By type
2023-01-24 05:21:14,742 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-24 05:21:16,531 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-24 05:21:17.454 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jan 24, 2023 5:21:19 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 24, 2023 5:21:19 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 24, 2023 5:21:19 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 24, 2023 5:21:20 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-24 05:21:20.624 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-24 05:21:20.951 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-01-24 05:21:21.169 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-24 05:21:22.201 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-24 05:21:22.204 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-24 05:21:22.205 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-24 05:21:22.209 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-24 05:21:22.251 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-24 05:21:22.255 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-01-24 05:21:22.373 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-01-24 05:21:23.275 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 24, 2023 5:21:24 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-24 05:21:24.697 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 11.454 seconds (JVM running for 14.276) Jan 24, 2023 5:21:50 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-24 05:22:05.675 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 05:22:05.687 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 05:22:05.753 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-24 05:22:05.761 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 05:22:05.790 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-24 05:22:05.794 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 05:22:05.795 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 05:22:05.797 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 05:22:05.798 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:22:05.804 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 05:22:05.816 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 05:22:05.823 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 05:22:05.901 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 05:22:05.910 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:22:05.910 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 05:22:05.917 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:22:06.581 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 05:22:06.592 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 05:22:06.593 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 05:22:06.595 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 05:22:06.606 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 05:22:06.607 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 05:22:06.608 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:22:06.608 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:22:06.609 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:22:06.628 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:22:06.629 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:22:06.630 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:22:06.636 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 05:22:06.637 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 05:22:06.637 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 05:22:06.639 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 05:22:06.674 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 65663574674857335830029640474820600770100530899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 05:18:36 UTC 2023 Final Date: Sun Jan 23 05:18:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:30:d0:ae:e6:f4:48:3f:24:5b:09:6b:37:2e:57:34:70:74:f2:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 279464ce61275e683969fa8ade3436f79f5e711e 2a27ae40c591fe1002d047d333c833d21f1913ec de34c455ca84a2e95849ba446d557c9cacd855e5 31fdbde5451f553062e20ed052f34d8da6d38b8b 2fce6ef1ff875b91fbd7216e40bd4ecf9de84305 96ca2710a228b3cc0add644cd5e5f453e479744c 2ad4e58670b02607747ecb08061e2fd719302954 02bb75eaa98d1e9320cc056e5f78241cff90934f cab5805edb72cac4dc95638857e8cabffa9da944 e5e51647b3c6d39e2cee630916ff4ca5bf68123f fdb7ce8d3db8b9a8c5f6f7941685edbad92e3d23 40ecfb745abb0f2fff15b28453f0aad5d0ac658e f46ab4c6f7afc4d65c511cb9a049140e7949469d 92b677a830103fa56b0976d09f3cfbd84b862f23 dac9b5adaace582c1876da9f12b7df37cea617a0 93972c7277a96fc62379d464918c95840c2e76d3 f0fa6b6026011d26eb48d8d196cc674466d3bd91 23b03a4f14e158761a024420827f58cddcdfb762 24430cf618a2dd1ff0008c0127b0059111669a7c f3c4dc66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ad:b9:dd:a6:38:17:af:70:a5:ab:63:3c:87:5f:2a:dc:45:9b:fa:bc],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 07:12:39.298 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 07:12:39.303 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 07:12:39.306 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 07:12:39.308 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 07:12:39.308 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 07:12:39.309 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 07:12:39.310 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 07:12:39.311 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 07:12:39.311 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 07:12:39.312 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 07:12:39.319 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 07:12:39.321 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:12:39.321 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:12:39.322 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:12:39.538 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 07:12:39.539 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 07:12:39.540 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 07:12:39.540 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:12:39.543 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 07:12:39.543 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 07:12:39.544 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:12:39.544 