By type
2022-11-26 05:05:09,639 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-26 05:05:10,897 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-26 05:05:11.684 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 26, 2022 5:05:14 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 26, 2022 5:05:14 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 26, 2022 5:05:14 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 26, 2022 5:05:14 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-26 05:05:14.788 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-26 05:05:15.142 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-26 05:05:15.383 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-26 05:05:16.373 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-26 05:05:16.379 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-11-26 05:05:16.382 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-26 05:05:16.388 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-26 05:05:16.449 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-11-26 05:05:16.454 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-11-26 05:05:16.630 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-26 05:05:17.385 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 26, 2022 5:05:18 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-26 05:05:18.669 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 10.019 seconds (JVM running for 11.969) Nov 26, 2022 5:05:38 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-26 05:06:14.972 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-26 05:06:14.981 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-26 05:06:15.039 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-26 05:06:15.042 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-26 05:06:15.060 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-26 05:06:15.063 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-26 05:06:15.064 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-26 05:06:15.066 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-26 05:06:15.066 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 05:06:15.070 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-26 05:06:15.079 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-26 05:06:15.083 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-26 05:06:15.137 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-26 05:06:15.144 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 05:06:15.144 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 05:06:15.148 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 05:06:15.938 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-26 05:06:15.940 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-26 05:06:15.941 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-26 05:06:15.942 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 05:06:15.951 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-26 05:06:15.952 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-26 05:06:15.952 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 05:06:15.953 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 05:06:15.953 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 05:06:15.968 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 05:06:15.969 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 05:06:15.969 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 05:06:15.975 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 05:06:15.975 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 05:06:15.976 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 05:06:15.977 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-26 05:06:16.012 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 195952702820153454662797816952360722077089350782 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 26 05:01:21 UTC 2022 Final Date: Thu Nov 25 05:01:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:b4:ff:42:21:15:42:9e:ec:25:f9:d3:c4:ac:01:9d:20:ec:8e:51],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 56dcd4cca486bd284d50960b368ea289fd452905 d98fb8666bf9a752a85210ac5f824647e3de89e8 6300dba53954efd964506b4fa19882300c43f059 50692ffc4934cb5488ab20b7dc0726eb94d66bae 7a7af54d17b18eef521d49bca86afc4d1034c291 536c6dde802931edb81335ae7ceb4e60105cb3f8 d25e86fa58a007e742b00ef6d23993b31495f5f1 35deaf2b9659310b3b1b72bc1cc10385882d8131 6167dc9a879db8c573ed902aa743647f71b64d2d 8a958686b4473b5c2022b6db8414d76c321e9c58 93481ba605c1e9497effe92dc23b8f44ea5a8328 99b2503aa27589936c11e0c3d140f6bcc5843ae8 7ca483c8298803f2204d6a3bafa95a4d24f9ce31 8d07d076d205093ce946eafaf890ec97249ff5b5 03c0df868ef619409f915a4f40c360409ba10e3c a6fc29cfc66776477ec2c7483f82fe661d3e2e0d fe2fabb80030a50a878643bba887928e61166d30 d40fc1e3a9855aefbfb422f05a930704abda0afc 0c6dd8f92eb49f99351fbf1a95892e166475ce51 a3d6193d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [02:84:f5:de:dc:36:a5:2e:a5:1f:b5:dc:da:94:ed:34:43:5a:51:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-26 06:36:03.722 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-26 06:36:03.725 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-26 06:36:03.729 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-26 06:36:03.730 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-26 06:36:03.731 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-26 06:36:03.732 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-26 06:36:03.733 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-26 06:36:03.733 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-26 06:36:03.734 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-26 06:36:03.735 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-26 06:36:03.740 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-26 06:36:03.741 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 06:36:03.741 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 06:36:03.742 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 06:36:04.008 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-26 06:36:04.009 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-26 06:36:04.010 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-26 06:36:04.010 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 06:36:04.013 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-26 06:36:04.014 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-26 06:36:04.015 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 06:36:04.015 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 06:36:04.016 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 