2022-10-30 05:06:53,397 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-10-30 05:06:54,377 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-10-30 05:06:55.032  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Oct 30, 2022 5:06:57 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Oct 30, 2022 5:06:57 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Oct 30, 2022 5:06:57 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Oct 30, 2022 5:06:57 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-10-30 05:06:57.615 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-10-30 05:06:57.888  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-10-30 05:06:58.047  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-10-30 05:06:58.707 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-10-30 05:06:58.710 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-10-30 05:06:58.711 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-10-30 05:06:58.714 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-10-30 05:06:58.749 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-10-30 05:06:58.751 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-10-30 05:06:58.863 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-10-30 05:06:59.443 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Oct 30, 2022 5:07:00 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-10-30 05:07:00.483  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 7.866 seconds (JVM running for 9.588) Oct 30, 2022 5:07:23 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-10-30 05:07:57.846  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-30 05:07:57.854 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-30 05:07:57.915 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-30 05:07:57.918 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 05:07:57.942  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-30 05:07:57.945  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-30 05:07:57.947  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-30 05:07:57.949 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-30 05:07:57.950 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 05:07:57.955 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-30 05:07:57.965 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-30 05:07:57.970 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-30 05:07:58.043 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-30 05:07:58.051 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 05:07:58.052 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 05:07:58.056 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 05:07:58.744  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-30 05:07:58.746  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-30 05:07:58.747 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-30 05:07:58.748 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 05:07:58.758  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-30 05:07:58.759  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-30 05:07:58.760 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 05:07:58.760 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 05:07:58.761 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 05:07:58.778 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 05:07:58.778 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 05:07:58.779 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 05:07:58.785 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 05:07:58.785 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 05:07:58.786 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 05:07:58.787 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 05:07:58.823 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:a3:d9:ba:e4:c9:a4:52:fe:19:1f:a1:be:e2:9e:d8:e1:f6:2c:39],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-30 06:25:21.858  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-30 06:25:21.862 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-30 06:25:21.866 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-30 06:25:21.867 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 06:25:21.868  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-30 06:25:21.869  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-30 06:25:21.869  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-30 06:25:21.870 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-30 06:25:21.870 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-30 06:25:21.871 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-30 06:25:21.877 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-30 06:25:21.878 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 06:25:21.879 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 06:25:21.879 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:25:22.081  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-30 06:25:22.082  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-30 06:25:22.082 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-30 06:25:22.083 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:25:22.086  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-30 06:25:22.086  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-30 06:25:22.087 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:25:22.088 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:25:22.088 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:25:22.089 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:25:22.090 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:25:22.090 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:25:22.091 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:25:22.092 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:25:22.092 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:25:22.093 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 06:25:22.099 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:84:5a:91:bc:54:b9:c6:c4:f3:64:46:7b:e1:ea:85:a1:26:38:da],[56:66:d1:a4] modulus: c233823d503a05cf31200736effc3b1dd06c5bd9600f075fc58e7114140062bde0b88d1607219a620ab0353fa572683c8c1f12bcafa11279ff221d87f74d3f025b106055d63c57226e5785e7fba71b3bc227bae5890e4543d09a3dabc5f6d02c80dd99b94c014761b2e059e6358599a8336907da2e9012eb4778151f66241873e1bde33a17d7716633a774e11446ca80dc0f2709dfb88454be88bb286ede2e4bfbbe09f83afcb04dab72d6a9149e1c2d74bcd9662f308ee099ad2b0d77e0e03be6bb5adaf3ab4291e97e77bb33b2e2ff807143cb2d68466d28b090821876f28f2afa8e3d8bb11a60eab1cc7a7c73d8814b66eaf46914f48c4c1573090aa46109 public exponent: 10001 ] 2022-10-30 06:27:09.709  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-30 06:27:09.712 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-30 06:27:09.718 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-30 06:27:09.720 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 06:27:09.722  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-30 06:27:09.725  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-30 06:27:09.726  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-30 06:27:09.727 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-30 06:27:09.728 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-30 