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:12:39.545 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:12:39.546 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:12:39.546 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:12:39.546 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:12:39.547 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:12:39.548 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:12:39.548 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:12:39.549 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 07:12:39.553 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 65663574674857335830029640474820600770100530899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 05:18:36 UTC 2023 Final Date: Sun Jan 23 05:18:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:30:d0:ae:e6:f4:48:3f:24:5b:09:6b:37:2e:57:34:70:74:f2:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 279464ce61275e683969fa8ade3436f79f5e711e 2a27ae40c591fe1002d047d333c833d21f1913ec de34c455ca84a2e95849ba446d557c9cacd855e5 31fdbde5451f553062e20ed052f34d8da6d38b8b 2fce6ef1ff875b91fbd7216e40bd4ecf9de84305 96ca2710a228b3cc0add644cd5e5f453e479744c 2ad4e58670b02607747ecb08061e2fd719302954 02bb75eaa98d1e9320cc056e5f78241cff90934f cab5805edb72cac4dc95638857e8cabffa9da944 e5e51647b3c6d39e2cee630916ff4ca5bf68123f fdb7ce8d3db8b9a8c5f6f7941685edbad92e3d23 40ecfb745abb0f2fff15b28453f0aad5d0ac658e f46ab4c6f7afc4d65c511cb9a049140e7949469d 92b677a830103fa56b0976d09f3cfbd84b862f23 dac9b5adaace582c1876da9f12b7df37cea617a0 93972c7277a96fc62379d464918c95840c2e76d3 f0fa6b6026011d26eb48d8d196cc674466d3bd91 23b03a4f14e158761a024420827f58cddcdfb762 24430cf618a2dd1ff0008c0127b0059111669a7c f3c4dc66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:81:6b:2e:9d:54:91:ca:f1:f2:73:36:f5:90:d5:1e:7d:3c:37:80],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 07:14:27.241 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 07:14:27.244 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 07:14:27.247 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-24 07:14:27.248 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 07:14:27.248 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-24 07:14:27.249 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 07:14:27.250 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 07:14:27.250 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 07:14:27.251 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 07:14:27.252 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 07:14:27.259 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 07:14:27.261 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:14:27.262 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:14:27.262 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:14:27.412 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 07:14:27.413 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 07:14:27.414 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 07:14:27.414 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:14:27.418 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 07:14:27.418 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 07:14:27.419 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:14:27.419 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:14:27.419 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:14:27.420 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:14:27.421 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:14:27.421 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:14:27.422 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:14:27.422 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:14:27.423 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:14:27.425 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 07:14:27.429 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 65663574674857335830029640474820600770100530899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 05:18:36 UTC 2023 Final Date: Sun Jan 23 05:18:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:30:d0:ae:e6:f4:48:3f:24:5b:09:6b:37:2e:57:34:70:74:f2:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 279464ce61275e683969fa8ade3436f79f5e711e 2a27ae40c591fe1002d047d333c833d21f1913ec de34c455ca84a2e95849ba446d557c9cacd855e5 31fdbde5451f553062e20ed052f34d8da6d38b8b 2fce6ef1ff875b91fbd7216e40bd4ecf9de84305 96ca2710a228b3cc0add644cd5e5f453e479744c 2ad4e58670b02607747ecb08061e2fd719302954 02bb75eaa98d1e9320cc056e5f78241cff90934f cab5805edb72cac4dc95638857e8cabffa9da944 e5e51647b3c6d39e2cee630916ff4ca5bf68123f fdb7ce8d3db8b9a8c5f6f7941685edbad92e3d23 40ecfb745abb0f2fff15b28453f0aad5d0ac658e f46ab4c6f7afc4d65c511cb9a049140e7949469d 92b677a830103fa56b0976d09f3cfbd84b862f23 dac9b5adaace582c1876da9f12b7df37cea617a0 93972c7277a96fc62379d464918c95840c2e76d3 f0fa6b6026011d26eb48d8d196cc674466d3bd91 23b03a4f14e158761a024420827f58cddcdfb762 24430cf618a2dd1ff0008c0127b0059111669a7c f3c4dc66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [31:d8:dd:50:0d:35:e4:57:5b:2e:77:f0:cf:4f:cd:d5:62:14:d1:d4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 07:16:07.236 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 07:16:07.239 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 07:16:07.241 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-24 07:16:07.242 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 07:16:07.253 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-24 07:16:07.256 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 07:16:07.256 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 07:16:07.257 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 07:16:07.257 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 07:16:07.257 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 07:16:07.263 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 07:16:07.264 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:16:07.264 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:16:07.264 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:16:07.413 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 07:16:07.415 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 07:16:07.416 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 07:16:07.417 