06:36:04.017 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 06:36:04.018 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 06:36:04.018 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 06:36:04.019 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 06:36:04.020 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 06:36:04.021 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 06:36:04.022 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-26 06:36:04.026 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 195952702820153454662797816952360722077089350782 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 26 05:01:21 UTC 2022 Final Date: Thu Nov 25 05:01:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:b4:ff:42:21:15:42:9e:ec:25:f9:d3:c4:ac:01:9d:20:ec:8e:51],[56:66:d1:a4] modulus: f1e6709733e57e8a630176b9ffa42ab2c1ffce1fcec6e21f3b6d971f9c36023c9db1ba64f45888813b1000c40b9ff4712cf3bf122269d8d53eaca2c65d45eacbb3369032be4a4170859df4746ddbae28738a2657c3637900fd4ab33c1f5e02c23318f6ddc30f095902f5c4dfcbee901ed345aaa4a45df6f52a1c307b088edb06bc64068bd530cb7789ac156d84c4f8bd43b97b386b69c93ea6613dd81ef5595e073ba9704a54cc1455c21755f1429626bc5ec55a98a9a052b9362733351e5f4278c526eaec33e175753f322da7d627b222fe949b962548377fdd633021979cfe61975cf94264fb3acb6ec8a956dc1adf7854d035d627cc77de12347fa1945fb83858d15bf99783320ef5a6fb2d0da1848ebde3d4c9f591679546e14baa3d7b98207cf571eb52d6e87531ef8e79e4af64b92ba67417f1a8262a6d3e5022fde30269b72f46333fd2656bfba7c73690e8f190ea734f3f5dc2bad25f62e4d3d0e4c1a230487c71c68ee26f2e3ad83a883765816f887e1767e7cd543c0043867288a9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 56dcd4cca486bd284d50960b368ea289fd452905 d98fb8666bf9a752a85210ac5f824647e3de89e8 6300dba53954efd964506b4fa19882300c43f059 50692ffc4934cb5488ab20b7dc0726eb94d66bae 7a7af54d17b18eef521d49bca86afc4d1034c291 536c6dde802931edb81335ae7ceb4e60105cb3f8 d25e86fa58a007e742b00ef6d23993b31495f5f1 35deaf2b9659310b3b1b72bc1cc10385882d8131 6167dc9a879db8c573ed902aa743647f71b64d2d 8a958686b4473b5c2022b6db8414d76c321e9c58 93481ba605c1e9497effe92dc23b8f44ea5a8328 99b2503aa27589936c11e0c3d140f6bcc5843ae8 7ca483c8298803f2204d6a3bafa95a4d24f9ce31 8d07d076d205093ce946eafaf890ec97249ff5b5 03c0df868ef619409f915a4f40c360409ba10e3c a6fc29cfc66776477ec2c7483f82fe661d3e2e0d fe2fabb80030a50a878643bba887928e61166d30 d40fc1e3a9855aefbfb422f05a930704abda0afc 0c6dd8f92eb49f99351fbf1a95892e166475ce51 a3d6193d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [59:61:17:36:ce:b0:ad:9f:01:c1:b1:5e:18:92:25:6c:62:cf:a5:46],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-26 06:37:51.981 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-26 06:37:51.984 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-26 06:37:51.986 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-26 06:37:51.987 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-26 06:37:51.988 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-26 06:37:51.989 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-26 06:37:51.990 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-26 06:37:51.990 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-26 06:37:51.991 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-26 06:37:51.992 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-26 06:37:51.998 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-26 06:37:51.999 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 06:37:51.999 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 06:37:52.000 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 06:37:52.450 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-26 06:37:52.451 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-26 06:37:52.451 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-26 06:37:52.452 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 06:37:52.454 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-26 06:37:52.455 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-26 06:37:52.455 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 06:37:52.461 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 06:37:52.462 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 06:37:52.463 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 06:37:52.463 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 06:37:52.464 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 06:37:52.465 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 06:37:52.473 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 06:37:52.475 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 06:37:52.481 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-26 06:37:52.486 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 195952702820153454662797816952360722077089350782 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 26 05:01:21 UTC 2022 Final Date: Thu Nov 25 05:01:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:b4:ff:42:21:15:42:9e:ec:25:f9:d3:c4:ac:01:9d:20:ec:8e:51],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 56dcd4cca486bd284d50960b368ea289fd452905 d98fb8666bf9a752a85210ac5f824647e3de89e8 6300dba53954efd964506b4fa19882300c43f059 50692ffc4934cb5488ab20b7dc0726eb94d66bae 7a7af54d17b18eef521d49bca86afc4d1034c291 536c6dde802931edb81335ae7ceb4e60105cb3f8 d25e86fa58a007e742b00ef6d23993b31495f5f1 35deaf2b9659310b3b1b72bc1cc10385882d8131 6167dc9a879db8c573ed902aa743647f71b64d2d 8a958686b4473b5c2022b6db8414d76c321e9c58 93481ba605c1e9497effe92dc23b8f44ea5a8328 99b2503aa27589936c11e0c3d140f6bcc5843ae8 7ca483c8298803f2204d6a3bafa95a4d24f9ce31 8d07d076d205093ce946eafaf890ec97249ff5b5 03c0df868ef619409f915a4f40c360409ba10e3c a6fc29cfc66776477ec2c7483f82fe661d3e2e0d fe2fabb80030a50a878643bba887928e61166d30 d40fc1e3a9855aefbfb422f05a930704abda0afc 0c6dd8f92eb49f99351fbf1a95892e166475ce51 a3d6193d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:aa:1b:f7:02:6f:88:95:7c:f2:ff:54:e3:88:cb:24:13:61:f7:41],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-26 06:40:14.234 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-26 06:40:14.237 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-26 06:40:14.239 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-26 06:40:14.240 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-26 06:40:14.241 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-26 06:40:14.242 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-26 06:40:14.243 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-26 06:40:14.243 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-26 06:40:14.244 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-26 06:40:14.244 