-22 05:01:06.147  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 10.659 seconds (JVM running for 12.682) Oct 22, 2022 5:01:33 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-10-22 05:01:52.861  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-22 05:01:52.876 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-22 05:01:52.920 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-22 05:01:52.928 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-22 05:01:52.957  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-22 05:01:52.960  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-22 05:01:52.961  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-22 05:01:52.963 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-22 05:01:52.963 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 05:01:52.967 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-22 05:01:52.984 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-22 05:01:52.990 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-22 05:01:53.055 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-22 05:01:53.068 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 05:01:53.069 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 05:01:53.073 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 05:01:53.736  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-22 05:01:53.739  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-22 05:01:53.739 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-22 05:01:53.741 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 05:01:53.751  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-22 05:01:53.752  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-22 05:01:53.753 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 05:01:53.753 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 05:01:53.754 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 05:01:53.773 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 05:01:53.774 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 05:01:53.775 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 05:01:53.781 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 05:01:53.781 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 05:01:53.782 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 05:01:53.783 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-22 05:01:53.820 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 323374953942323490910386849784994853583840888122 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 22 04:57:58 UTC 2022 Final Date: Thu Oct 21 04:57:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2b0a730594681a46de10e3e8d437ead031397abe eef4470c984a5f1d23f8253fd571681db7735df3 67d550622562de601abe04b1669033d6afe0f6ec e91e6911092ab8e964714e5d7c3aead951fbba38 c9368a2269dd904ea0d4dc945077f9a0b5784fea 66c2b302af41d526cf2129847a1b95cb0a146aa7 bb016430ecd8237d7ec7e775aefddf2e027c9fa6 9ac6506f421df12355ea694e9432531fa86eb801 667bbbf7a43c9ee77818c927064ffaf2df963680 5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6 8f80542760bc8739988a0aa50cdabc5e1fe305cc ee042916f1e8c987caf3a67ca8267f465a1efdf7 e1c61c066bf6a5126c3051948f1fedb9b7599eb3 635d0885ebad84ea165654986a3680588b65a470 97e861b6ee643a216cdc3df67636f24878b8fe85 3d484f03c8f2ee971c3f7fd3dedae57b8c6de426 431e2620817b1709d127ca33b75d6d80e401f254 f2f14a19eccc8da725dbd453a127be64ad41fbae c40364ee6b3501437764f14c9324d75b20765d8f 20dea253 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:38:0b:f5:72:bf:f3:13:b0:8f:0c:e9:0c:f4:a6:1f:26:a2:ba:e9],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-22 06:17:16.061  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-22 06:17:16.065 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-22 06:17:16.068 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-22 06:17:16.069 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-22 06:17:16.070  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-22 06:17:16.071  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-22 06:17:16.071  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-22 06:17:16.072 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-22 06:17:16.072 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-22 06:17:16.073 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-22 06:17:16.078 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-22 06:17:16.079 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 06:17:16.080 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 06:17:16.080 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 06:17:16.289  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-22 06:17:16.290  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-22 06:17:16.291 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-22 06:17:16.291 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 06:17:16.293  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-22 06:17:16.294  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-22 06:17:16.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:17:16.