By type
2023-01-17 05:03:40,669 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-17 05:03:41,826 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-17 05:03:42.593 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jan 17, 2023 5:03:44 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 17, 2023 5:03:44 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 17, 2023 5:03:44 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 17, 2023 5:03:44 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-17 05:03:45.633 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-17 05:03:45.939 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-01-17 05:03:46.107 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-17 05:03:46.858 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-17 05:03:46.861 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2023-01-17 05:03:46.862 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-17 05:03:46.866 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-17 05:03:46.903 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2023-01-17 05:03:46.906 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2023-01-17 05:03:47.027 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-01-17 05:03:47.752 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 17, 2023 5:03:48 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-17 05:03:48.683 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.888 seconds (JVM running for 10.597) Jan 17, 2023 5:04:11 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-17 05:04:40.088 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-17 05:04:40.094 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-17 05:04:40.132 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-17 05:04:40.135 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-17 05:04:40.158 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-17 05:04:40.161 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-17 05:04:40.162 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-17 05:04:40.163 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-17 05:04:40.164 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 05:04:40.169 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-17 05:04:40.183 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-17 05:04:40.187 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-17 05:04:40.237 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-17 05:04:40.243 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 05:04:40.243 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 05:04:40.246 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 05:04:40.802 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-17 05:04:40.808 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-17 05:04:40.809 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-17 05:04:40.810 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 05:04:40.826 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-17 05:04:40.829 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-17 05:04:40.830 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 05:04:40.834 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 05:04:40.837 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 05:04:40.889 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 05:04:40.890 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 05:04:40.892 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 05:04:40.904 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 05:04:40.905 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 05:04:40.905 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 05:04:40.908 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-17 05:04:40.961 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 453424586230408379477485893046427039130592833498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 17 05:01:18 UTC 2023 Final Date: Sun Jan 16 05:01:17 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9 bcee191eb135ce2d5a268ddd476280b52d4a036a 2e294977edbfd78eeb0ee965010516d1b8e6f83b 7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6 9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d 5c48a41a5d416a71d102a9500d28a3e06703d10c b69e7ac3f936de8528302c44af25734df02ff752 0be9886a1df6acaf5480a3d25fb9b2da066b2cf1 b2781022955a6878d6a138517b536eaa48b02c33 5b8873f00ac9a6071a2a9d2337fd1faee40ba66d f6b9bd2b8daeded422547b62285cd3ef79f82545 044b891b81c64d0fa394ce115bc0a71f8f81ed2f 2625055f672866445f5f19c0a34671d1a869679e 077370318a1f2ddb15f74f31890eee6fba54fdc4 fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1 1bc41c801a63719988ae0309445bd58ef0fb4d99 cea862d5392d58d2df7f0645cc6d59ee47131cb7 e58139f98b1634a56807156281fd1889754fec5f 920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c e7b9382f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [75:99:10:90:65:e0:90:20:f9:43:ae:a9:56:46:fa:5b:0b:77:ac:17],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-17 06:41:04.282 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-17 06:41:04.286 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-17 06:41:04.289 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-17 06:41:04.290 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-17 06:41:04.291 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-17 06:41:04.292 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-17 06:41:04.292 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-17 06:41:04.293 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-17 06:41:04.293 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-17 06:41:04.294 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-17 06:41:04.300 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-17 06:41:04.301 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 06:41:04.301 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 06:41:04.301 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 06:41:04.509 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-17 06:41:04.510 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-17 06:41:04.510 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-17 06:41:04.511 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 