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-26 06:40:14.250 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-26 06:40:14.251 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 06:40:14.251 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 06:40:14.252 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 06:40:14.779 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-26 06:40:14.781 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-26 06:40:14.781 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-26 06:40:14.782 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 06:40:14.784 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-26 06:40:14.785 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-26 06:40:14.786 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 06:40:14.786 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 06:40:14.787 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 06:40:14.788 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 06:40:14.788 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 06:40:14.789 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 06:40:14.790 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 06:40:14.790 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 06:40:14.791 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 06:40:14.791 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-26 06:40:14.796 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 195952702820153454662797816952360722077089350782 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 26 05:01:21 UTC 2022 Final Date: Thu Nov 25 05:01:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:b4:ff:42:21:15:42:9e:ec:25:f9:d3:c4:ac:01:9d:20:ec:8e:51],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 56dcd4cca486bd284d50960b368ea289fd452905 d98fb8666bf9a752a85210ac5f824647e3de89e8 6300dba53954efd964506b4fa19882300c43f059 50692ffc4934cb5488ab20b7dc0726eb94d66bae 7a7af54d17b18eef521d49bca86afc4d1034c291 536c6dde802931edb81335ae7ceb4e60105cb3f8 d25e86fa58a007e742b00ef6d23993b31495f5f1 35deaf2b9659310b3b1b72bc1cc10385882d8131 6167dc9a879db8c573ed902aa743647f71b64d2d 8a958686b4473b5c2022b6db8414d76c321e9c58 93481ba605c1e9497effe92dc23b8f44ea5a8328 99b2503aa27589936c11e0c3d140f6bcc5843ae8 7ca483c8298803f2204d6a3bafa95a4d24f9ce31 8d07d076d205093ce946eafaf890ec97249ff5b5 03c0df868ef619409f915a4f40c360409ba10e3c a6fc29cfc66776477ec2c7483f82fe661d3e2e0d fe2fabb80030a50a878643bba887928e61166d30 d40fc1e3a9855aefbfb422f05a930704abda0afc 0c6dd8f92eb49f99351fbf1a95892e166475ce51 a3d6193d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [78:ca:56:94:0b:78:15:82:90:7c:31:4a:72:85:de:a6:1a:ed:69:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-26 06:43:15.426 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-26 06:43:15.428 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-26 06:43:15.430 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-26 06:43:15.430 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-26 06:43:15.431 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-26 06:43:15.432 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-26 06:43:15.432 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-26 06:43:15.433 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-26 06:43:15.433 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-26 06:43:15.434 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-26 06:43:15.438 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-26 06:43:15.439 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 06:43:15.439 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 06:43:15.439 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 06:43:15.692 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-26 06:43:15.693 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-26 06:43:15.694 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-26 06:43:15.694 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 06:43:15.695 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-26 06:43:15.696 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-26 06:43:15.697 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 06:43:15.697 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 06:43:15.697 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 06:43:15.698 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 06:43:15.698 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 06:43:15.699 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 06:43:15.700 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 06:43:15.700 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 06:43:15.701 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 06:43:15.702 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-26 06:43:15.712 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 195952702820153454662797816952360722077089350782 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 26 05:01:21 UTC 2022 Final Date: Thu Nov 25 05:01:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:b4:ff:42:21:15:42:9e:ec:25:f9:d3:c4:ac:01:9d:20:ec:8e:51],[56:66:d1:a4] modulus: f1e6709733e57e8a630176b9ffa42ab2c1ffce1fcec6e21f3b6d971f9c36023c9db1ba64f45888813b1000c40b9ff4712cf3bf122269d8d53eaca2c65d45eacbb3369032be4a4170859df4746ddbae28738a2657c3637900fd4ab33c1f5e02c23318f6ddc30f095902f5c4dfcbee901ed345aaa4a45df6f52a1c307b088edb06bc64068bd530cb7789ac156d84c4f8bd43b97b386b69c93ea6613dd81ef5595e073ba9704a54cc1455c21755f1429626bc5ec55a98a9a052b9362733351e5f4278c526eaec33e175753f322da7d627b222fe949b962548377fdd633021979cfe61975cf94264fb3acb6ec8a956dc1adf7854d035d627cc77de12347fa1945fb83858d15bf99783320ef5a6fb2d0da1848ebde3d4c9f591679546e14baa3d7b98207cf571eb52d6e87531ef8e79e4af64b92ba67417f1a8262a6d3e5022fde30269b72f46333fd2656bfba7c73690e8f190ea734f3f5dc2bad25f62e4d3d0e4c1a230487c71c68ee26f2e3ad83a883765816f887e1767e7cd543c0043867288a9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 56dcd4cca486bd284d50960b368ea289fd452905 d98fb8666bf9a752a85210ac5f824647e3de89e8 6300dba53954efd964506b4fa19882300c43f059 50692ffc4934cb5488ab20b7dc0726eb94d66bae 7a7af54d17b18eef521d49bca86afc4d1034c291 536c6dde802931edb81335ae7ceb4e60105cb3f8 d25e86fa58a007e742b00ef6d23993b31495f5f1 35deaf2b9659310b3b1b72bc1cc10385882d8131 6167dc9a879db8c573ed902aa743647f71b64d2d 8a958686b4473b5c2022b6db8414d76c321e9c58 93481ba605c1e9497effe92dc23b8f44ea5a8328 99b2503aa27589936c11e0c3d140f6bcc5843ae8 7ca483c8298803f2204d6a3bafa95a4d24f9ce31 8d07d076d205093ce946eafaf890ec97249ff5b5 03c0df868ef619409f915a4f40c360409ba10e3c a6fc29cfc66776477ec2c7483f82fe661d3e2e0d fe2fabb80030a50a878643bba887928e61166d30 