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:16:07.423 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 07:16:07.425 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 07:16:07.426 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:16:07.428 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:16:07.429 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:16:07.431 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:16:07.431 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:16:07.432 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:16:07.434 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:16:07.434 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:16:07.435 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:16:07.437 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 07:16:07.444 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 65663574674857335830029640474820600770100530899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 05:18:36 UTC 2023 Final Date: Sun Jan 23 05:18:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:30:d0:ae:e6:f4:48:3f:24:5b:09:6b:37:2e:57:34:70:74:f2:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 279464ce61275e683969fa8ade3436f79f5e711e 2a27ae40c591fe1002d047d333c833d21f1913ec de34c455ca84a2e95849ba446d557c9cacd855e5 31fdbde5451f553062e20ed052f34d8da6d38b8b 2fce6ef1ff875b91fbd7216e40bd4ecf9de84305 96ca2710a228b3cc0add644cd5e5f453e479744c 2ad4e58670b02607747ecb08061e2fd719302954 02bb75eaa98d1e9320cc056e5f78241cff90934f cab5805edb72cac4dc95638857e8cabffa9da944 e5e51647b3c6d39e2cee630916ff4ca5bf68123f fdb7ce8d3db8b9a8c5f6f7941685edbad92e3d23 40ecfb745abb0f2fff15b28453f0aad5d0ac658e f46ab4c6f7afc4d65c511cb9a049140e7949469d 92b677a830103fa56b0976d09f3cfbd84b862f23 dac9b5adaace582c1876da9f12b7df37cea617a0 93972c7277a96fc62379d464918c95840c2e76d3 f0fa6b6026011d26eb48d8d196cc674466d3bd91 23b03a4f14e158761a024420827f58cddcdfb762 24430cf618a2dd1ff0008c0127b0059111669a7c f3c4dc66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [db:56:b8:84:a4:c6:e5:e9:1d:02:18:1f:8e:c9:bb:41:60:4e:e1:e0],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 07:19:22.066 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 07:19:22.070 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 07:19:22.073 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 07:19:22.074 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 07:19:22.075 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 07:19:22.076 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 07:19:22.077 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 07:19:22.077 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 07:19:22.078 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 07:19:22.078 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 07:19:22.083 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 07:19:22.084 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:19:22.085 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:19:22.085 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:19:22.264 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 07:19:22.265 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 07:19:22.265 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 07:19:22.266 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:19:22.267 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 07:19:22.268 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 07:19:22.268 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:19:22.269 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:19:22.269 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:19:22.270 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:19:22.271 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:19:22.271 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:19:22.272 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:19:22.272 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:19:22.272 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:19:22.273 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 07:19:22.276 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 65663574674857335830029640474820600770100530899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 05:18:36 UTC 2023 Final Date: Sun Jan 23 05:18:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:30:d0:ae:e6:f4:48:3f:24:5b:09:6b:37:2e:57:34:70:74:f2:4c],[56:66:d1:a4] modulus: ca2d37f7b30b976eb77a51ff1729358c205193f235ae9d6ba960eaafba3d48444267744a945bda77f203d0043270917392e8324af994eb4d409f7dd4b9a127aa69c17a28fe436e43708b14dd17231b9af14ea19503d8604b4431b9d01b0b2ffcb10977ff10988a7677ba76ee04f3d9646eedbdfb68e03868d8d7dfc0aa10a8b62da74eca436c20740bec56e40e217ae1a573fe3ca653398403f98b47325f10a388fa678b82db09dcf297eae25c8d479a66750f6cb1120b15a6793d501ae7f04becc159bf52fa73ebf13a0ff4928119abbbb18d9413d3e2eb2c2ae150e9053cfa8da643ff2c822ff14b7b06a2491a0dfa94d0057523ebedf3192ad8ef3d943a00ce8d3b6243394ea5617d3393662b437958330a512637a24b848a7490b65869743a954f589fcab1beb7d7c99cfe644d2b0628a94d8681a9e1811edf63a6279041662d8a68f6ef3b3405f02d9a787e1145ea482f3f7bf807af671a47cba76fe5d342e51349bdf001843f6cda351fb9a55c18f2c7c096e2e63f8dcbfd67214fa2f3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 279464ce61275e683969fa8ade3436f79f5e711e 2a27ae40c591fe1002d047d333c833d21f1913ec de34c455ca84a2e95849ba446d557c9cacd855e5 31fdbde5451f553062e20ed052f34d8da6d38b8b 2fce6ef1ff875b91fbd7216e40bd4ecf9de84305 96ca2710a228b3cc0add644cd5e5f453e479744c 2ad4e58670b02607747ecb08061e2fd719302954 02bb75eaa98d1e9320cc056e5f78241cff90934f cab5805edb72cac4dc95638857e8cabffa9da944 e5e51647b3c6d39e2cee630916ff4ca5bf68123f fdb7ce8d3db8b9a8c5f6f7941685edbad92e3d23 40ecfb745abb0f2fff15b28453f0aad5d0ac658e f46ab4c6f7afc4d65c511cb9a049140e7949469d 92b677a830103fa56b0976d09f3cfbd84b862f23 dac9b5adaace582c1876da9f12b7df37cea617a0 93972c7277a96fc62379d464918c95840c2e76d3 f0fa6b6026011d26eb48d8d196cc674466d3bd91 23b03a4f14e158761a024420827f58cddcdfb762 24430cf618a2dd1ff0008c0127b0059111669a7c f3c4dc66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:d4:d2:27:64:00:c7:56:09:a8:75:c3:20:a3:27:a6:c1:ed:13:eb],[56:66:d1:a4] modulus: 