By type
2021-11-08 11:37:16,824 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-08 11:37:17,713 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-08 11:37:18.575 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-11-08 11:37:21.817 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-08 11:37:22.100 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-11-08 11:37:22.273 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-08 11:37:24.760 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.605 seconds (JVM running for 10.46) 2021-11-08 11:38:24.006 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 11:38:24.030 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 11:38:24.093 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-08 11:38:24.105 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 11:38:24.140 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-08 11:38:24.146 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 11:38:24.148 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 11:38:24.151 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 11:38:24.152 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 11:38:24.157 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 11:38:24.167 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 11:38:24.172 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 11:38:24.234 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 11:38:24.243 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 11:38:24.244 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 11:38:24.248 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 11:38:24.899 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 11:38:24.903 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 11:38:24.904 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 11:38:24.911 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 11:38:24.923 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 11:38:24.925 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 11:38:24.926 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 11:38:24.926 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 11:38:24.927 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 11:38:24.953 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 11:38:24.954 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 11:38:24.954 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 11:38:24.961 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 11:38:24.962 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 11:38:24.963 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 11:38:24.964 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 11:38:25.002 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 50347799524664192059404471526967967375417630024 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 11:31:05 UTC 2021 Final Date: Sat Nov 08 11:31:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:98:ea:19:f6:a3:75:a0:6a:32:81:89:b7:91:6f:59:21:1c:4b:60] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0f0a8e89f8d6ed1d2bdcad36d0ad72f95ce3ffe be0813dddee6a8e700de148df3864831b08762ae c1912b86982d7da131d0b0d7fb5ffa63d0ead860 f51be79fa3c28364b5649b141151d8d638f995bb 5bc7a4b2e5221f99929f332ec0bac95b2634c815 2000c484394cb9596826a2cacd9bbf3aeed3e60a 7298f5461b3aed161a516f9499169a41a4495911 47a8df255a5afdda6f4decb590af26eaf32dc2e4 11d216a5962cbd24f57b4044d0dcd328c8749b2c 59ef9b796bdf85519acc40291991d4b49dfe4f0f 9e85ac4cf85a6d380b5c4ed623391ddc6b78df0e 10a5538c815a3a66b4cf02ea4084ac027210c858 dfc7fde0b00a870f6ab2c2677811fa9b2a8f6891 509d0c6feb1562182b44f2a6b98694fd5cf5f799 36815620212136efedef2db895d5740603a0ec0a 03ddbeb6fe2c04f37cc600a7e66aaa4a5ee9ae7c 4f2f994c2889b1c9cff1ca33f13d325f689f115c 8f3cd9b5b2caa9cc8db42995392d36a0046cee9e 56a6b44f239b0ef2e16209cb949672817efb6bab e10b38c5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [48:5c:8f:bb:4d:ea:c1:96:bf:70:49:b5:1b:13:ec:f3:11:be:95:90] modulus: c745d08d94327483675353ae27b4d98d12cc60127b52a8344878f3208691af21e6ff3fbea7dbf504df93e824d1f602227f2535023ddb60f15ea0d8309da873b06d3367f53ccc4db9045c47c63bda828efa49ea73a889af374e6b51bce2e9201db0e64277e76f13c997686838d3aa1c614e37b8beebff6beda27dd1158bf8fbcdfac1aef11b66e31e0cd22b52a92c930d723d91c81318e5ac238e73939aba20692dbb7c05c744f6426d12b35d27d6934e6ed7deb32b7ad9dbaffd3bf89c714cfb935cd52ecd0f013ef40b95286d43fa19bc5b3c90df96fa0ca0930a8f03a9b0f9b1187dc338c08f5c273d97df327864de1798edb4490dfef5e4089d064827c4d5 public exponent: 10001 ] 2021-11-08 13:46:51.148 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 13:46:51.153 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 13:46:51.159 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-08 13:46:51.161 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 13:46:51.162 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-08 13:46:51.163 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 13:46:51.163 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 13:46:51.164 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 13:46:51.164 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 13:46:51.165 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 13:46:51.176 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 13:46:51.178 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 13:46:51.179 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 13:46:51.180 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 13:46:51.371 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 13:46:51.373 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 13:46:51.373 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 13:46:51.374 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 13:46:51.377 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 13:46:51.377 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 13:46:51.378 