d40fc1e3a9855aefbfb422f05a930704abda0afc 0c6dd8f92eb49f99351fbf1a95892e166475ce51 a3d6193d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:2e:b4:3d:ee:08:33:d4:90:a2:04:ee:74:a5:cb:7b:4f:34:0b:1b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-26 06:49:35.642 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-26 06:49:35.645 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-26 06:49:35.648 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-26 06:49:35.649 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-26 06:49:35.650 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-26 06:49:35.651 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-26 06:49:35.651 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-26 06:49:35.651 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-26 06:49:35.652 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-26 06:49:35.652 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-26 06:49:35.658 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-26 06:49:35.659 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 06:49:35.659 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 06:49:35.659 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 06:49:35.838 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-26 06:49:35.839 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-26 06:49:35.840 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-26 06:49:35.840 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 06:49:35.844 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-26 06:49:35.844 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-26 06:49:35.845 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 06:49:35.845 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 06:49:35.846 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 06:49:35.846 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 06:49:35.847 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 06:49:35.847 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 06:49:35.848 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 06:49:35.848 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 06:49:35.849 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 06:49:35.849 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-26 06:49:35.853 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 195952702820153454662797816952360722077089350782 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 26 05:01:21 UTC 2022 Final Date: Thu Nov 25 05:01:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:b4:ff:42:21:15:42:9e:ec:25:f9:d3:c4:ac:01:9d:20:ec:8e:51],[56:66:d1:a4] modulus: f1e6709733e57e8a630176b9ffa42ab2c1ffce1fcec6e21f3b6d971f9c36023c9db1ba64f45888813b1000c40b9ff4712cf3bf122269d8d53eaca2c65d45eacbb3369032be4a4170859df4746ddbae28738a2657c3637900fd4ab33c1f5e02c23318f6ddc30f095902f5c4dfcbee901ed345aaa4a45df6f52a1c307b088edb06bc64068bd530cb7789ac156d84c4f8bd43b97b386b69c93ea6613dd81ef5595e073ba9704a54cc1455c21755f1429626bc5ec55a98a9a052b9362733351e5f4278c526eaec33e175753f322da7d627b222fe949b962548377fdd633021979cfe61975cf94264fb3acb6ec8a956dc1adf7854d035d627cc77de12347fa1945fb83858d15bf99783320ef5a6fb2d0da1848ebde3d4c9f591679546e14baa3d7b98207cf571eb52d6e87531ef8e79e4af64b92ba67417f1a8262a6d3e5022fde30269b72f46333fd2656bfba7c73690e8f190ea734f3f5dc2bad25f62e4d3d0e4c1a230487c71c68ee26f2e3ad83a883765816f887e1767e7cd543c0043867288a9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 56dcd4cca486bd284d50960b368ea289fd452905 d98fb8666bf9a752a85210ac5f824647e3de89e8 6300dba53954efd964506b4fa19882300c43f059 50692ffc4934cb5488ab20b7dc0726eb94d66bae 7a7af54d17b18eef521d49bca86afc4d1034c291 536c6dde802931edb81335ae7ceb4e60105cb3f8 d25e86fa58a007e742b00ef6d23993b31495f5f1 35deaf2b9659310b3b1b72bc1cc10385882d8131 6167dc9a879db8c573ed902aa743647f71b64d2d 8a958686b4473b5c2022b6db8414d76c321e9c58 93481ba605c1e9497effe92dc23b8f44ea5a8328 99b2503aa27589936c11e0c3d140f6bcc5843ae8 7ca483c8298803f2204d6a3bafa95a4d24f9ce31 8d07d076d205093ce946eafaf890ec97249ff5b5 03c0df868ef619409f915a4f40c360409ba10e3c a6fc29cfc66776477ec2c7483f82fe661d3e2e0d fe2fabb80030a50a878643bba887928e61166d30 d40fc1e3a9855aefbfb422f05a930704abda0afc 0c6dd8f92eb49f99351fbf1a95892e166475ce51 a3d6193d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5f:7d:49:ae:d8:ee:4a:cb:f0:ef:69:ff:2b:d0:60:0a:10:92:a3:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-26 06:55:31.833 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-26 06:55:31.836 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-26 06:55:31.839 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-26 06:55:31.840 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-26 06:55:31.841 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-26 06:55:31.842 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-26 06:55:31.842 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-26 06:55:31.843 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-26 06:55:31.843 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-26 06:55:31.843 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-26 06:55:31.848 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-26 06:55:31.849 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 06:55:31.850 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 06:55:31.850 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 06:55:32.045 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-26 06:55:32.046 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-26 06:55:32.046 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-26 06:55:32.047 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 06:55:32.048 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-26 06:55:32.048 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-26 06:55:32.049 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 06:55:32.049 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 06:55:32.050 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 06:55:32.051 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 06:55:32.051 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 06:55:32.052 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 06:55:32.052 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 06:55:32.053 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 06:55:32.053 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 06:55:32.054 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-26 06:55:32.057 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 195952702820153454662797816952360722077089350782 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 