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:17:16.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:17:16.299 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:17:16.299 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:17:16.299 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:17:16.301 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:17:16.301 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:17:16.301 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:17:16.302 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-22 06:17:16.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 323374953942323490910386849784994853583840888122 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 22 04:57:58 UTC 2022 Final Date: Thu Oct 21 04:57:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4] modulus: b1b7a31593af8142da957e1a6966e7caf947512b906e095011ce46bd5f825b51eb72df33596ec69efa3cd0b625ce16f962e8c32a84a05a8a16677198a34828783bc8a5cd002a5b3be43fd902653d119577f3c4a3994f1d8a6dd603befa94ad5f7822c208a4dc515b50febdbeb4c84b248e5362d3c10352dc2f4ae2db03ea7ac62bc75563e51d19d1143e6222f0480723186090554c8f5a4d4b50a0d60ad33f17420b02901af271e045b7261a4de001497a11d50d9a8283e8ab02e4e9155e2bc0f4aa40a99543ee63f4330d219ce6a7f3496688ca08b5a15127c087f223c480ee0d0d8b7a0aabf6459c2ac0ff7ed25eb7840ba02badbfe9f222f6f7c957126cca051c928fac1bafcd3d5ad79b22f33726d1ae17791ec4ca09c72041227aac6f55f41a3c3a0c6e5be3d6caf61a39cdbaba9d2f98155d42a090e78917b93bd1fe2b0ed9760db17d6759bf62e205bdd3ce837e322280e0833577107f6bbce8fd8e2309272aa93b44c1d06389e3b92ba311920a3a190d3f7b0e6846961a9425826a65 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2b0a730594681a46de10e3e8d437ead031397abe eef4470c984a5f1d23f8253fd571681db7735df3 67d550622562de601abe04b1669033d6afe0f6ec e91e6911092ab8e964714e5d7c3aead951fbba38 c9368a2269dd904ea0d4dc945077f9a0b5784fea 66c2b302af41d526cf2129847a1b95cb0a146aa7 bb016430ecd8237d7ec7e775aefddf2e027c9fa6 9ac6506f421df12355ea694e9432531fa86eb801 667bbbf7a43c9ee77818c927064ffaf2df963680 5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6 8f80542760bc8739988a0aa50cdabc5e1fe305cc ee042916f1e8c987caf3a67ca8267f465a1efdf7 e1c61c066bf6a5126c3051948f1fedb9b7599eb3 635d0885ebad84ea165654986a3680588b65a470 97e861b6ee643a216cdc3df67636f24878b8fe85 3d484f03c8f2ee971c3f7fd3dedae57b8c6de426 431e2620817b1709d127ca33b75d6d80e401f254 f2f14a19eccc8da725dbd453a127be64ad41fbae c40364ee6b3501437764f14c9324d75b20765d8f 20dea253 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dd:1b:99:46:e6:72:d8:1a:3e:d2:0b:f0:ec:c7:2a:eb:76:b8:55:a1],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-22 06:19:03.641  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-22 06:19:03.644 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-22 06:19:03.646 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-22 06:19:03.647 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-22 06:19:03.648  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-22 06:19:03.649  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-22 06:19:03.650  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-22 06:19:03.651 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-22 06:19:03.651 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-22 06:19:03.652 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-22 06:19:03.659 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-22 06:19:03.660 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 06:19:03.660 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 06:19:03.661 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 06:19:03.836  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-22 06:19:03.837  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-22 06:19:03.838 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-22 06:19:03.838 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 06:19:03.841  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-22 06:19:03.842  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-22 06:19:03.842 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:19:03.842 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:19:03.843 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:19:03.844 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:19:03.845 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:19:03.845 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:19:03.846 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:19:03.847 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:19:03.847 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:19:03.848 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-22 06:19:03.852 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 323374953942323490910386849784994853583840888122 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 22 04:57:58 UTC 2022 Final Date: Thu Oct 21 04:57:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2b0a730594681a46de10e3e8d437ead031397abe eef4470c984a5f1d23f8253fd571681db7735df3 67d550622562de601abe04b1669033d6afe0f6ec e91e6911092ab8e964714e5d7c3aead951fbba38 