9f7e47124e9b84fb78783ecffdd77e216670c0d849c4a714d8fc475f436d18edbf6fc2471db8ef567cdb2faf8ce5ea15c4a5bec4f372d0d07744e57f1465343882baeea220dc469c44dd2adeb50d7968e6b4295a81bc4fa8f378984e14f7537ef39ef7ae37288d279d039afa2594897dd92c5b76b7b60084a1e3998bd397dfb648f8c8e05b49e8234a581da965a548b228786225fbb2322a44bed9aaea33e5be5378aae39bb7c950f5e1093aee87d5145a649d24f36fe78d7a3d0bd4de3a0394f16e043fe1c110f1861c40f8ce1c16ae8868bc97c04e6a9a9db38bfe7148635fc1c31834a68bf9d25422590993cb3683225a23da27e3070876fefd5028a34369 public exponent: 10001 ] 2023-01-24 07:26:44.968 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 07:26:44.969 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 07:26:44.970 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 07:26:44.971 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 07:26:44.971 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 07:26:44.972 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 07:26:44.972 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 07:26:44.973 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 07:26:44.973 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 07:26:44.974 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 07:26:44.979 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 07:26:44.979 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:26:44.980 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:26:44.980 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:26:45.135 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 07:26:45.136 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 07:26:45.137 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 07:26:45.137 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:26:45.138 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 07:26:45.139 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 07:26:45.139 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:26:45.139 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:26:45.140 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:26:45.140 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:26:45.141 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:26:45.141 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:26:45.142 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:26:45.142 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:26:45.143 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:26:45.144 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 07:26:45.147 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 65663574674857335830029640474820600770100530899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 05:18:36 UTC 2023 Final Date: Sun Jan 23 05:18:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:30:d0:ae:e6:f4:48:3f:24:5b:09:6b:37:2e:57:34:70:74:f2:4c],[56:66:d1:a4] modulus: ca2d37f7b30b976eb77a51ff1729358c205193f235ae9d6ba960eaafba3d48444267744a945bda77f203d0043270917392e8324af994eb4d409f7dd4b9a127aa69c17a28fe436e43708b14dd17231b9af14ea19503d8604b4431b9d01b0b2ffcb10977ff10988a7677ba76ee04f3d9646eedbdfb68e03868d8d7dfc0aa10a8b62da74eca436c20740bec56e40e217ae1a573fe3ca653398403f98b47325f10a388fa678b82db09dcf297eae25c8d479a66750f6cb1120b15a6793d501ae7f04becc159bf52fa73ebf13a0ff4928119abbbb18d9413d3e2eb2c2ae150e9053cfa8da643ff2c822ff14b7b06a2491a0dfa94d0057523ebedf3192ad8ef3d943a00ce8d3b6243394ea5617d3393662b437958330a512637a24b848a7490b65869743a954f589fcab1beb7d7c99cfe644d2b0628a94d8681a9e1811edf63a6279041662d8a68f6ef3b3405f02d9a787e1145ea482f3f7bf807af671a47cba76fe5d342e51349bdf001843f6cda351fb9a55c18f2c7c096e2e63f8dcbfd67214fa2f3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 279464ce61275e683969fa8ade3436f79f5e711e 2a27ae40c591fe1002d047d333c833d21f1913ec de34c455ca84a2e95849ba446d557c9cacd855e5 31fdbde5451f553062e20ed052f34d8da6d38b8b 2fce6ef1ff875b91fbd7216e40bd4ecf9de84305 96ca2710a228b3cc0add644cd5e5f453e479744c 2ad4e58670b02607747ecb08061e2fd719302954 02bb75eaa98d1e9320cc056e5f78241cff90934f cab5805edb72cac4dc95638857e8cabffa9da944 e5e51647b3c6d39e2cee630916ff4ca5bf68123f fdb7ce8d3db8b9a8c5f6f7941685edbad92e3d23 40ecfb745abb0f2fff15b28453f0aad5d0ac658e f46ab4c6f7afc4d65c511cb9a049140e7949469d 92b677a830103fa56b0976d09f3cfbd84b862f23 dac9b5adaace582c1876da9f12b7df37cea617a0 93972c7277a96fc62379d464918c95840c2e76d3 f0fa6b6026011d26eb48d8d196cc674466d3bd91 23b03a4f14e158761a024420827f58cddcdfb762 24430cf618a2dd1ff0008c0127b0059111669a7c f3c4dc66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [80:f0:fb:cb:a5:a5:c9:b7:e5:64:8d:3b:a3:79:95:49:d1:15:3c:51],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 07:32:28.324 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 07:32:28.327 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 07:32:28.331 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 07:32:28.332 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 07:32:28.333 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 07:32:28.334 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 07:32:28.334 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 07:32:28.335 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 07:32:28.336 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 07:32:28.336 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 07:32:28.343 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 07:32:28.345 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:32:28.347 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:32:28.348 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:32:28.509 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 07:32:28.512 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 07:32:28.513 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 07:32:28.517 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:32:28.520 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 07:32:28.521 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 07:32:28.522 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:32:28.522 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:32:28.522 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:32:28.525 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:32:28.525 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:32:28.529 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:32:28.530 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:32:28.531 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:32:28.532 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:32:28.534 