26 05:01:21 UTC 2022 Final Date: Thu Nov 25 05:01:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:b4:ff:42:21:15:42:9e:ec:25:f9:d3:c4:ac:01:9d:20:ec:8e:51],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 56dcd4cca486bd284d50960b368ea289fd452905 d98fb8666bf9a752a85210ac5f824647e3de89e8 6300dba53954efd964506b4fa19882300c43f059 50692ffc4934cb5488ab20b7dc0726eb94d66bae 7a7af54d17b18eef521d49bca86afc4d1034c291 536c6dde802931edb81335ae7ceb4e60105cb3f8 d25e86fa58a007e742b00ef6d23993b31495f5f1 35deaf2b9659310b3b1b72bc1cc10385882d8131 6167dc9a879db8c573ed902aa743647f71b64d2d 8a958686b4473b5c2022b6db8414d76c321e9c58 93481ba605c1e9497effe92dc23b8f44ea5a8328 99b2503aa27589936c11e0c3d140f6bcc5843ae8 7ca483c8298803f2204d6a3bafa95a4d24f9ce31 8d07d076d205093ce946eafaf890ec97249ff5b5 03c0df868ef619409f915a4f40c360409ba10e3c a6fc29cfc66776477ec2c7483f82fe661d3e2e0d fe2fabb80030a50a878643bba887928e61166d30 d40fc1e3a9855aefbfb422f05a930704abda0afc 0c6dd8f92eb49f99351fbf1a95892e166475ce51 a3d6193d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f8:7b:95:52:05:e0:bb:b3:50:eb:3c:af:be:2e:b2:3c:85:71:99:68],[56:66:d1:a4] modulus: c8936ea35dc4a8263a98e5e87dae7570d835ddbc96953a2793392b52421f2405de3e92683db63d68795e65d30dc62bf0f2fad922b12dee8a23e8cfdcc8d3fe5b6e606b867c4ce4a0854a40d4ff140aa98d0b6a8cadf0985a1d3dd7a1551e9975a25205ec53bb99737255d30a73f51b23cbab2889d28b8be96412b762a7946a435002690ca24224f53bd0ac97073c78589f2343f8738422489c860205cce2709bbd4f8f5fb8ee7334c58ab5f5246e8407aadcfd8f839334d5dcd16bb68508bae3ccb10ac35e0dbd693a6700e696c9eede6a629478e4644fec162144361cb8104a7011102af1461ba9b10c5bcebfb48d56f394bcc60da236d5949a6339597adcbb public exponent: 10001 ] 2022-11-26 07:03:00.963 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-26 07:03:00.965 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-26 07:03:00.966 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-26 07:03:00.967 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-26 07:03:00.967 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-26 07:03:00.967 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-26 07:03:00.968 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-26 07:03:00.968 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-26 07:03:00.969 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-26 07:03:00.969 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-26 07:03:00.973 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-26 07:03:00.974 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 07:03:00.974 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 07:03:00.975 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 07:03:01.146 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-26 07:03:01.147 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-26 07:03:01.147 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-26 07:03:01.147 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 07:03:01.148 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-26 07:03:01.149 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-26 07:03:01.149 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:03:01.149 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:03:01.150 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:03:01.150 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:03:01.151 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:03:01.151 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:03:01.152 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:03:01.152 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:03:01.153 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:03:01.153 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-26 07:03:01.156 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 195952702820153454662797816952360722077089350782 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 26 05:01:21 UTC 2022 Final Date: Thu Nov 25 05:01:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:b4:ff:42:21:15:42:9e:ec:25:f9:d3:c4:ac:01:9d:20:ec:8e:51],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 56dcd4cca486bd284d50960b368ea289fd452905 d98fb8666bf9a752a85210ac5f824647e3de89e8 6300dba53954efd964506b4fa19882300c43f059 50692ffc4934cb5488ab20b7dc0726eb94d66bae 7a7af54d17b18eef521d49bca86afc4d1034c291 536c6dde802931edb81335ae7ceb4e60105cb3f8 d25e86fa58a007e742b00ef6d23993b31495f5f1 35deaf2b9659310b3b1b72bc1cc10385882d8131 6167dc9a879db8c573ed902aa743647f71b64d2d 8a958686b4473b5c2022b6db8414d76c321e9c58 93481ba605c1e9497effe92dc23b8f44ea5a8328 99b2503aa27589936c11e0c3d140f6bcc5843ae8 7ca483c8298803f2204d6a3bafa95a4d24f9ce31 8d07d076d205093ce946eafaf890ec97249ff5b5 03c0df868ef619409f915a4f40c360409ba10e3c a6fc29cfc66776477ec2c7483f82fe661d3e2e0d fe2fabb80030a50a878643bba887928e61166d30 d40fc1e3a9855aefbfb422f05a930704abda0afc 0c6dd8f92eb49f99351fbf1a95892e166475ce51 a3d6193d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2d:40:c6:60:49:51:1d:31:7a:a6:eb:f8:86:63:4d:ee:9d:83:02:2b],[56:66:d1:a4] modulus: be1c5bbe9fd782e92497b495afc9fde2557eb9739419da8b53fca2171573815c9e14341eaeafa01daeac4b1eecc2aaac815232e377f6eea2fbce51706fc36a72871709a9dc99727c648515c4767251ad59887639291f107b4eefbecb2716a7ac57f0f5da182edafadb8a9083bb91f16b3bcf034cb05ae3fae5f38e1bf5cd0591cc1c8b732a098b04963a492f4da2e6b09c4593afa17d820f82cd627f4d5ba7b3d21228ac193400ead53a4b17e080a96f947a92b22859a1282d5487ba76a9f142e7f6fc2a167b6528a6504f20dccfe53470292c8358d18db911d4aaaa4679845f0c8c4d419e48d4effa4eb9a129db09078b24bb9522925b9eef6207a24200527d public exponent: 10001 ] 2022-11-26 07:09:31.419 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-26 07:09:31.421 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-26 07:09:31.425 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-26 07:09:31.428 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-26 07:09:31.430 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-26 07:09:31.433 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-26 07:09:31.433 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-26 07:09:31.434 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-26 07:09:31.434 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-26 07:09:31.435 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-26 07:09:31.439 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-26 07:09:31.440 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 07:09:31.440 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 07:09:31.441 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 07:09:31.683 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-26 07:09:31.684 