c9368a2269dd904ea0d4dc945077f9a0b5784fea 66c2b302af41d526cf2129847a1b95cb0a146aa7 bb016430ecd8237d7ec7e775aefddf2e027c9fa6 9ac6506f421df12355ea694e9432531fa86eb801 667bbbf7a43c9ee77818c927064ffaf2df963680 5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6 8f80542760bc8739988a0aa50cdabc5e1fe305cc ee042916f1e8c987caf3a67ca8267f465a1efdf7 e1c61c066bf6a5126c3051948f1fedb9b7599eb3 635d0885ebad84ea165654986a3680588b65a470 97e861b6ee643a216cdc3df67636f24878b8fe85 3d484f03c8f2ee971c3f7fd3dedae57b8c6de426 431e2620817b1709d127ca33b75d6d80e401f254 f2f14a19eccc8da725dbd453a127be64ad41fbae c40364ee6b3501437764f14c9324d75b20765d8f 20dea253 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fa:0b:f8:52:2f:c2:b7:1c:dc:1b:cb:a3:8a:ef:ad:11:7c:2d:6b:d9],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-22 06:20:13.636  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-22 06:20:13.638 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-22 06:20:13.639 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-22 06:20:13.640 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-22 06:20:13.640  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-22 06:20:13.641  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-22 06:20:13.641  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-22 06:20:13.642 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-22 06:20:13.642 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-22 06:20:13.643 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-22 06:20:13.647 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-22 06:20:13.647 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 06:20:13.648 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 06:20:13.648 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 06:20:13.803  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-22 06:20:13.804  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-22 06:20:13.805 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-22 06:20:13.805 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 06:20:13.811  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-22 06:20:13.811  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-22 06:20:13.812 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:20:13.813 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:20:13.813 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:20:13.815 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:20:13.815 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:20:13.816 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:20:13.818 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:20:13.818 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:20:13.819 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:20:13.821 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-22 06:20:13.829 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 323374953942323490910386849784994853583840888122 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 22 04:57:58 UTC 2022 Final Date: Thu Oct 21 04:57:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2b0a730594681a46de10e3e8d437ead031397abe eef4470c984a5f1d23f8253fd571681db7735df3 67d550622562de601abe04b1669033d6afe0f6ec e91e6911092ab8e964714e5d7c3aead951fbba38 c9368a2269dd904ea0d4dc945077f9a0b5784fea 66c2b302af41d526cf2129847a1b95cb0a146aa7 bb016430ecd8237d7ec7e775aefddf2e027c9fa6 9ac6506f421df12355ea694e9432531fa86eb801 667bbbf7a43c9ee77818c927064ffaf2df963680 5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6 8f80542760bc8739988a0aa50cdabc5e1fe305cc ee042916f1e8c987caf3a67ca8267f465a1efdf7 e1c61c066bf6a5126c3051948f1fedb9b7599eb3 635d0885ebad84ea165654986a3680588b65a470 97e861b6ee643a216cdc3df67636f24878b8fe85 3d484f03c8f2ee971c3f7fd3dedae57b8c6de426 431e2620817b1709d127ca33b75d6d80e401f254 f2f14a19eccc8da725dbd453a127be64ad41fbae c40364ee6b3501437764f14c9324d75b20765d8f 20dea253 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a5:b5:09:92:dd:81:d0:d9:8a:b9:0f:dd:0c:3d:ac:58:95:98:37:aa],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-22 06:22:16.828  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-22 06:22:16.833 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-22 06:22:16.837 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-22 06:22:16.838 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-22 06:22:16.839  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-22 06:22:16.840  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-22 06:22:16.841  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-22 06:22:16.842 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-22 06:22:16.843 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-22 06:22:16.844 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-22 06:22:16.849 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-22 06:22:16.851 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 06:22:16.851 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 06:22:16.852 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 06:22:17.007  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-22 06:22:17.009  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-22 06:22:17.009 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-22 06:22:17.010 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 06:22:17.013  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-22 06:22:17.014  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-22 06:22:17.023 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:22:17.024 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:22:17.024 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:22:17.026 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:22:17.026 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:22:17.