06:41:04.513 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-17 06:41:04.514 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-17 06:41:04.514 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 06:41:04.515 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 06:41:04.515 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 06:41:04.516 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 06:41:04.517 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 06:41:04.517 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 06:41:04.518 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 06:41:04.519 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 06:41:04.519 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 06:41:04.520 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-17 06:41:04.524 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 453424586230408379477485893046427039130592833498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 17 05:01:18 UTC 2023 Final Date: Sun Jan 16 05:01:17 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9 bcee191eb135ce2d5a268ddd476280b52d4a036a 2e294977edbfd78eeb0ee965010516d1b8e6f83b 7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6 9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d 5c48a41a5d416a71d102a9500d28a3e06703d10c b69e7ac3f936de8528302c44af25734df02ff752 0be9886a1df6acaf5480a3d25fb9b2da066b2cf1 b2781022955a6878d6a138517b536eaa48b02c33 5b8873f00ac9a6071a2a9d2337fd1faee40ba66d f6b9bd2b8daeded422547b62285cd3ef79f82545 044b891b81c64d0fa394ce115bc0a71f8f81ed2f 2625055f672866445f5f19c0a34671d1a869679e 077370318a1f2ddb15f74f31890eee6fba54fdc4 fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1 1bc41c801a63719988ae0309445bd58ef0fb4d99 cea862d5392d58d2df7f0645cc6d59ee47131cb7 e58139f98b1634a56807156281fd1889754fec5f 920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c e7b9382f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:57:cf:84:45:ba:9c:b4:da:43:59:94:fe:6a:5a:1f:6f:17:6d:11],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-17 06:42:48.017 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-17 06:42:48.018 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-17 06:42:48.020 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-17 06:42:48.021 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-17 06:42:48.022 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-17 06:42:48.022 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-17 06:42:48.023 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-17 06:42:48.023 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-17 06:42:48.024 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-17 06:42:48.025 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-17 06:42:48.030 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-17 06:42:48.030 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 06:42:48.031 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 06:42:48.031 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 06:42:48.181 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-17 06:42:48.182 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-17 06:42:48.182 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-17 06:42:48.183 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 06:42:48.185 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-17 06:42:48.185 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-17 06:42:48.185 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 06:42:48.186 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 06:42:48.186 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 06:42:48.187 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 06:42:48.188 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 06:42:48.188 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 06:42:48.189 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 06:42:48.190 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 06:42:48.190 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 06:42:48.191 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-17 06:42:48.196 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 453424586230408379477485893046427039130592833498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 17 05:01:18 UTC 2023 Final Date: Sun Jan 16 05:01:17 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9 bcee191eb135ce2d5a268ddd476280b52d4a036a 2e294977edbfd78eeb0ee965010516d1b8e6f83b 7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6 9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d 5c48a41a5d416a71d102a9500d28a3e06703d10c b69e7ac3f936de8528302c44af25734df02ff752 0be9886a1df6acaf5480a3d25fb9b2da066b2cf1 b2781022955a6878d6a138517b536eaa48b02c33 5b8873f00ac9a6071a2a9d2337fd1faee40ba66d f6b9bd2b8daeded422547b62285cd3ef79f82545 044b891b81c64d0fa394ce115bc0a71f8f81ed2f 2625055f672866445f5f19c0a34671d1a869679e 077370318a1f2ddb15f74f31890eee6fba54fdc4 fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1 1bc41c801a63719988ae0309445bd58ef0fb4d99 cea862d5392d58d2df7f0645cc6d59ee47131cb7 e58139f98b1634a56807156281fd1889754fec5f 920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c e7b9382f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:e0:69:78:81:1b:5c:bb:96:13:f5:79:81:01:48:18:4a:39:3f:fb],[56:66:d1:a4] modulus: dd41bde6d8d12b7dc106d308aa1a92f2182d677f1a5c20283c1968725877709568d5d09362e1fce9be2a3b75a3e990026202bad5f343eed74045810acc5839350b4c87944a4469394a32a1277188d37081e49f183dbf0f598558e45b5f2f152c01588380dae65f85b2c7283ae13379bea9a382b6a5e8bccd69d3602f66b8a0431c00e51878b2d3e73f912b9cb028e844a113a10cebfcc0d743044cb67fc854e33b387717a8238367c04aedab34f33bbfc451b2c79f19435b5ebdbe58438dbb6a78691cfafa2c6332a7c13928c1555edaf55dabb6431f40513d613c438d2328ae9c40b9a7d70fdc36bcf224e66f443545e91d5000843b7406c22dc35f6df3700d public exponent: 10001 ] 2023-01-17 06:45:56.145 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-17 06:45:56.149 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-17 06:45:56.151 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-17 06:45:56.152 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-17 06:45:56.152 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-17 06:45:56.153 