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-26 07:09:31.684 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-26 07:09:31.684 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 07:09:31.686 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-26 07:09:31.686 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-26 07:09:31.687 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:09:31.687 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:09:31.687 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:09:31.688 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:09:31.688 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:09:31.688 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:09:31.689 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:09:31.689 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:09:31.690 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:09:31.691 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-26 07:09:31.696 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 195952702820153454662797816952360722077089350782 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 26 05:01:21 UTC 2022 Final Date: Thu Nov 25 05:01:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:b4:ff:42:21:15:42:9e:ec:25:f9:d3:c4:ac:01:9d:20:ec:8e:51],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 56dcd4cca486bd284d50960b368ea289fd452905 d98fb8666bf9a752a85210ac5f824647e3de89e8 6300dba53954efd964506b4fa19882300c43f059 50692ffc4934cb5488ab20b7dc0726eb94d66bae 7a7af54d17b18eef521d49bca86afc4d1034c291 536c6dde802931edb81335ae7ceb4e60105cb3f8 d25e86fa58a007e742b00ef6d23993b31495f5f1 35deaf2b9659310b3b1b72bc1cc10385882d8131 6167dc9a879db8c573ed902aa743647f71b64d2d 8a958686b4473b5c2022b6db8414d76c321e9c58 93481ba605c1e9497effe92dc23b8f44ea5a8328 99b2503aa27589936c11e0c3d140f6bcc5843ae8 7ca483c8298803f2204d6a3bafa95a4d24f9ce31 8d07d076d205093ce946eafaf890ec97249ff5b5 03c0df868ef619409f915a4f40c360409ba10e3c a6fc29cfc66776477ec2c7483f82fe661d3e2e0d fe2fabb80030a50a878643bba887928e61166d30 d40fc1e3a9855aefbfb422f05a930704abda0afc 0c6dd8f92eb49f99351fbf1a95892e166475ce51 a3d6193d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c7:05:95:05:7b:13:72:2a:fd:30:36:60:3c:1e:1c:f9:0f:63:f2:7a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-26 07:16:32.424 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-26 07:16:32.426 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-26 07:16:32.428 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-26 07:16:32.428 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-26 07:16:32.429 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-26 07:16:32.429 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-26 07:16:32.430 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-26 07:16:32.430 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-26 07:16:32.431 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-26 07:16:32.431 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-26 07:16:32.435 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-26 07:16:32.435 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 07:16:32.436 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 07:16:32.436 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 07:16:32.616 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-26 07:16:32.617 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-26 07:16:32.617 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-26 07:16:32.617 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 07:16:32.619 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-26 07:16:32.619 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-26 07:16:32.619 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:16:32.620 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:16:32.620 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:16:32.621 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:16:32.621 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:16:32.621 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:16:32.622 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:16:32.622 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:16:32.622 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:16:32.623 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-26 07:16:32.626 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 195952702820153454662797816952360722077089350782 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 26 05:01:21 UTC 2022 Final Date: Thu Nov 25 05:01:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:b4:ff:42:21:15:42:9e:ec:25:f9:d3:c4:ac:01:9d:20:ec:8e:51],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 56dcd4cca486bd284d50960b368ea289fd452905 d98fb8666bf9a752a85210ac5f824647e3de89e8 6300dba53954efd964506b4fa19882300c43f059 50692ffc4934cb5488ab20b7dc0726eb94d66bae 7a7af54d17b18eef521d49bca86afc4d1034c291 536c6dde802931edb81335ae7ceb4e60105cb3f8 d25e86fa58a007e742b00ef6d23993b31495f5f1 35deaf2b9659310b3b1b72bc1cc10385882d8131 6167dc9a879db8c573ed902aa743647f71b64d2d 8a958686b4473b5c2022b6db8414d76c321e9c58 93481ba605c1e9497effe92dc23b8f44ea5a8328 99b2503aa27589936c11e0c3d140f6bcc5843ae8 7ca483c8298803f2204d6a3bafa95a4d24f9ce31 8d07d076d205093ce946eafaf890ec97249ff5b5 03c0df868ef619409f915a4f40c360409ba10e3c a6fc29cfc66776477ec2c7483f82fe661d3e2e0d fe2fabb80030a50a878643bba887928e61166d30 d40fc1e3a9855aefbfb422f05a930704abda0afc 0c6dd8f92eb49f99351fbf1a95892e166475ce51 a3d6193d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [76:48:21:fa:fd:29:f9:ba:a8:3b:1d:f0:c3:ef:1f:c7:81:05:dc:7b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-26 07:23:47.376 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-26 07:23:47.381 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-26 07:23:47.385 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-26 07:23:47.387 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-26 07:23:47.388 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-26 07:23:47.389 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-26 07:23:47.389 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-26 07:23:47.390 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-26 07:23:47.391 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-26 07:23:47.391 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-26 07:23:47.397 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-26 07:23:47.399 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 07:23:47.399 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 07:23:47.399 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 07:23:47.711 