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 07:32:28.542 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 65663574674857335830029640474820600770100530899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 05:18:36 UTC 2023 Final Date: Sun Jan 23 05:18:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:30:d0:ae:e6:f4:48:3f:24:5b:09:6b:37:2e:57:34:70:74:f2:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 279464ce61275e683969fa8ade3436f79f5e711e 2a27ae40c591fe1002d047d333c833d21f1913ec de34c455ca84a2e95849ba446d557c9cacd855e5 31fdbde5451f553062e20ed052f34d8da6d38b8b 2fce6ef1ff875b91fbd7216e40bd4ecf9de84305 96ca2710a228b3cc0add644cd5e5f453e479744c 2ad4e58670b02607747ecb08061e2fd719302954 02bb75eaa98d1e9320cc056e5f78241cff90934f cab5805edb72cac4dc95638857e8cabffa9da944 e5e51647b3c6d39e2cee630916ff4ca5bf68123f fdb7ce8d3db8b9a8c5f6f7941685edbad92e3d23 40ecfb745abb0f2fff15b28453f0aad5d0ac658e f46ab4c6f7afc4d65c511cb9a049140e7949469d 92b677a830103fa56b0976d09f3cfbd84b862f23 dac9b5adaace582c1876da9f12b7df37cea617a0 93972c7277a96fc62379d464918c95840c2e76d3 f0fa6b6026011d26eb48d8d196cc674466d3bd91 23b03a4f14e158761a024420827f58cddcdfb762 24430cf618a2dd1ff0008c0127b0059111669a7c f3c4dc66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cb:5f:81:97:da:6d:e4:c1:8f:4d:8c:12:13:31:75:38:40:48:3e:c3],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 07:39:08.359 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 07:39:08.363 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 07:39:08.365 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 07:39:08.367 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 07:39:08.367 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 07:39:08.368 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 07:39:08.369 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 07:39:08.369 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 07:39:08.370 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 07:39:08.370 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 07:39:08.375 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 07:39:08.377 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:39:08.377 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:39:08.377 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:39:08.521 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 07:39:08.522 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 07:39:08.523 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 07:39:08.523 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:39:08.525 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 07:39:08.525 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 07:39:08.526 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:39:08.526 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:39:08.527 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:39:08.528 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:39:08.528 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:39:08.528 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:39:08.531 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:39:08.531 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:39:08.532 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:39:08.533 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 07:39:08.539 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 65663574674857335830029640474820600770100530899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 05:18:36 UTC 2023 Final Date: Sun Jan 23 05:18:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:30:d0:ae:e6:f4:48:3f:24:5b:09:6b:37:2e:57:34:70:74:f2:4c],[56:66:d1:a4] modulus: ca2d37f7b30b976eb77a51ff1729358c205193f235ae9d6ba960eaafba3d48444267744a945bda77f203d0043270917392e8324af994eb4d409f7dd4b9a127aa69c17a28fe436e43708b14dd17231b9af14ea19503d8604b4431b9d01b0b2ffcb10977ff10988a7677ba76ee04f3d9646eedbdfb68e03868d8d7dfc0aa10a8b62da74eca436c20740bec56e40e217ae1a573fe3ca653398403f98b47325f10a388fa678b82db09dcf297eae25c8d479a66750f6cb1120b15a6793d501ae7f04becc159bf52fa73ebf13a0ff4928119abbbb18d9413d3e2eb2c2ae150e9053cfa8da643ff2c822ff14b7b06a2491a0dfa94d0057523ebedf3192ad8ef3d943a00ce8d3b6243394ea5617d3393662b437958330a512637a24b848a7490b65869743a954f589fcab1beb7d7c99cfe644d2b0628a94d8681a9e1811edf63a6279041662d8a68f6ef3b3405f02d9a787e1145ea482f3f7bf807af671a47cba76fe5d342e51349bdf001843f6cda351fb9a55c18f2c7c096e2e63f8dcbfd67214fa2f3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 279464ce61275e683969fa8ade3436f79f5e711e 2a27ae40c591fe1002d047d333c833d21f1913ec de34c455ca84a2e95849ba446d557c9cacd855e5 31fdbde5451f553062e20ed052f34d8da6d38b8b 2fce6ef1ff875b91fbd7216e40bd4ecf9de84305 96ca2710a228b3cc0add644cd5e5f453e479744c 2ad4e58670b02607747ecb08061e2fd719302954 02bb75eaa98d1e9320cc056e5f78241cff90934f cab5805edb72cac4dc95638857e8cabffa9da944 e5e51647b3c6d39e2cee630916ff4ca5bf68123f fdb7ce8d3db8b9a8c5f6f7941685edbad92e3d23 40ecfb745abb0f2fff15b28453f0aad5d0ac658e f46ab4c6f7afc4d65c511cb9a049140e7949469d 92b677a830103fa56b0976d09f3cfbd84b862f23 dac9b5adaace582c1876da9f12b7df37cea617a0 93972c7277a96fc62379d464918c95840c2e76d3 f0fa6b6026011d26eb48d8d196cc674466d3bd91 23b03a4f14e158761a024420827f58cddcdfb762 24430cf618a2dd1ff0008c0127b0059111669a7c f3c4dc66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e4:54:ef:ea:89:a5:23:40:c8:d0:b8:70:d4:10:42:88:5b:38:d8:49],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 07:44:46.444 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 07:44:46.446 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 07:44:46.447 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 07:44:46.448 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 07:44:46.449 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-24 07:44:46.449 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 07:44:46.450 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 07:44:46.451 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 07:44:46.451 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 07:44:46.452 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 07:44:46.456 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 07:44:46.457 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:44:46.457 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:44:46.458 