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-17 06:45:56.154 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-17 06:45:56.154 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-17 06:45:56.155 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-17 06:45:56.156 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-17 06:45:56.159 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-17 06:45:56.160 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 06:45:56.161 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 06:45:56.161 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 06:45:56.293 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-17 06:45:56.294 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-17 06:45:56.295 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-17 06:45:56.295 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 06:45:56.297 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-17 06:45:56.297 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-17 06:45:56.298 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 06:45:56.298 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 06:45:56.298 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 06:45:56.299 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 06:45:56.299 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 06:45:56.300 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 06:45:56.300 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 06:45:56.301 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 06:45:56.301 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 06:45:56.302 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-17 06:45:56.305 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 453424586230408379477485893046427039130592833498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 17 05:01:18 UTC 2023 Final Date: Sun Jan 16 05:01:17 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4] modulus: d13efc04aa1bec19d6bfadbf4e3bf7efbe8287fcb5d31ae0cd7a59a2a5fdb4ba869102c594806ff15837c18103011eaf0cf4268eb7c2f8cd4fad6e1bff3887b96d3d8257817c29ca0728a68ac58d119c7c06c91b1ab8b9e05e7343428880eafb0591304ed88a04720485b1f038e5176db467db8f13bb8dd52b5598e9cdb460b25e3c43a25ffb3a09ff427da59ada8f35dd214b63cc1967896c702ff7af8695c395a7d09160bdf03e9b7e3384b83abf67ed53f20adb3ca7ab35f65abbf9ab905635a525fd667ec3c43661ad161deb9447cc99101f4c8d9944e6a3aaf25437682b2b1a4ea20549aa458d3437a525eed94dc97337fe2b977c036510d08f3645d5c4a6d81d5c9dee207d6c4b930cb018f3c7865c0024f5e573df43aa893b29209495c49cbfc778bec3c7a383109200c3f8b6217d54c586a40ad8031c3bfa3917fea4e58d300cf5f23627c6072b59f9cfaa41cc5efbda4d1756a5c792bc5db1cfa0415fa5896c9d99631dc6a49c66faf97fff8145bdf6b740a5308887a54201c4c6f9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9 bcee191eb135ce2d5a268ddd476280b52d4a036a 2e294977edbfd78eeb0ee965010516d1b8e6f83b 7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6 9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d 5c48a41a5d416a71d102a9500d28a3e06703d10c b69e7ac3f936de8528302c44af25734df02ff752 0be9886a1df6acaf5480a3d25fb9b2da066b2cf1 b2781022955a6878d6a138517b536eaa48b02c33 5b8873f00ac9a6071a2a9d2337fd1faee40ba66d f6b9bd2b8daeded422547b62285cd3ef79f82545 044b891b81c64d0fa394ce115bc0a71f8f81ed2f 2625055f672866445f5f19c0a34671d1a869679e 077370318a1f2ddb15f74f31890eee6fba54fdc4 fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1 1bc41c801a63719988ae0309445bd58ef0fb4d99 cea862d5392d58d2df7f0645cc6d59ee47131cb7 e58139f98b1634a56807156281fd1889754fec5f 920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c e7b9382f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [17:8e:a3:3e:73:46:0c:67:b3:7f:4a:4e:df:c4:6b:44:92:d4:79:64],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-17 06:48:46.020 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-17 06:48:46.022 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-17 06:48:46.023 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-17 06:48:46.024 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-17 06:48:46.025 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-17 06:48:46.026 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-17 06:48:46.026 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-17 06:48:46.027 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-17 06:48:46.028 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-17 06:48:46.028 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-17 06:48:46.035 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-17 06:48:46.036 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 06:48:46.036 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 06:48:46.037 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 06:48:46.193 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-17 06:48:46.194 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-17 06:48:46.195 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-17 06:48:46.196 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 06:48:46.198 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-17 06:48:46.198 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-17 06:48:46.200 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 06:48:46.200 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 06:48:46.201 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 06:48:46.202 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 06:48:46.203 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 06:48:46.205 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 06:48:46.206 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 06:48:46.206 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 06:48:46.207 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 06:48:46.210 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-17 06:48:46.216 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 453424586230408379477485893046427039130592833498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 17 05:01:18 UTC 2023 Final Date: Sun Jan 16 05:01:17 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9 bcee191eb135ce2d5a268ddd476280b52d4a036a 2e294977edbfd78eeb0ee965010516d1b8e6f83b 7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6 