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-26 07:23:47.712 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-26 07:23:47.713 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-26 07:23:47.713 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 07:23:47.715 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-26 07:23:47.715 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-26 07:23:47.716 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:23:47.716 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:23:47.716 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:23:47.717 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:23:47.717 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:23:47.717 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:23:47.718 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:23:47.719 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:23:47.719 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:23:47.719 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-26 07:23:47.723 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 195952702820153454662797816952360722077089350782 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 26 05:01:21 UTC 2022 Final Date: Thu Nov 25 05:01:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:b4:ff:42:21:15:42:9e:ec:25:f9:d3:c4:ac:01:9d:20:ec:8e:51],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 56dcd4cca486bd284d50960b368ea289fd452905 d98fb8666bf9a752a85210ac5f824647e3de89e8 6300dba53954efd964506b4fa19882300c43f059 50692ffc4934cb5488ab20b7dc0726eb94d66bae 7a7af54d17b18eef521d49bca86afc4d1034c291 536c6dde802931edb81335ae7ceb4e60105cb3f8 d25e86fa58a007e742b00ef6d23993b31495f5f1 35deaf2b9659310b3b1b72bc1cc10385882d8131 6167dc9a879db8c573ed902aa743647f71b64d2d 8a958686b4473b5c2022b6db8414d76c321e9c58 93481ba605c1e9497effe92dc23b8f44ea5a8328 99b2503aa27589936c11e0c3d140f6bcc5843ae8 7ca483c8298803f2204d6a3bafa95a4d24f9ce31 8d07d076d205093ce946eafaf890ec97249ff5b5 03c0df868ef619409f915a4f40c360409ba10e3c a6fc29cfc66776477ec2c7483f82fe661d3e2e0d fe2fabb80030a50a878643bba887928e61166d30 d40fc1e3a9855aefbfb422f05a930704abda0afc 0c6dd8f92eb49f99351fbf1a95892e166475ce51 a3d6193d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:70:ef:13:2a:1d:db:c6:da:31:b3:25:3f:b4:7a:46:25:d1:06:41],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-26 07:24:04.223 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-26 07:24:04.224 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-26 07:24:04.225 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-26 07:24:04.226 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-26 07:24:04.227 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-26 07:24:04.227 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-26 07:24:04.228 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-26 07:24:04.228 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-26 07:24:04.229 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-26 07:24:04.229 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-26 07:24:04.233 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-26 07:24:04.233 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 07:24:04.234 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 07:24:04.234 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 07:24:04.416 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-26 07:24:04.417 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-26 07:24:04.418 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-26 07:24:04.418 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 07:24:04.420 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-26 07:24:04.421 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-26 07:24:04.421 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:24:04.422 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:24:04.422 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:24:04.423 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:24:04.423 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:24:04.424 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:24:04.425 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:24:04.425 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:24:04.425 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:24:04.426 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-26 07:24:04.429 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 195952702820153454662797816952360722077089350782 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 26 05:01:21 UTC 2022 Final Date: Thu Nov 25 05:01:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:b4:ff:42:21:15:42:9e:ec:25:f9:d3:c4:ac:01:9d:20:ec:8e:51],[56:66:d1:a4] modulus: f1e6709733e57e8a630176b9ffa42ab2c1ffce1fcec6e21f3b6d971f9c36023c9db1ba64f45888813b1000c40b9ff4712cf3bf122269d8d53eaca2c65d45eacbb3369032be4a4170859df4746ddbae28738a2657c3637900fd4ab33c1f5e02c23318f6ddc30f095902f5c4dfcbee901ed345aaa4a45df6f52a1c307b088edb06bc64068bd530cb7789ac156d84c4f8bd43b97b386b69c93ea6613dd81ef5595e073ba9704a54cc1455c21755f1429626bc5ec55a98a9a052b9362733351e5f4278c526eaec33e175753f322da7d627b222fe949b962548377fdd633021979cfe61975cf94264fb3acb6ec8a956dc1adf7854d035d627cc77de12347fa1945fb83858d15bf99783320ef5a6fb2d0da1848ebde3d4c9f591679546e14baa3d7b98207cf571eb52d6e87531ef8e79e4af64b92ba67417f1a8262a6d3e5022fde30269b72f46333fd2656bfba7c73690e8f190ea734f3f5dc2bad25f62e4d3d0e4c1a230487c71c68ee26f2e3ad83a883765816f887e1767e7cd543c0043867288a9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 56dcd4cca486bd284d50960b368ea289fd452905 d98fb8666bf9a752a85210ac5f824647e3de89e8 6300dba53954efd964506b4fa19882300c43f059 50692ffc4934cb5488ab20b7dc0726eb94d66bae 7a7af54d17b18eef521d49bca86afc4d1034c291 536c6dde802931edb81335ae7ceb4e60105cb3f8 d25e86fa58a007e742b00ef6d23993b31495f5f1 35deaf2b9659310b3b1b72bc1cc10385882d8131 6167dc9a879db8c573ed902aa743647f71b64d2d 8a958686b4473b5c2022b6db8414d76c321e9c58 93481ba605c1e9497effe92dc23b8f44ea5a8328 99b2503aa27589936c11e0c3d140f6bcc5843ae8 7ca483c8298803f2204d6a3bafa95a4d24f9ce31 8d07d076d205093ce946eafaf890ec97249ff5b5 03c0df868ef619409f915a4f40c360409ba10e3c a6fc29cfc66776477ec2c7483f82fe661d3e2e0d fe2fabb80030a50a878643bba887928e61166d30 d40fc1e3a9855aefbfb422f05a930704abda0afc 0c6dd8f92eb49f99351fbf1a95892e166475ce51 a3d6193d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ea:43:d9:3b:48:fc:4b:b1:c6:f7:c1:4a:1b:82:3b:e1:6b:1b:af:f0],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-26 07:50:01.189 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-26 07:50:01.192 