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:44:46.574 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 07:44:46.575 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 07:44:46.575 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 07:44:46.576 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:44:46.577 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 07:44:46.578 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 07:44:46.580 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:44:46.580 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:44:46.581 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:44:46.585 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:44:46.586 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:44:46.586 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:44:46.588 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:44:46.588 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:44:46.588 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:44:46.589 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 07:44:46.595 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 65663574674857335830029640474820600770100530899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 05:18:36 UTC 2023 Final Date: Sun Jan 23 05:18:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:30:d0:ae:e6:f4:48:3f:24:5b:09:6b:37:2e:57:34:70:74:f2:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 279464ce61275e683969fa8ade3436f79f5e711e 2a27ae40c591fe1002d047d333c833d21f1913ec de34c455ca84a2e95849ba446d557c9cacd855e5 31fdbde5451f553062e20ed052f34d8da6d38b8b 2fce6ef1ff875b91fbd7216e40bd4ecf9de84305 96ca2710a228b3cc0add644cd5e5f453e479744c 2ad4e58670b02607747ecb08061e2fd719302954 02bb75eaa98d1e9320cc056e5f78241cff90934f cab5805edb72cac4dc95638857e8cabffa9da944 e5e51647b3c6d39e2cee630916ff4ca5bf68123f fdb7ce8d3db8b9a8c5f6f7941685edbad92e3d23 40ecfb745abb0f2fff15b28453f0aad5d0ac658e f46ab4c6f7afc4d65c511cb9a049140e7949469d 92b677a830103fa56b0976d09f3cfbd84b862f23 dac9b5adaace582c1876da9f12b7df37cea617a0 93972c7277a96fc62379d464918c95840c2e76d3 f0fa6b6026011d26eb48d8d196cc674466d3bd91 23b03a4f14e158761a024420827f58cddcdfb762 24430cf618a2dd1ff0008c0127b0059111669a7c f3c4dc66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4b:83:fa:79:31:06:28:eb:78:7d:e2:7b:17:d6:9c:32:cd:0c:44:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 07:53:58.444 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 07:53:58.447 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 07:53:58.449 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-24 07:53:58.450 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 07:53:58.451 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-24 07:53:58.452 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 07:53:58.452 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 07:53:58.453 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 07:53:58.453 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 07:53:58.454 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 07:53:58.458 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 07:53:58.459 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:53:58.459 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:53:58.460 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:53:58.621 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 07:53:58.622 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 07:53:58.622 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 07:53:58.623 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:53:58.624 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 07:53:58.625 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 07:53:58.625 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:53:58.625 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:53:58.626 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:53:58.626 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:53:58.627 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:53:58.628 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:53:58.628 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:53:58.628 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:53:58.629 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:53:58.629 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 07:53:58.633 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 65663574674857335830029640474820600770100530899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 05:18:36 UTC 2023 Final Date: Sun Jan 23 05:18:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:30:d0:ae:e6:f4:48:3f:24:5b:09:6b:37:2e:57:34:70:74:f2:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 279464ce61275e683969fa8ade3436f79f5e711e 2a27ae40c591fe1002d047d333c833d21f1913ec de34c455ca84a2e95849ba446d557c9cacd855e5 31fdbde5451f553062e20ed052f34d8da6d38b8b 2fce6ef1ff875b91fbd7216e40bd4ecf9de84305 96ca2710a228b3cc0add644cd5e5f453e479744c 2ad4e58670b02607747ecb08061e2fd719302954 02bb75eaa98d1e9320cc056e5f78241cff90934f cab5805edb72cac4dc95638857e8cabffa9da944 e5e51647b3c6d39e2cee630916ff4ca5bf68123f fdb7ce8d3db8b9a8c5f6f7941685edbad92e3d23 40ecfb745abb0f2fff15b28453f0aad5d0ac658e f46ab4c6f7afc4d65c511cb9a049140e7949469d 92b677a830103fa56b0976d09f3cfbd84b862f23 dac9b5adaace582c1876da9f12b7df37cea617a0 93972c7277a96fc62379d464918c95840c2e76d3 f0fa6b6026011d26eb48d8d196cc674466d3bd91 23b03a4f14e158761a024420827f58cddcdfb762 24430cf618a2dd1ff0008c0127b0059111669a7c f3c4dc66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fa:c8:78:d6:9a:ac:08:52:6e:cf:2b:ff:65:3d:65:a6:55:25:aa:e6],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 07:59:46.449 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 07:59:46.451 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 07:59:46.455 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-24 07:59:46.456 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 07:59:46.456 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-24 07:59:46.457 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 07:59:46.457 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 07:59:46.458 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 07:59:46.458 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 07:59:46.458 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 