9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d 5c48a41a5d416a71d102a9500d28a3e06703d10c b69e7ac3f936de8528302c44af25734df02ff752 0be9886a1df6acaf5480a3d25fb9b2da066b2cf1 b2781022955a6878d6a138517b536eaa48b02c33 5b8873f00ac9a6071a2a9d2337fd1faee40ba66d f6b9bd2b8daeded422547b62285cd3ef79f82545 044b891b81c64d0fa394ce115bc0a71f8f81ed2f 2625055f672866445f5f19c0a34671d1a869679e 077370318a1f2ddb15f74f31890eee6fba54fdc4 fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1 1bc41c801a63719988ae0309445bd58ef0fb4d99 cea862d5392d58d2df7f0645cc6d59ee47131cb7 e58139f98b1634a56807156281fd1889754fec5f 920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c e7b9382f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [be:a2:4b:98:97:98:81:47:f8:97:4c:a2:46:6c:c1:83:5b:ae:98:64],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-17 06:57:16.013 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-17 06:57:16.016 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-17 06:57:16.018 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-17 06:57:16.019 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-17 06:57:16.020 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-17 06:57:16.020 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-17 06:57:16.021 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-17 06:57:16.021 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-17 06:57:16.021 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-17 06:57:16.022 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-17 06:57:16.027 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-17 06:57:16.028 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 06:57:16.028 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 06:57:16.029 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 06:57:16.197 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-17 06:57:16.198 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-17 06:57:16.198 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-17 06:57:16.198 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 06:57:16.200 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-17 06:57:16.200 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-17 06:57:16.201 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 06:57:16.201 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 06:57:16.201 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 06:57:16.202 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 06:57:16.202 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 06:57:16.203 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 06:57:16.203 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 06:57:16.204 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 06:57:16.204 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 06:57:16.205 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-17 06:57:16.209 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 453424586230408379477485893046427039130592833498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 17 05:01:18 UTC 2023 Final Date: Sun Jan 16 05:01:17 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9 bcee191eb135ce2d5a268ddd476280b52d4a036a 2e294977edbfd78eeb0ee965010516d1b8e6f83b 7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6 9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d 5c48a41a5d416a71d102a9500d28a3e06703d10c b69e7ac3f936de8528302c44af25734df02ff752 0be9886a1df6acaf5480a3d25fb9b2da066b2cf1 b2781022955a6878d6a138517b536eaa48b02c33 5b8873f00ac9a6071a2a9d2337fd1faee40ba66d f6b9bd2b8daeded422547b62285cd3ef79f82545 044b891b81c64d0fa394ce115bc0a71f8f81ed2f 2625055f672866445f5f19c0a34671d1a869679e 077370318a1f2ddb15f74f31890eee6fba54fdc4 fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1 1bc41c801a63719988ae0309445bd58ef0fb4d99 cea862d5392d58d2df7f0645cc6d59ee47131cb7 e58139f98b1634a56807156281fd1889754fec5f 920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c e7b9382f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [51:6f:2f:76:3c:74:27:ae:c8:1e:5d:66:51:b9:dd:e9:1d:db:8c:7a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-17 07:03:14.539 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-17 07:03:14.541 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-17 07:03:14.543 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-17 07:03:14.544 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-17 07:03:14.544 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-17 07:03:14.545 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-17 07:03:14.546 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-17 07:03:14.546 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-17 07:03:14.546 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-17 07:03:14.547 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-17 07:03:14.551 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-17 07:03:14.552 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 07:03:14.552 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 07:03:14.552 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 07:03:14.717 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-17 07:03:14.719 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-17 07:03:14.719 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-17 07:03:14.720 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 07:03:14.722 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-17 07:03:14.722 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-17 07:03:14.722 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:03:14.723 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:03:14.723 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:03:14.724 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:03:14.724 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:03:14.724 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:03:14.726 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:03:14.726 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:03:14.726 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:03:14.730 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-17 07:03:14.733 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 