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:22:17.036 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:22:17.040 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:22:17.040 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:22:17.042 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-22 06:22:17.048 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 323374953942323490910386849784994853583840888122 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 22 04:57:58 UTC 2022 Final Date: Thu Oct 21 04:57:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4] modulus: b1b7a31593af8142da957e1a6966e7caf947512b906e095011ce46bd5f825b51eb72df33596ec69efa3cd0b625ce16f962e8c32a84a05a8a16677198a34828783bc8a5cd002a5b3be43fd902653d119577f3c4a3994f1d8a6dd603befa94ad5f7822c208a4dc515b50febdbeb4c84b248e5362d3c10352dc2f4ae2db03ea7ac62bc75563e51d19d1143e6222f0480723186090554c8f5a4d4b50a0d60ad33f17420b02901af271e045b7261a4de001497a11d50d9a8283e8ab02e4e9155e2bc0f4aa40a99543ee63f4330d219ce6a7f3496688ca08b5a15127c087f223c480ee0d0d8b7a0aabf6459c2ac0ff7ed25eb7840ba02badbfe9f222f6f7c957126cca051c928fac1bafcd3d5ad79b22f33726d1ae17791ec4ca09c72041227aac6f55f41a3c3a0c6e5be3d6caf61a39cdbaba9d2f98155d42a090e78917b93bd1fe2b0ed9760db17d6759bf62e205bdd3ce837e322280e0833577107f6bbce8fd8e2309272aa93b44c1d06389e3b92ba311920a3a190d3f7b0e6846961a9425826a65 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2b0a730594681a46de10e3e8d437ead031397abe eef4470c984a5f1d23f8253fd571681db7735df3 67d550622562de601abe04b1669033d6afe0f6ec e91e6911092ab8e964714e5d7c3aead951fbba38 c9368a2269dd904ea0d4dc945077f9a0b5784fea 66c2b302af41d526cf2129847a1b95cb0a146aa7 bb016430ecd8237d7ec7e775aefddf2e027c9fa6 9ac6506f421df12355ea694e9432531fa86eb801 667bbbf7a43c9ee77818c927064ffaf2df963680 5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6 8f80542760bc8739988a0aa50cdabc5e1fe305cc ee042916f1e8c987caf3a67ca8267f465a1efdf7 e1c61c066bf6a5126c3051948f1fedb9b7599eb3 635d0885ebad84ea165654986a3680588b65a470 97e861b6ee643a216cdc3df67636f24878b8fe85 3d484f03c8f2ee971c3f7fd3dedae57b8c6de426 431e2620817b1709d127ca33b75d6d80e401f254 f2f14a19eccc8da725dbd453a127be64ad41fbae c40364ee6b3501437764f14c9324d75b20765d8f 20dea253 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c6:ae:09:ad:1e:fb:0a:32:e5:5a:e6:51:9d:59:39:72:a5:14:87:3a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-22 06:31:18.034  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-22 06:31:18.039 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-22 06:31:18.043 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-22 06:31:18.045 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-22 06:31:18.046  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-22 06:31:18.048  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-22 06:31:18.049  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-22 06:31:18.050 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-22 06:31:18.050 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-22 06:31:18.051 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-22 06:31:18.070 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-22 06:31:18.073 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 06:31:18.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 06:31:18.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 06:31:18.231  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-22 06:31:18.232  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-22 06:31:18.232 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-22 06:31:18.233 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 06:31:18.234  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-22 06:31:18.235  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-22 06:31:18.236 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:31:18.236 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:31:18.236 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:31:18.238 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:31:18.238 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:31:18.238 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:31:18.239 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:31:18.240 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:31:18.240 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:31:18.241 