07:59:46.463 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 07:59:46.463 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:59:46.464 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 07:59:46.464 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:59:46.616 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 07:59:46.617 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 07:59:46.617 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 07:59:46.617 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 07:59:46.619 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 07:59:46.619 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 07:59:46.620 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:59:46.620 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:59:46.620 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:59:46.621 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:59:46.621 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:59:46.622 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:59:46.622 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 07:59:46.623 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 07:59:46.623 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 07:59:46.624 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 07:59:46.629 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 65663574674857335830029640474820600770100530899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 05:18:36 UTC 2023 Final Date: Sun Jan 23 05:18:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:30:d0:ae:e6:f4:48:3f:24:5b:09:6b:37:2e:57:34:70:74:f2:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 279464ce61275e683969fa8ade3436f79f5e711e 2a27ae40c591fe1002d047d333c833d21f1913ec de34c455ca84a2e95849ba446d557c9cacd855e5 31fdbde5451f553062e20ed052f34d8da6d38b8b 2fce6ef1ff875b91fbd7216e40bd4ecf9de84305 96ca2710a228b3cc0add644cd5e5f453e479744c 2ad4e58670b02607747ecb08061e2fd719302954 02bb75eaa98d1e9320cc056e5f78241cff90934f cab5805edb72cac4dc95638857e8cabffa9da944 e5e51647b3c6d39e2cee630916ff4ca5bf68123f fdb7ce8d3db8b9a8c5f6f7941685edbad92e3d23 40ecfb745abb0f2fff15b28453f0aad5d0ac658e f46ab4c6f7afc4d65c511cb9a049140e7949469d 92b677a830103fa56b0976d09f3cfbd84b862f23 dac9b5adaace582c1876da9f12b7df37cea617a0 93972c7277a96fc62379d464918c95840c2e76d3 f0fa6b6026011d26eb48d8d196cc674466d3bd91 23b03a4f14e158761a024420827f58cddcdfb762 24430cf618a2dd1ff0008c0127b0059111669a7c f3c4dc66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d0:7f:ae:f3:a3:b1:f9:03:73:00:07:c3:6d:ff:80:f2:b3:7b:93:90],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 08:00:06.199 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 08:00:06.200 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 08:00:06.202 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-24 08:00:06.203 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 08:00:06.204 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-24 08:00:06.205 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 08:00:06.205 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 08:00:06.205 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 08:00:06.206 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 08:00:06.206 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 08:00:06.211 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 08:00:06.213 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 08:00:06.214 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 08:00:06.214 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 08:00:06.314 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 08:00:06.315 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 08:00:06.316 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 08:00:06.316 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 08:00:06.317 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 08:00:06.318 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 08:00:06.318 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 08:00:06.318 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 08:00:06.319 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 08:00:06.320 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 08:00:06.320 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 08:00:06.320 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 08:00:06.321 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 08:00:06.321 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 08:00:06.322 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 08:00:06.322 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 08:00:06.325 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 65663574674857335830029640474820600770100530899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 05:18:36 UTC 2023 Final Date: Sun Jan 23 05:18:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:30:d0:ae:e6:f4:48:3f:24:5b:09:6b:37:2e:57:34:70:74:f2:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 279464ce61275e683969fa8ade3436f79f5e711e 2a27ae40c591fe1002d047d333c833d21f1913ec de34c455ca84a2e95849ba446d557c9cacd855e5 31fdbde5451f553062e20ed052f34d8da6d38b8b 2fce6ef1ff875b91fbd7216e40bd4ecf9de84305 96ca2710a228b3cc0add644cd5e5f453e479744c 2ad4e58670b02607747ecb08061e2fd719302954 02bb75eaa98d1e9320cc056e5f78241cff90934f cab5805edb72cac4dc95638857e8cabffa9da944 e5e51647b3c6d39e2cee630916ff4ca5bf68123f fdb7ce8d3db8b9a8c5f6f7941685edbad92e3d23 40ecfb745abb0f2fff15b28453f0aad5d0ac658e f46ab4c6f7afc4d65c511cb9a049140e7949469d 92b677a830103fa56b0976d09f3cfbd84b862f23 dac9b5adaace582c1876da9f12b7df37cea617a0 93972c7277a96fc62379d464918c95840c2e76d3 f0fa6b6026011d26eb48d8d196cc674466d3bd91 23b03a4f14e158761a024420827f58cddcdfb762 24430cf618a2dd1ff0008c0127b0059111669a7c f3c4dc66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [94:c0:20:dc:63:ab:05:00:4e:6a:f5:b0:3b:dd:b4:6e:64:0d:66:a3],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 08:27:21.480 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 08:27:21.483 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 08:27:21.486 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-24 08:27:21.487 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 08:27:21.487 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-24 08:27:21.488 