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:46:51.379 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:46:51.379 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:46:51.381 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:46:51.381 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:46:51.381 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:46:51.383 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:46:51.384 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:46:51.384 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:46:51.386 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 13:46:51.393 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 50347799524664192059404471526967967375417630024 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 11:31:05 UTC 2021 Final Date: Sat Nov 08 11:31:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:98:ea:19:f6:a3:75:a0:6a:32:81:89:b7:91:6f:59:21:1c:4b:60] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0f0a8e89f8d6ed1d2bdcad36d0ad72f95ce3ffe be0813dddee6a8e700de148df3864831b08762ae c1912b86982d7da131d0b0d7fb5ffa63d0ead860 f51be79fa3c28364b5649b141151d8d638f995bb 5bc7a4b2e5221f99929f332ec0bac95b2634c815 2000c484394cb9596826a2cacd9bbf3aeed3e60a 7298f5461b3aed161a516f9499169a41a4495911 47a8df255a5afdda6f4decb590af26eaf32dc2e4 11d216a5962cbd24f57b4044d0dcd328c8749b2c 59ef9b796bdf85519acc40291991d4b49dfe4f0f 9e85ac4cf85a6d380b5c4ed623391ddc6b78df0e 10a5538c815a3a66b4cf02ea4084ac027210c858 dfc7fde0b00a870f6ab2c2677811fa9b2a8f6891 509d0c6feb1562182b44f2a6b98694fd5cf5f799 36815620212136efedef2db895d5740603a0ec0a 03ddbeb6fe2c04f37cc600a7e66aaa4a5ee9ae7c 4f2f994c2889b1c9cff1ca33f13d325f689f115c 8f3cd9b5b2caa9cc8db42995392d36a0046cee9e 56a6b44f239b0ef2e16209cb949672817efb6bab e10b38c5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:70:88:61:23:95:74:17:3b:95:b2:a2:21:28:91:42:a9:2c:da:b6] modulus: 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 public exponent: 10001 ] 2021-11-08 13:48:04.566 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 13:48:04.572 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 13:48:04.575 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-08 13:48:04.576 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 13:48:04.576 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-08 13:48:04.577 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 13:48:04.578 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 13:48:04.579 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 13:48:04.579 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 13:48:04.582 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 13:48:04.591 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 13:48:04.593 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 13:48:04.594 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 13:48:04.594 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 13:48:04.781 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 13:48:04.782 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 13:48:04.783 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 13:48:04.785 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 13:48:04.795 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 13:48:04.796 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 13:48:04.796 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:48:04.797 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:48:04.797 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:48:04.798 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:48:04.799 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:48:04.801 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:48:04.802 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:48:04.803 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:48:04.807 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:48:04.808 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 13:48:04.818 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 50347799524664192059404471526967967375417630024 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 11:31:05 UTC 2021 Final Date: Sat Nov 08 11:31:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:98:ea:19:f6:a3:75:a0:6a:32:81:89:b7:91:6f:59:21:1c:4b:60] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0f0a8e89f8d6ed1d2bdcad36d0ad72f95ce3ffe be0813dddee6a8e700de148df3864831b08762ae c1912b86982d7da131d0b0d7fb5ffa63d0ead860 f51be79fa3c28364b5649b141151d8d638f995bb 5bc7a4b2e5221f99929f332ec0bac95b2634c815 2000c484394cb9596826a2cacd9bbf3aeed3e60a 7298f5461b3aed161a516f9499169a41a4495911 47a8df255a5afdda6f4decb590af26eaf32dc2e4 11d216a5962cbd24f57b4044d0dcd328c8749b2c 59ef9b796bdf85519acc40291991d4b49dfe4f0f 9e85ac4cf85a6d380b5c4ed623391ddc6b78df0e 10a5538c815a3a66b4cf02ea4084ac027210c858 dfc7fde0b00a870f6ab2c2677811fa9b2a8f6891 509d0c6feb1562182b44f2a6b98694fd5cf5f799 36815620212136efedef2db895d5740603a0ec0a 03ddbeb6fe2c04f37cc600a7e66aaa4a5ee9ae7c 4f2f994c2889b1c9cff1ca33f13d325f689f115c 8f3cd9b5b2caa9cc8db42995392d36a0046cee9e 56a6b44f239b0ef2e16209cb949672817efb6bab e10b38c5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fb:68:14:a7:77:ce:cd:9f:b9:7c:ba:3e:f3:b2:8f:64:64:da:92:8d] modulus: cec624ffcada1fcc665e6367ae81dff70d250d1f5b7ceda4ae4fa466c0ce3f344e8fa3e12a427df664dbb894faa821a0944887cae4703dc81b01ecaf49973217b9eb7aa1915a48376b9907bf6bdd8d9e395e2187879491dcb77a3750eae29d41485cde8e21463a26be627727c9b442318927de7d2a93a52c93a170f05188b86e9aa3145407e31d7d540aedea3494183cb3ec33a1114fc3afd379685ecb9769aa4c1a98ccb7e22d74a0733356f9b3798dc8cebdadda4d8ba25092534c844631c4b3fcbc9de07212921ff8cf8be575f4686061011c5f829720ae252449b3afae3d2ef0f7550cd815d70e65c7d26d7d7535087e08e74f94013808d09aa0abc8437f public exponent: 10001 ] 2021-11-08 13:50:18.483 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 13:50:18.487 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 13:50:18.490 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-08 13:50:18.