453424586230408379477485893046427039130592833498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 17 05:01:18 UTC 2023 Final Date: Sun Jan 16 05:01:17 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4] modulus: d13efc04aa1bec19d6bfadbf4e3bf7efbe8287fcb5d31ae0cd7a59a2a5fdb4ba869102c594806ff15837c18103011eaf0cf4268eb7c2f8cd4fad6e1bff3887b96d3d8257817c29ca0728a68ac58d119c7c06c91b1ab8b9e05e7343428880eafb0591304ed88a04720485b1f038e5176db467db8f13bb8dd52b5598e9cdb460b25e3c43a25ffb3a09ff427da59ada8f35dd214b63cc1967896c702ff7af8695c395a7d09160bdf03e9b7e3384b83abf67ed53f20adb3ca7ab35f65abbf9ab905635a525fd667ec3c43661ad161deb9447cc99101f4c8d9944e6a3aaf25437682b2b1a4ea20549aa458d3437a525eed94dc97337fe2b977c036510d08f3645d5c4a6d81d5c9dee207d6c4b930cb018f3c7865c0024f5e573df43aa893b29209495c49cbfc778bec3c7a383109200c3f8b6217d54c586a40ad8031c3bfa3917fea4e58d300cf5f23627c6072b59f9cfaa41cc5efbda4d1756a5c792bc5db1cfa0415fa5896c9d99631dc6a49c66faf97fff8145bdf6b740a5308887a54201c4c6f9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9 bcee191eb135ce2d5a268ddd476280b52d4a036a 2e294977edbfd78eeb0ee965010516d1b8e6f83b 7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6 9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d 5c48a41a5d416a71d102a9500d28a3e06703d10c b69e7ac3f936de8528302c44af25734df02ff752 0be9886a1df6acaf5480a3d25fb9b2da066b2cf1 b2781022955a6878d6a138517b536eaa48b02c33 5b8873f00ac9a6071a2a9d2337fd1faee40ba66d f6b9bd2b8daeded422547b62285cd3ef79f82545 044b891b81c64d0fa394ce115bc0a71f8f81ed2f 2625055f672866445f5f19c0a34671d1a869679e 077370318a1f2ddb15f74f31890eee6fba54fdc4 fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1 1bc41c801a63719988ae0309445bd58ef0fb4d99 cea862d5392d58d2df7f0645cc6d59ee47131cb7 e58139f98b1634a56807156281fd1889754fec5f 920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c e7b9382f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e8:b2:04:fc:c3:cf:78:a0:1f:d4:3f:ef:6e:84:ac:47:81:ea:4e:a0],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-17 07:10:00.075 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-17 07:10:00.083 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-17 07:10:00.086 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-17 07:10:00.087 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-17 07:10:00.088 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-17 07:10:00.089 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-17 07:10:00.089 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-17 07:10:00.089 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-17 07:10:00.090 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-17 07:10:00.090 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-17 07:10:00.094 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-17 07:10:00.095 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 07:10:00.095 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 07:10:00.096 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 07:10:00.262 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-17 07:10:00.263 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-17 07:10:00.263 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-17 07:10:00.264 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 07:10:00.265 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-17 07:10:00.266 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-17 07:10:00.266 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:10:00.267 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:10:00.267 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:10:00.268 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:10:00.269 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:10:00.269 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:10:00.270 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:10:00.270 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:10:00.270 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:10:00.271 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-17 07:10:00.274 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 453424586230408379477485893046427039130592833498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 17 05:01:18 UTC 2023 Final Date: Sun Jan 16 05:01:17 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9 bcee191eb135ce2d5a268ddd476280b52d4a036a 2e294977edbfd78eeb0ee965010516d1b8e6f83b 7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6 9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d 5c48a41a5d416a71d102a9500d28a3e06703d10c b69e7ac3f936de8528302c44af25734df02ff752 0be9886a1df6acaf5480a3d25fb9b2da066b2cf1 b2781022955a6878d6a138517b536eaa48b02c33 5b8873f00ac9a6071a2a9d2337fd1faee40ba66d f6b9bd2b8daeded422547b62285cd3ef79f82545 044b891b81c64d0fa394ce115bc0a71f8f81ed2f 2625055f672866445f5f19c0a34671d1a869679e 077370318a1f2ddb15f74f31890eee6fba54fdc4 fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1 1bc41c801a63719988ae0309445bd58ef0fb4d99 cea862d5392d58d2df7f0645cc6d59ee47131cb7 e58139f98b1634a56807156281fd1889754fec5f 920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c e7b9382f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ba:7b:9e:a8:f5:97:36:30:a9:e0:43:99:8b:02:66:30:22:fd:fe:62],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-17 07:16:31.267 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-17 07:16:31.272 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-17 07:16:31.274 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-17 07:16:31.275 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-17 07:16:31.275 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-17 07:16:31.276 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-17 07:16:31.276 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-17 07:16:31.276 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-17 07:16:31.277 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-17 07:16:31.277 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-17 07:16:31.281 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-17 07:16:31.282 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 07:16:31.282 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 07:16:31.283 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 