06:27:09.729 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-30 06:27:09.736 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-30 06:27:09.737 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 06:27:09.738 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 06:27:09.739 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:27:09.912  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-30 06:27:09.914  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-30 06:27:09.914 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-30 06:27:09.915 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:27:09.920  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-30 06:27:09.923  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-30 06:27:09.925 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:27:09.926 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:27:09.926 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:27:09.932 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:27:09.934 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:27:09.936 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:27:09.938 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:27:09.938 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:27:09.939 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:27:09.941 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 06:27:09.947 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:01:0f:8d:9e:bb:88:bc:81:44:43:24:95:d0:76:38:db:69:3c:b7],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-30 06:28:09.701  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-30 06:28:09.702 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-30 06:28:09.703 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-30 06:28:09.704 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 06:28:09.704  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-30 06:28:09.705  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-30 06:28:09.705  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-30 06:28:09.706 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-30 06:28:09.706 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-30 06:28:09.706 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-30 06:28:09.710 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-30 06:28:09.710 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 06:28:09.711 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 06:28:09.711 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:28:09.943  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-30 06:28:09.944  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-30 06:28:09.944 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-30 06:28:09.945 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:28:09.947  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-30 06:28:09.947  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-30 06:28:09.948 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:28:09.948 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:28:09.949 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:28:09.949 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:28:09.949 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:28:09.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:28:09.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:28:09.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:28:09.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:28:09.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 06:28:09.955 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7c:ea:ba:37:f9:c2:22:93:fe:44:18:da:72:4c:ae:af:0f:82:cc:55],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-30 06:30:13.720  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-30 06:30:13.721 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-30 06:30:13.722 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-30 06:30:13.723 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 06:30:13.724  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-30 06:30:13.724  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-30 06:30:13.724  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-30 06:30:13.725 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-30 06:30:13.725 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-30 06:30:13.725 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-30 06:30:13.729 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-30 06:30:13.729 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 06:30:13.730 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 06:30:13.730 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:30:13.856  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-30 06:30:13.857  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-30 06:30:13.857 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-30 06:30:13.857 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:30:13.858  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-30 06:30:13.859  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-30 06:30:13.859 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:30:13.860 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:30:13.860 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:30:13.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:30:13.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:30:13.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:30:13.863 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:30:13.863 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:30:13.864 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:30:13.865 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 06:30:13.869 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: a7b730f2e34c0063340230ec020964aa931cf4c1d52f9848a2c8b8a6e4b222ee44d994ca98f3a8419d7cc4158ddfbce2fa777c63bfe3d53631512cacc2b1b995548c7a535366fc33b9e35c11237d877e715a50c0757224a6083dea9f6b7e770fd10b7924425556b60d611288028636c6ff51b329a91267e7645d4067b5849a257eb9d56a47bedd5f4b23226870da90abdec756a580052fa811e426b904c75c3e14e16ac905d328a108d954a9899226c9605ceb9f7b3352ad0a6b49af0a8b7ce5b58fd423fb9e693f867cf42fb582ca10377b9b83f5b43ce4ff2713cd2d649980c151c9af0203bf8edc64cd1bb3f4538894ec2bd00fc0dd1fd9390c8e7618d5064959140e95d2a25c13212c688a6f7a1bbd5f95c7213241024453728b0a5412bc96ea4b5665de08e8247c96ee4edc96d1577736d2ae5fcac55a2e9df8f9e336f5fab24d6fd30757d310e2e83300f66b8ee34991b20cd491ebd499a919b53f0136d9776272a6a6c062da1ed5fe4c709a754ae8420362bf063c4cbde68bc0b90435 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [31:36:bc:b8:79:d2:14:84:ce:c0:32:16:89:fd:1d:ff:bc:f4:63:fe],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-30 06:37:23.090  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-30 06:37:23.093 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-30 06:37:23.096 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-30 06:37:23.097 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 06:37:23.098  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-30 06:37:23.099  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-30 06:37:23.099  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-30 06:37:23.099 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-30 06:37:23.100 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-30 06:37:23.100 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-30 06:37:23.106 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-30 06:37:23.