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-22 06:31:18.245 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 323374953942323490910386849784994853583840888122 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 22 04:57:58 UTC 2022 Final Date: Thu Oct 21 04:57:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2b0a730594681a46de10e3e8d437ead031397abe eef4470c984a5f1d23f8253fd571681db7735df3 67d550622562de601abe04b1669033d6afe0f6ec e91e6911092ab8e964714e5d7c3aead951fbba38 c9368a2269dd904ea0d4dc945077f9a0b5784fea 66c2b302af41d526cf2129847a1b95cb0a146aa7 bb016430ecd8237d7ec7e775aefddf2e027c9fa6 9ac6506f421df12355ea694e9432531fa86eb801 667bbbf7a43c9ee77818c927064ffaf2df963680 5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6 8f80542760bc8739988a0aa50cdabc5e1fe305cc ee042916f1e8c987caf3a67ca8267f465a1efdf7 e1c61c066bf6a5126c3051948f1fedb9b7599eb3 635d0885ebad84ea165654986a3680588b65a470 97e861b6ee643a216cdc3df67636f24878b8fe85 3d484f03c8f2ee971c3f7fd3dedae57b8c6de426 431e2620817b1709d127ca33b75d6d80e401f254 f2f14a19eccc8da725dbd453a127be64ad41fbae c40364ee6b3501437764f14c9324d75b20765d8f 20dea253 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f7:e0:ae:8a:e5:80:3d:25:c4:f7:28:4b:d6:dc:bb:fd:31:f0:2e:c4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-22 06:36:02.787  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-22 06:36:02.791 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-22 06:36:02.795 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-22 06:36:02.796 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-22 06:36:02.797  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-22 06:36:02.798  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-22 06:36:02.799  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-22 06:36:02.800 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-22 06:36:02.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-22 06:36:02.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-22 06:36:02.806 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-22 06:36:02.807 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 06:36:02.808 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 06:36:02.808 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 06:36:02.987  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-22 06:36:02.989  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-22 06:36:02.989 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-22 06:36:02.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 06:36:02.992  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-22 06:36:02.993  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-22 06:36:02.994 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:36:02.995 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:36:02.996 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:36:02.999 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:36:03.000 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:36:03.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:36:03.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:36:03.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:36:03.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:36:03.006 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-22 06:36:03.010 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 323374953942323490910386849784994853583840888122 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 22 04:57:58 UTC 2022 Final Date: Thu Oct 21 04:57:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2b0a730594681a46de10e3e8d437ead031397abe eef4470c984a5f1d23f8253fd571681db7735df3 67d550622562de601abe04b1669033d6afe0f6ec e91e6911092ab8e964714e5d7c3aead951fbba38 c9368a2269dd904ea0d4dc945077f9a0b5784fea 66c2b302af41d526cf2129847a1b95cb0a146aa7 bb016430ecd8237d7ec7e775aefddf2e027c9fa6 9ac6506f421df12355ea694e9432531fa86eb801 667bbbf7a43c9ee77818c927064ffaf2df963680 5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6 8f80542760bc8739988a0aa50cdabc5e1fe305cc ee042916f1e8c987caf3a67ca8267f465a1efdf7 e1c61c066bf6a5126c3051948f1fedb9b7599eb3 635d0885ebad84ea165654986a3680588b65a470 97e861b6ee643a216cdc3df67636f24878b8fe85 3d484f03c8f2ee971c3f7fd3dedae57b8c6de426 431e2620817b1709d127ca33b75d6d80e401f254 f2f14a19eccc8da725dbd453a127be64ad41fbae c40364ee6b3501437764f14c9324d75b20765d8f 20dea253 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [74:e3:ea:ef:99:48:37:8b:b5:8e:ad:be:e0:18:d7:81:31:f6:2b:af],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-22 06:36:22.378  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-22 06:36:22.380 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-22 06:36:22.381 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-22 06:36:22.382 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-22 06:36:22.385  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-22 06:36:22.385  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-22 06:36:22.386  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-22 06:36:22.386 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-22 