07:16:31.451 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-17 07:16:31.452 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-17 07:16:31.452 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-17 07:16:31.452 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 07:16:31.453 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-17 07:16:31.454 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-17 07:16:31.454 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:16:31.454 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:16:31.455 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:16:31.455 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:16:31.456 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:16:31.456 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:16:31.457 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:16:31.457 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:16:31.457 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:16:31.458 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-17 07:16:31.461 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 453424586230408379477485893046427039130592833498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 17 05:01:18 UTC 2023 Final Date: Sun Jan 16 05:01:17 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9 bcee191eb135ce2d5a268ddd476280b52d4a036a 2e294977edbfd78eeb0ee965010516d1b8e6f83b 7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6 9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d 5c48a41a5d416a71d102a9500d28a3e06703d10c b69e7ac3f936de8528302c44af25734df02ff752 0be9886a1df6acaf5480a3d25fb9b2da066b2cf1 b2781022955a6878d6a138517b536eaa48b02c33 5b8873f00ac9a6071a2a9d2337fd1faee40ba66d f6b9bd2b8daeded422547b62285cd3ef79f82545 044b891b81c64d0fa394ce115bc0a71f8f81ed2f 2625055f672866445f5f19c0a34671d1a869679e 077370318a1f2ddb15f74f31890eee6fba54fdc4 fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1 1bc41c801a63719988ae0309445bd58ef0fb4d99 cea862d5392d58d2df7f0645cc6d59ee47131cb7 e58139f98b1634a56807156281fd1889754fec5f 920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c e7b9382f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bd:ab:da:92:51:07:35:de:f5:90:8d:9a:7a:86:55:51:63:03:75:c2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-17 07:23:05.515 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-17 07:23:05.517 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-17 07:23:05.519 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-17 07:23:05.520 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-17 07:23:05.521 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-17 07:23:05.521 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-17 07:23:05.522 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-17 07:23:05.522 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-17 07:23:05.522 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-17 07:23:05.523 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-17 07:23:05.527 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-17 07:23:05.528 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 07:23:05.528 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 07:23:05.528 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 07:23:05.691 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-17 07:23:05.692 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-17 07:23:05.692 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-17 07:23:05.693 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 07:23:05.694 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-17 07:23:05.694 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-17 07:23:05.695 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:23:05.695 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:23:05.695 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:23:05.696 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:23:05.696 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:23:05.696 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:23:05.697 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:23:05.697 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:23:05.697 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:23:05.698 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-17 07:23:05.701 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 453424586230408379477485893046427039130592833498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 17 05:01:18 UTC 2023 Final Date: Sun Jan 16 05:01:17 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9 bcee191eb135ce2d5a268ddd476280b52d4a036a 2e294977edbfd78eeb0ee965010516d1b8e6f83b 7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6 9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d 5c48a41a5d416a71d102a9500d28a3e06703d10c b69e7ac3f936de8528302c44af25734df02ff752 0be9886a1df6acaf5480a3d25fb9b2da066b2cf1 b2781022955a6878d6a138517b536eaa48b02c33 5b8873f00ac9a6071a2a9d2337fd1faee40ba66d f6b9bd2b8daeded422547b62285cd3ef79f82545 044b891b81c64d0fa394ce115bc0a71f8f81ed2f 2625055f672866445f5f19c0a34671d1a869679e 077370318a1f2ddb15f74f31890eee6fba54fdc4 fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1 1bc41c801a63719988ae0309445bd58ef0fb4d99 cea862d5392d58d2df7f0645cc6d59ee47131cb7 e58139f98b1634a56807156281fd1889754fec5f 920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c e7b9382f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:17:0a:63:bf:d7:bd:2f:05:e5:7f:78:98:a0:bb:12:b9:00:7e:b2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-17 07:29:50.866 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-17 07:29:50.869 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-17 07:29:50.870 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-17 07:29:50.871 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-17 07:29:50.871 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-17 07:29:50.872 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-17 07:29:50.873 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-17 07:29:50.873 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-17 07:29:50.873 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-17 07:29:50.874 