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 06:37:23.108 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 06:37:23.108 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:37:23.289  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-30 06:37:23.289  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-30 06:37:23.290 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-30 06:37:23.290 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:37:23.291  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-30 06:37:23.292  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-30 06:37:23.292 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:37:23.292 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:37:23.292 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:37:23.293 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:37:23.294 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:37:23.294 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:37:23.295 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:37:23.295 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:37:23.295 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:37:23.296 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 06:37:23.300 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: a7b730f2e34c0063340230ec020964aa931cf4c1d52f9848a2c8b8a6e4b222ee44d994ca98f3a8419d7cc4158ddfbce2fa777c63bfe3d53631512cacc2b1b995548c7a535366fc33b9e35c11237d877e715a50c0757224a6083dea9f6b7e770fd10b7924425556b60d611288028636c6ff51b329a91267e7645d4067b5849a257eb9d56a47bedd5f4b23226870da90abdec756a580052fa811e426b904c75c3e14e16ac905d328a108d954a9899226c9605ceb9f7b3352ad0a6b49af0a8b7ce5b58fd423fb9e693f867cf42fb582ca10377b9b83f5b43ce4ff2713cd2d649980c151c9af0203bf8edc64cd1bb3f4538894ec2bd00fc0dd1fd9390c8e7618d5064959140e95d2a25c13212c688a6f7a1bbd5f95c7213241024453728b0a5412bc96ea4b5665de08e8247c96ee4edc96d1577736d2ae5fcac55a2e9df8f9e336f5fab24d6fd30757d310e2e83300f66b8ee34991b20cd491ebd499a919b53f0136d9776272a6a6c062da1ed5fe4c709a754ae8420362bf063c4cbde68bc0b90435 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ba:34:f2:70:91:81:1e:0f:00:bc:c1:08:4e:e2:cc:18:94:9e:11:19],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-30 06:42:21.627  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-30 06:42:21.630 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-30 06:42:21.632 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-30 06:42:21.633 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 06:42:21.634  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-30 06:42:21.634  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-30 06:42:21.635  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-30 06:42:21.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-30 06:42:21.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-30 06:42:21.636 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-30 06:42:21.640 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-30 06:42:21.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 06:42:21.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 06:42:21.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:42:21.786  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-30 06:42:21.786  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-30 06:42:21.787 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-30 06:42:21.787 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:42:21.788  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-30 06:42:21.789  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-30 06:42:21.789 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:42:21.789 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:42:21.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:42:21.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:42:21.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:42:21.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:42:21.792 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:42:21.792 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:42:21.793 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:42:21.793 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 06:42:21.796 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: a7b730f2e34c0063340230ec020964aa931cf4c1d52f9848a2c8b8a6e4b222ee44d994ca98f3a8419d7cc4158ddfbce2fa777c63bfe3d53631512cacc2b1b995548c7a535366fc33b9e35c11237d877e715a50c0757224a6083dea9f6b7e770fd10b7924425556b60d611288028636c6ff51b329a91267e7645d4067b5849a257eb9d56a47bedd5f4b23226870da90abdec756a580052fa811e426b904c75c3e14e16ac905d328a108d954a9899226c9605ceb9f7b3352ad0a6b49af0a8b7ce5b58fd423fb9e693f867cf42fb582ca10377b9b83f5b43ce4ff2713cd2d649980c151c9af0203bf8edc64cd1bb3f4538894ec2bd00fc0dd1fd9390c8e7618d5064959140e95d2a25c13212c688a6f7a1bbd5f95c7213241024453728b0a5412bc96ea4b5665de08e8247c96ee4edc96d1577736d2ae5fcac55a2e9df8f9e336f5fab24d6fd30757d310e2e83300f66b8ee34991b20cd491ebd499a919b53f0136d9776272a6a6c062da1ed5fe4c709a754ae8420362bf063c4cbde68bc0b90435 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [78:b9:58:40:3a:be:b1:f5:18:33:1f:57:d4:99:23:19:84:97:bc:c2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-30 06:42:37.368  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-30 06:42:37.369 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-30 06:42:37.371 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-30 06:42:37.371 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 06:42:37.372  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-30 06:42:37.372  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-30 06:42:37.373  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-30 06:42:37.373 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-30 06:42:37.374 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-30 06:42:37.374 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-30 06:42:37.378 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-30 06:42:37.379 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 06:42:37.379 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 06:42:37.379 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:42:37.495  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-30 06:42:37.495  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-30 06:42:37.496 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-30 06:42:37.496 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 06:42:37.498  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-30 06:42:37.498  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-30 06:42:37.498 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:42:37.499 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:42:37.499 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:42:37.500 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:42:37.500 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:42:37.500 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:42:37.501 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 