06:36:22.387 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-22 06:36:22.392 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-22 06:36:22.396 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-22 06:36:22.404 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 06:36:22.405 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 06:36:22.405 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 06:36:22.529  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-22 06:36:22.529  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-22 06:36:22.530 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-22 06:36:22.531 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 06:36:22.533  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-22 06:36:22.534  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-22 06:36:22.537 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:36:22.537 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:36:22.540 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:36:22.541 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:36:22.541 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:36:22.545 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:36:22.546 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:36:22.546 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:36:22.547 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:36:22.547 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-22 06:36:22.552 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 323374953942323490910386849784994853583840888122 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 22 04:57:58 UTC 2022 Final Date: Thu Oct 21 04:57:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2b0a730594681a46de10e3e8d437ead031397abe eef4470c984a5f1d23f8253fd571681db7735df3 67d550622562de601abe04b1669033d6afe0f6ec e91e6911092ab8e964714e5d7c3aead951fbba38 c9368a2269dd904ea0d4dc945077f9a0b5784fea 66c2b302af41d526cf2129847a1b95cb0a146aa7 bb016430ecd8237d7ec7e775aefddf2e027c9fa6 9ac6506f421df12355ea694e9432531fa86eb801 667bbbf7a43c9ee77818c927064ffaf2df963680 5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6 8f80542760bc8739988a0aa50cdabc5e1fe305cc ee042916f1e8c987caf3a67ca8267f465a1efdf7 e1c61c066bf6a5126c3051948f1fedb9b7599eb3 635d0885ebad84ea165654986a3680588b65a470 97e861b6ee643a216cdc3df67636f24878b8fe85 3d484f03c8f2ee971c3f7fd3dedae57b8c6de426 431e2620817b1709d127ca33b75d6d80e401f254 f2f14a19eccc8da725dbd453a127be64ad41fbae c40364ee6b3501437764f14c9324d75b20765d8f 20dea253 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [30:fd:3e:a2:0d:ff:ac:aa:bc:d6:e4:6a:49:a0:95:45:02:11:d9:22],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-22 06:54:51.897  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-22 06:54:51.900 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-22 06:54:51.903 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-22 06:54:51.904 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-22 06:54:51.905  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-22 06:54:51.906  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-22 06:54:51.906  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-22 06:54:51.907 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-22 06:54:51.907 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-22 06:54:51.908 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-22 06:54:51.914 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-22 06:54:51.915 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 06:54:51.916 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 06:54:51.916 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 06:54:52.161  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-22 06:54:52.162  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-22 06:54:52.162 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-22 06:54:52.163 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 06:54:52.164  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-22 06:54:52.164  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-22 06:54:52.165 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:54:52.165 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:54:52.166 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:54:52.167 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:54:52.167 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:54:52.167 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:54:52.172 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:54:52.173 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:54:52.173 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:54:52.174 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-22 06:54:52.177 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 323374953942323490910386849784994853583840888122 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 22 04:57:58 UTC 2022 Final Date: Thu Oct 21 04:57:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2b0a730594681a46de10e3e8d437ead031397abe eef4470c984a5f1d23f8253fd571681db7735df3 