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-17 07:29:50.877 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-17 07:29:50.878 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 07:29:50.878 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 07:29:50.879 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 07:29:51.035 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-17 07:29:51.036 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-17 07:29:51.036 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-17 07:29:51.036 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 07:29:51.038 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-17 07:29:51.038 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-17 07:29:51.039 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:29:51.039 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:29:51.039 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:29:51.040 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:29:51.040 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:29:51.041 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:29:51.042 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:29:51.042 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:29:51.042 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:29:51.044 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-17 07:29:51.046 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 453424586230408379477485893046427039130592833498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 17 05:01:18 UTC 2023 Final Date: Sun Jan 16 05:01:17 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9 bcee191eb135ce2d5a268ddd476280b52d4a036a 2e294977edbfd78eeb0ee965010516d1b8e6f83b 7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6 9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d 5c48a41a5d416a71d102a9500d28a3e06703d10c b69e7ac3f936de8528302c44af25734df02ff752 0be9886a1df6acaf5480a3d25fb9b2da066b2cf1 b2781022955a6878d6a138517b536eaa48b02c33 5b8873f00ac9a6071a2a9d2337fd1faee40ba66d f6b9bd2b8daeded422547b62285cd3ef79f82545 044b891b81c64d0fa394ce115bc0a71f8f81ed2f 2625055f672866445f5f19c0a34671d1a869679e 077370318a1f2ddb15f74f31890eee6fba54fdc4 fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1 1bc41c801a63719988ae0309445bd58ef0fb4d99 cea862d5392d58d2df7f0645cc6d59ee47131cb7 e58139f98b1634a56807156281fd1889754fec5f 920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c e7b9382f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [67:e0:86:43:1e:63:37:ba:0f:8f:48:51:7d:86:fe:1b:48:05:6d:b4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-17 07:30:08.057 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-17 07:30:08.058 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-17 07:30:08.059 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-17 07:30:08.060 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-17 07:30:08.060 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-17 07:30:08.061 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-17 07:30:08.061 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-17 07:30:08.061 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-17 07:30:08.062 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-17 07:30:08.062 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-17 07:30:08.065 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-17 07:30:08.066 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 07:30:08.066 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 07:30:08.067 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 07:30:08.172 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-17 07:30:08.173 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-17 07:30:08.173 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-17 07:30:08.173 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 07:30:08.174 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-17 07:30:08.175 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-17 07:30:08.175 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:30:08.175 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:30:08.175 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:30:08.176 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:30:08.176 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:30:08.176 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:30:08.177 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:30:08.177 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:30:08.177 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:30:08.178 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-17 07:30:08.180 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 453424586230408379477485893046427039130592833498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 17 05:01:18 UTC 2023 Final Date: Sun Jan 16 05:01:17 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9 bcee191eb135ce2d5a268ddd476280b52d4a036a 2e294977edbfd78eeb0ee965010516d1b8e6f83b 7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6 9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d 5c48a41a5d416a71d102a9500d28a3e06703d10c b69e7ac3f936de8528302c44af25734df02ff752 0be9886a1df6acaf5480a3d25fb9b2da066b2cf1 b2781022955a6878d6a138517b536eaa48b02c33 5b8873f00ac9a6071a2a9d2337fd1faee40ba66d f6b9bd2b8daeded422547b62285cd3ef79f82545 044b891b81c64d0fa394ce115bc0a71f8f81ed2f 2625055f672866445f5f19c0a34671d1a869679e 077370318a1f2ddb15f74f31890eee6fba54fdc4 fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1 1bc41c801a63719988ae0309445bd58ef0fb4d99 cea862d5392d58d2df7f0645cc6d59ee47131cb7 e58139f98b1634a56807156281fd1889754fec5f 920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c e7b9382f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ac:58:0b:f5:cf:2d:5f:11:73:6a:74:5b:32:61:6d:59:60:96:11:8f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-17 07:55:27.632 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-17 07:55:27.636 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-17 07:55:27.638 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-17 07:55:27.639 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-17 07:55:27.639 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-17 