06:42:37.502 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 06:42:37.502 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 06:42:37.503 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 06:42:37.506 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d0:49:d4:57:0a:67:37:c7:73:ec:e9:09:7c:a1:3a:b6:0a:10:61:6a],[56:66:d1:a4] modulus: a87ff114debc481ab3a782bda0db84f2346b02237bbd06f0cd85deb01e695360a950c3217f4dc72bf4e593666d53b766bfa4afe1e3dec5670494edc5b211455127d1e90ac639b77b80dc1f1d0bb16992cf776bc4999705cf3763cfa95f5d3566ed8f92519b14b6842c31d8d6be4921ce758f9ce4fef3a64d6d2936f2a5f760e52df6f7811dd3a7dbc52c67dec1f18a006a554676f68db42390f698ced98801585556803fbbe10dbbacf410c2fb8d211035d8ea75627361fdb455997a0676a0eff934f4a1ba2fa16ed0f1252f40f568c256af1014446a5b74403625ef26ba6cfc03ba5009dc67fb99e64dedc046d7036312a878912073c1a887a5a15cf42917ff public exponent: 10001 ] 2022-10-30 07:01:05.171  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-30 07:01:05.175 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-30 07:01:05.177 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-30 07:01:05.178 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 07:01:05.179  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-30 07:01:05.179  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-30 07:01:05.180  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-30 07:01:05.180 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-30 07:01:05.181 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-30 07:01:05.181 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-30 07:01:05.185 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-30 07:01:05.187 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 07:01:05.187 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 07:01:05.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 07:01:05.340  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-30 07:01:05.340  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-30 07:01:05.341 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-30 07:01:05.341 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 07:01:05.342  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-30 07:01:05.342  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-30 07:01:05.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 07:01:05.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 07:01:05.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 07:01:05.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 07:01:05.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 07:01:05.345 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 07:01:05.345 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 07:01:05.346 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 07:01:05.346 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 07:01:05.347 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 07:01:05.350 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [46:b0:e2:f3:7f:6c:6b:35:d7:25:f9:55:a2:7c:da:ab:9b:d2:34:99],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-30 07:01:10.238  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-30 07:01:10.239 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-30 07:01:10.240 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-30 07:01:10.241 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-30 07:01:10.242  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-30 07:01:10.243  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-30 07:01:10.243  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-30 07:01:10.244 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-30 07:01:10.245 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-30 07:01:10.246 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-30 07:01:10.249 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-30 07:01:10.249 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 07:01:10.250 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-30 07:01:10.251 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 07:01:10.404  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-30 07:01:10.405  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-30 07:01:10.405 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-30 07:01:10.406 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-30 07:01:10.407  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-30 07:01:10.407  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-30 07:01:10.408 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 07:01:10.408 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 07:01:10.408 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 07:01:10.410 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 07:01:10.411 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 07:01:10.411 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 07:01:10.412 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-30 07:01:10.412 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-30 07:01:10.412 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-30 07:01:10.413 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-30 07:01:10.416 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 490339085136079081741739532461954795791768819837 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 30 05:04:42 UTC 2022 Final Date: Fri Oct 29 05:04:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:bd:7d:42:64:17:f8:99:95:7c:6d:9d:0a:4b:40:1c:ae:2d:67:eb],[56:66:d1:a4] modulus: a7b730f2e34c0063340230ec020964aa931cf4c1d52f9848a2c8b8a6e4b222ee44d994ca98f3a8419d7cc4158ddfbce2fa777c63bfe3d53631512cacc2b1b995548c7a535366fc33b9e35c11237d877e715a50c0757224a6083dea9f6b7e770fd10b7924425556b60d611288028636c6ff51b329a91267e7645d4067b5849a257eb9d56a47bedd5f4b23226870da90abdec756a580052fa811e426b904c75c3e14e16ac905d328a108d954a9899226c9605ceb9f7b3352ad0a6b49af0a8b7ce5b58fd423fb9e693f867cf42fb582ca10377b9b83f5b43ce4ff2713cd2d649980c151c9af0203bf8edc64cd1bb3f4538894ec2bd00fc0dd1fd9390c8e7618d5064959140e95d2a25c13212c688a6f7a1bbd5f95c7213241024453728b0a5412bc96ea4b5665de08e8247c96ee4edc96d1577736d2ae5fcac55a2e9df8f9e336f5fab24d6fd30757d310e2e83300f66b8ee34991b20cd491ebd499a919b53f0136d9776272a6a6c062da1ed5fe4c709a754ae8420362bf063c4cbde68bc0b90435 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a71da6373b546fbc0747c4eb3d84126c890e22e3 0cd0a21fe5d7803f65c4dba1167de78f076e47e1 10b7386a6790ccef7389cb909c8c9c818e3cff05 961d772f28ff2f677c2fa196bd3188de5b67ef50 37f2c3d088594993fe67d64401d154434d83dd1d 00362888d29be4d3e18abb926f7f2df52d8c38ea a05ed657f1817cadc0edd263e9895524b0a6b0e0 c9a05667f96b0aa66280923bc658690245ced343 aa2e48be86edbc24588c75d1989dec62a7ca4b05 c22edb916a2a3e01e8576363fdf9dbfe6954c9a5 17ae53f9150a85de678bb99652982c82c164e4f8 5c1807495b081e3e936bb79efdea1d09dc40d2f4 cfeb0937f1598b12a4bdfd6b03035eeb7aec47b0 15637bae2fb843d78d39144070202944bac23670 b5aa1b705dc25bbc42ca2c2961f5942cd3e4ed43 fb947b2ea3424599635334991566f1b7c4d7a1df 901853f22fef406f966bc5a134355050721dd162 078c4acb93e610409943af925eaf3bb461620f91 d88f703eb26a32e66f6b8262cf4090f4765fecfe ac6500d3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [00:28:4d:99:7c:92:09:40:7c:78:96:42:15:2e:6d:78:2c:11:73:a8],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]