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-26 07:50:01.194 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-26 07:50:01.196 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-26 07:50:01.196 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-26 07:50:01.197 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-26 07:50:01.198 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-26 07:50:01.198 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-26 07:50:01.199 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-26 07:50:01.200 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-26 07:50:01.208 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-26 07:50:01.209 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 07:50:01.210 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 07:50:01.210 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 07:50:01.419 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-26 07:50:01.420 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-26 07:50:01.420 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-26 07:50:01.421 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 07:50:01.422 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-26 07:50:01.422 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-26 07:50:01.425 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:50:01.425 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:50:01.425 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:50:01.427 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:50:01.427 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:50:01.427 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:50:01.428 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:50:01.428 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:50:01.428 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:50:01.429 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-26 07:50:01.433 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 195952702820153454662797816952360722077089350782 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 26 05:01:21 UTC 2022 Final Date: Thu Nov 25 05:01:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:b4:ff:42:21:15:42:9e:ec:25:f9:d3:c4:ac:01:9d:20:ec:8e:51],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 56dcd4cca486bd284d50960b368ea289fd452905 d98fb8666bf9a752a85210ac5f824647e3de89e8 6300dba53954efd964506b4fa19882300c43f059 50692ffc4934cb5488ab20b7dc0726eb94d66bae 7a7af54d17b18eef521d49bca86afc4d1034c291 536c6dde802931edb81335ae7ceb4e60105cb3f8 d25e86fa58a007e742b00ef6d23993b31495f5f1 35deaf2b9659310b3b1b72bc1cc10385882d8131 6167dc9a879db8c573ed902aa743647f71b64d2d 8a958686b4473b5c2022b6db8414d76c321e9c58 93481ba605c1e9497effe92dc23b8f44ea5a8328 99b2503aa27589936c11e0c3d140f6bcc5843ae8 7ca483c8298803f2204d6a3bafa95a4d24f9ce31 8d07d076d205093ce946eafaf890ec97249ff5b5 03c0df868ef619409f915a4f40c360409ba10e3c a6fc29cfc66776477ec2c7483f82fe661d3e2e0d fe2fabb80030a50a878643bba887928e61166d30 d40fc1e3a9855aefbfb422f05a930704abda0afc 0c6dd8f92eb49f99351fbf1a95892e166475ce51 a3d6193d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d1:d3:c6:ed:d1:ba:3c:76:61:74:f3:ce:a2:89:a2:7f:b9:cd:7a:9b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-26 07:50:06.071 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-26 07:50:06.072 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-26 07:50:06.073 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-26 07:50:06.074 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-26 07:50:06.074 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-26 07:50:06.075 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-26 07:50:06.075 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-26 07:50:06.076 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-26 07:50:06.076 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-26 07:50:06.076 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-26 07:50:06.080 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-26 07:50:06.081 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 07:50:06.081 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-26 07:50:06.082 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 07:50:06.188 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-26 07:50:06.189 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-26 07:50:06.189 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-26 07:50:06.190 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-26 07:50:06.191 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-26 07:50:06.191 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-26 07:50:06.192 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:50:06.192 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:50:06.192 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:50:06.193 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:50:06.193 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:50:06.194 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:50:06.194 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-26 07:50:06.195 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-26 07:50:06.195 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-26 07:50:06.196 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-26 07:50:06.198 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 195952702820153454662797816952360722077089350782 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 26 05:01:21 UTC 2022 Final Date: Thu Nov 25 05:01:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:b4:ff:42:21:15:42:9e:ec:25:f9:d3:c4:ac:01:9d:20:ec:8e:51],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 56dcd4cca486bd284d50960b368ea289fd452905 d98fb8666bf9a752a85210ac5f824647e3de89e8 6300dba53954efd964506b4fa19882300c43f059 50692ffc4934cb5488ab20b7dc0726eb94d66bae 7a7af54d17b18eef521d49bca86afc4d1034c291 536c6dde802931edb81335ae7ceb4e60105cb3f8 d25e86fa58a007e742b00ef6d23993b31495f5f1 35deaf2b9659310b3b1b72bc1cc10385882d8131 6167dc9a879db8c573ed902aa743647f71b64d2d 8a958686b4473b5c2022b6db8414d76c321e9c58 93481ba605c1e9497effe92dc23b8f44ea5a8328 99b2503aa27589936c11e0c3d140f6bcc5843ae8 7ca483c8298803f2204d6a3bafa95a4d24f9ce31 8d07d076d205093ce946eafaf890ec97249ff5b5 03c0df868ef619409f915a4f40c360409ba10e3c a6fc29cfc66776477ec2c7483f82fe661d3e2e0d fe2fabb80030a50a878643bba887928e61166d30 d40fc1e3a9855aefbfb422f05a930704abda0afc 0c6dd8f92eb49f99351fbf1a95892e166475ce51 a3d6193d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [db:01:0f:ee:9b:6d:82:00:80:a5:3e:15:3f:d7:4d:f0:b4:53:2f:21],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]