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 08:27:21.489 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 08:27:21.489 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 08:27:21.490 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 08:27:21.490 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 08:27:21.494 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 08:27:21.495 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 08:27:21.495 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 08:27:21.496 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 08:27:21.637 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 08:27:21.638 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 08:27:21.638 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 08:27:21.638 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 08:27:21.640 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 08:27:21.640 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 08:27:21.641 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 08:27:21.641 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 08:27:21.641 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 08:27:21.642 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 08:27:21.642 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 08:27:21.642 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 08:27:21.643 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 08:27:21.643 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 08:27:21.643 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 08:27:21.644 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 08:27:21.647 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 65663574674857335830029640474820600770100530899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 05:18:36 UTC 2023 Final Date: Sun Jan 23 05:18:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:30:d0:ae:e6:f4:48:3f:24:5b:09:6b:37:2e:57:34:70:74:f2:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 279464ce61275e683969fa8ade3436f79f5e711e 2a27ae40c591fe1002d047d333c833d21f1913ec de34c455ca84a2e95849ba446d557c9cacd855e5 31fdbde5451f553062e20ed052f34d8da6d38b8b 2fce6ef1ff875b91fbd7216e40bd4ecf9de84305 96ca2710a228b3cc0add644cd5e5f453e479744c 2ad4e58670b02607747ecb08061e2fd719302954 02bb75eaa98d1e9320cc056e5f78241cff90934f cab5805edb72cac4dc95638857e8cabffa9da944 e5e51647b3c6d39e2cee630916ff4ca5bf68123f fdb7ce8d3db8b9a8c5f6f7941685edbad92e3d23 40ecfb745abb0f2fff15b28453f0aad5d0ac658e f46ab4c6f7afc4d65c511cb9a049140e7949469d 92b677a830103fa56b0976d09f3cfbd84b862f23 dac9b5adaace582c1876da9f12b7df37cea617a0 93972c7277a96fc62379d464918c95840c2e76d3 f0fa6b6026011d26eb48d8d196cc674466d3bd91 23b03a4f14e158761a024420827f58cddcdfb762 24430cf618a2dd1ff0008c0127b0059111669a7c f3c4dc66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [96:66:7d:18:35:4a:d5:19:51:89:d2:14:06:e1:89:c5:2d:e7:68:1d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-24 08:27:28.719 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-24 08:27:28.721 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-24 08:27:28.723 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-24 08:27:28.723 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-24 08:27:28.724 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-24 08:27:28.724 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-24 08:27:28.725 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-24 08:27:28.725 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-24 08:27:28.726 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-24 08:27:28.728 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-24 08:27:28.732 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-24 08:27:28.732 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 08:27:28.733 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-24 08:27:28.733 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 08:27:28.860 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-24 08:27:28.861 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-24 08:27:28.861 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-24 08:27:28.861 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-24 08:27:28.862 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-24 08:27:28.862 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-24 08:27:28.863 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 08:27:28.863 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 08:27:28.864 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 08:27:28.864 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 08:27:28.864 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 08:27:28.864 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 08:27:28.865 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-24 08:27:28.865 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-24 08:27:28.866 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-24 08:27:28.866 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-24 08:27:28.869 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 65663574674857335830029640474820600770100530899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 24 05:18:36 UTC 2023 Final Date: Sun Jan 23 05:18:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:30:d0:ae:e6:f4:48:3f:24:5b:09:6b:37:2e:57:34:70:74:f2:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 279464ce61275e683969fa8ade3436f79f5e711e 2a27ae40c591fe1002d047d333c833d21f1913ec de34c455ca84a2e95849ba446d557c9cacd855e5 31fdbde5451f553062e20ed052f34d8da6d38b8b 2fce6ef1ff875b91fbd7216e40bd4ecf9de84305 96ca2710a228b3cc0add644cd5e5f453e479744c 2ad4e58670b02607747ecb08061e2fd719302954 02bb75eaa98d1e9320cc056e5f78241cff90934f cab5805edb72cac4dc95638857e8cabffa9da944 e5e51647b3c6d39e2cee630916ff4ca5bf68123f fdb7ce8d3db8b9a8c5f6f7941685edbad92e3d23 40ecfb745abb0f2fff15b28453f0aad5d0ac658e f46ab4c6f7afc4d65c511cb9a049140e7949469d 92b677a830103fa56b0976d09f3cfbd84b862f23 dac9b5adaace582c1876da9f12b7df37cea617a0 93972c7277a96fc62379d464918c95840c2e76d3 f0fa6b6026011d26eb48d8d196cc674466d3bd91 23b03a4f14e158761a024420827f58cddcdfb762 24430cf618a2dd1ff0008c0127b0059111669a7c f3c4dc66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:5d:2d:94:ff:65:f1:e8:da:f9:c8:1f:55:a6:be:28:af:a3:e9:53],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]