67d550622562de601abe04b1669033d6afe0f6ec e91e6911092ab8e964714e5d7c3aead951fbba38 c9368a2269dd904ea0d4dc945077f9a0b5784fea 66c2b302af41d526cf2129847a1b95cb0a146aa7 bb016430ecd8237d7ec7e775aefddf2e027c9fa6 9ac6506f421df12355ea694e9432531fa86eb801 667bbbf7a43c9ee77818c927064ffaf2df963680 5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6 8f80542760bc8739988a0aa50cdabc5e1fe305cc ee042916f1e8c987caf3a67ca8267f465a1efdf7 e1c61c066bf6a5126c3051948f1fedb9b7599eb3 635d0885ebad84ea165654986a3680588b65a470 97e861b6ee643a216cdc3df67636f24878b8fe85 3d484f03c8f2ee971c3f7fd3dedae57b8c6de426 431e2620817b1709d127ca33b75d6d80e401f254 f2f14a19eccc8da725dbd453a127be64ad41fbae c40364ee6b3501437764f14c9324d75b20765d8f 20dea253 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:10:c1:57:a6:63:44:6b:1f:40:df:01:ff:e5:ad:7b:37:ee:ab:7c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-22 06:55:08.766  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-22 06:55:08.767 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-22 06:55:08.769 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-22 06:55:08.769 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-22 06:55:08.770  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-22 06:55:08.770  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-22 06:55:08.771  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-22 06:55:08.772 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-22 06:55:08.772 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-22 06:55:08.772 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-22 06:55:08.777 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-22 06:55:08.777 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 06:55:08.778 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-22 06:55:08.778 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 06:55:09.039  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-22 06:55:09.040  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-22 06:55:09.040 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-22 06:55:09.041 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-22 06:55:09.042  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-22 06:55:09.043  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-22 06:55:09.043 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:55:09.044 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:55:09.044 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:55:09.045 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:55:09.045 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:55:09.045 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:55:09.046 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-22 06:55:09.046 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-22 06:55:09.047 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-22 06:55:09.047 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-22 06:55:09.050 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 323374953942323490910386849784994853583840888122 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 22 04:57:58 UTC 2022 Final Date: Thu Oct 21 04:57:57 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [25:4e:bf:f8:d4:af:38:97:80:a1:3d:29:8a:72:50:98:d4:0b:68:fa],[56:66:d1:a4] modulus: b1b7a31593af8142da957e1a6966e7caf947512b906e095011ce46bd5f825b51eb72df33596ec69efa3cd0b625ce16f962e8c32a84a05a8a16677198a34828783bc8a5cd002a5b3be43fd902653d119577f3c4a3994f1d8a6dd603befa94ad5f7822c208a4dc515b50febdbeb4c84b248e5362d3c10352dc2f4ae2db03ea7ac62bc75563e51d19d1143e6222f0480723186090554c8f5a4d4b50a0d60ad33f17420b02901af271e045b7261a4de001497a11d50d9a8283e8ab02e4e9155e2bc0f4aa40a99543ee63f4330d219ce6a7f3496688ca08b5a15127c087f223c480ee0d0d8b7a0aabf6459c2ac0ff7ed25eb7840ba02badbfe9f222f6f7c957126cca051c928fac1bafcd3d5ad79b22f33726d1ae17791ec4ca09c72041227aac6f55f41a3c3a0c6e5be3d6caf61a39cdbaba9d2f98155d42a090e78917b93bd1fe2b0ed9760db17d6759bf62e205bdd3ce837e322280e0833577107f6bbce8fd8e2309272aa93b44c1d06389e3b92ba311920a3a190d3f7b0e6846961a9425826a65 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2b0a730594681a46de10e3e8d437ead031397abe eef4470c984a5f1d23f8253fd571681db7735df3 67d550622562de601abe04b1669033d6afe0f6ec e91e6911092ab8e964714e5d7c3aead951fbba38 c9368a2269dd904ea0d4dc945077f9a0b5784fea 66c2b302af41d526cf2129847a1b95cb0a146aa7 bb016430ecd8237d7ec7e775aefddf2e027c9fa6 9ac6506f421df12355ea694e9432531fa86eb801 667bbbf7a43c9ee77818c927064ffaf2df963680 5e9f3a90e8cbc0f21f7d389914a96a1115a6aec6 8f80542760bc8739988a0aa50cdabc5e1fe305cc ee042916f1e8c987caf3a67ca8267f465a1efdf7 e1c61c066bf6a5126c3051948f1fedb9b7599eb3 635d0885ebad84ea165654986a3680588b65a470 97e861b6ee643a216cdc3df67636f24878b8fe85 3d484f03c8f2ee971c3f7fd3dedae57b8c6de426 431e2620817b1709d127ca33b75d6d80e401f254 f2f14a19eccc8da725dbd453a127be64ad41fbae c40364ee6b3501437764f14c9324d75b20765d8f 20dea253 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:c3:33:98:2f:20:52:4e:37:32:f3:4d:76:f6:20:cf:44:39:b8:ee],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]