07:55:27.640 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-17 07:55:27.640 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-17 07:55:27.641 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-17 07:55:27.641 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-17 07:55:27.642 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-17 07:55:27.646 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-17 07:55:27.647 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 07:55:27.647 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 07:55:27.648 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 07:55:27.821 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-17 07:55:27.822 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-17 07:55:27.822 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-17 07:55:27.823 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 07:55:27.824 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-17 07:55:27.825 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-17 07:55:27.829 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:55:27.830 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:55:27.831 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:55:27.832 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:55:27.832 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:55:27.833 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:55:27.834 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:55:27.835 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:55:27.835 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:55:27.836 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-17 07:55:27.841 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 453424586230408379477485893046427039130592833498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 17 05:01:18 UTC 2023 Final Date: Sun Jan 16 05:01:17 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9 bcee191eb135ce2d5a268ddd476280b52d4a036a 2e294977edbfd78eeb0ee965010516d1b8e6f83b 7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6 9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d 5c48a41a5d416a71d102a9500d28a3e06703d10c b69e7ac3f936de8528302c44af25734df02ff752 0be9886a1df6acaf5480a3d25fb9b2da066b2cf1 b2781022955a6878d6a138517b536eaa48b02c33 5b8873f00ac9a6071a2a9d2337fd1faee40ba66d f6b9bd2b8daeded422547b62285cd3ef79f82545 044b891b81c64d0fa394ce115bc0a71f8f81ed2f 2625055f672866445f5f19c0a34671d1a869679e 077370318a1f2ddb15f74f31890eee6fba54fdc4 fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1 1bc41c801a63719988ae0309445bd58ef0fb4d99 cea862d5392d58d2df7f0645cc6d59ee47131cb7 e58139f98b1634a56807156281fd1889754fec5f 920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c e7b9382f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e2:7d:e2:57:57:10:1b:02:3b:6f:f4:ab:4f:48:bb:31:be:59:9c:23],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-17 07:55:33.435 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-17 07:55:33.436 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-17 07:55:33.437 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-17 07:55:33.438 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-17 07:55:33.439 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-17 07:55:33.439 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-17 07:55:33.440 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-17 07:55:33.440 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-17 07:55:33.440 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-17 07:55:33.441 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-17 07:55:33.444 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-17 07:55:33.445 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 07:55:33.445 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-17 07:55:33.446 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 07:55:33.551 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-17 07:55:33.552 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-17 07:55:33.552 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-17 07:55:33.552 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-17 07:55:33.554 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-17 07:55:33.554 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-17 07:55:33.554 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:55:33.555 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:55:33.555 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:55:33.556 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:55:33.556 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:55:33.557 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:55:33.557 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-17 07:55:33.558 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-17 07:55:33.558 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-17 07:55:33.559 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-17 07:55:33.570 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 453424586230408379477485893046427039130592833498 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 17 05:01:18 UTC 2023 Final Date: Sun Jan 16 05:01:17 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9 bcee191eb135ce2d5a268ddd476280b52d4a036a 2e294977edbfd78eeb0ee965010516d1b8e6f83b 7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6 9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d 5c48a41a5d416a71d102a9500d28a3e06703d10c b69e7ac3f936de8528302c44af25734df02ff752 0be9886a1df6acaf5480a3d25fb9b2da066b2cf1 b2781022955a6878d6a138517b536eaa48b02c33 5b8873f00ac9a6071a2a9d2337fd1faee40ba66d f6b9bd2b8daeded422547b62285cd3ef79f82545 044b891b81c64d0fa394ce115bc0a71f8f81ed2f 2625055f672866445f5f19c0a34671d1a869679e 077370318a1f2ddb15f74f31890eee6fba54fdc4 fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1 1bc41c801a63719988ae0309445bd58ef0fb4d99 cea862d5392d58d2df7f0645cc6d59ee47131cb7 e58139f98b1634a56807156281fd1889754fec5f 920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c e7b9382f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [86:42:66:e1:3f:1a:86:4d:d5:05:17:e6:25:60:14:b8:d7:e2:19:57],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]