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 13:50:18.493 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-08 13:50:18.499 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 13:50:18.500 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 13:50:18.501 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 13:50:18.502 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 13:50:18.502 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 13:50:18.509 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 13:50:18.511 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 13:50:18.512 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 13:50:18.512 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 13:50:18.690 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 13:50:18.692 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 13:50:18.692 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 13:50:18.693 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 13:50:18.697 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 13:50:18.698 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 13:50:18.699 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:50:18.699 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:50:18.700 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:50:18.702 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:50:18.703 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:50:18.704 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:50:18.705 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:50:18.706 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:50:18.706 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:50:18.709 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 13:50:18.716 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 50347799524664192059404471526967967375417630024 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 11:31:05 UTC 2021 Final Date: Sat Nov 08 11:31:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:98:ea:19:f6:a3:75:a0:6a:32:81:89:b7:91:6f:59:21:1c:4b:60] modulus: b37e884f234f62b683f1a06797c95ac5e3e6a68504f296fb1938568e470a4f64ee515fb266fe85129de5997ce706a957c3263a9d1fee608c6168340143c21a757504c56520924f055043e99df5742b182ab5290097f7cb0adaa983a00a2002d09d958dc341a755c09274b490a2d968876d18625e8da31e2cba4d9b6a286ee460aab7cf749ac5a9e47990414d3b06c1c3e84ba21edbc7821e9b07040008ca6040f0a13331e16b1552bb215b0a4cff7827e944099af59467f959d87d575ae6447610371f0d88d40f1436ed62d940bf05d758351b1e103d70ee687584e30c5f90b3d17e10673532bd46b8caf5b175cd33efed2b8408b7b23e3bd2e3cb617371b4aad10121de831aaa3d2edafd56072009216606d20f9fdc7d64b9f9f9078775a491720d9309328d2599c8798142e9a9181b4e48bd196599ac1ee64c1826bdc7b2204d9ef4156d8bbb4e105e14bec9fef37151627a7a1e6b6d502faebd4ebf4e282c01a861c9c9ff9ad566167995d605371d8081364533c9ef0211bb691b003b760b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0f0a8e89f8d6ed1d2bdcad36d0ad72f95ce3ffe be0813dddee6a8e700de148df3864831b08762ae c1912b86982d7da131d0b0d7fb5ffa63d0ead860 f51be79fa3c28364b5649b141151d8d638f995bb 5bc7a4b2e5221f99929f332ec0bac95b2634c815 2000c484394cb9596826a2cacd9bbf3aeed3e60a 7298f5461b3aed161a516f9499169a41a4495911 47a8df255a5afdda6f4decb590af26eaf32dc2e4 11d216a5962cbd24f57b4044d0dcd328c8749b2c 59ef9b796bdf85519acc40291991d4b49dfe4f0f 9e85ac4cf85a6d380b5c4ed623391ddc6b78df0e 10a5538c815a3a66b4cf02ea4084ac027210c858 dfc7fde0b00a870f6ab2c2677811fa9b2a8f6891 509d0c6feb1562182b44f2a6b98694fd5cf5f799 36815620212136efedef2db895d5740603a0ec0a 03ddbeb6fe2c04f37cc600a7e66aaa4a5ee9ae7c 4f2f994c2889b1c9cff1ca33f13d325f689f115c 8f3cd9b5b2caa9cc8db42995392d36a0046cee9e 56a6b44f239b0ef2e16209cb949672817efb6bab e10b38c5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [93:4b:49:5b:86:be:49:7b:7c:da:5b:ab:01:f7:07:10:c8:b0:16:7b] modulus: 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 public exponent: 10001 ] 2021-11-08 13:52:16.112 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 13:52:16.116 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 13:52:16.118 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-08 13:52:16.119 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 13:52:16.119 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-08 13:52:16.120 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 13:52:16.121 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 13:52:16.121 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 13:52:16.122 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 13:52:16.122 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 13:52:16.128 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 13:52:16.131 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 13:52:16.131 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 13:52:16.131 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 13:52:16.284 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 13:52:16.285 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 13:52:16.286 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 13:52:16.286 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 13:52:16.289 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 13:52:16.289 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 13:52:16.290 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:52:16.290 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:52:16.291 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:52:16.292 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:52:16.292 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:52:16.293 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:52:16.294 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:52:16.295 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:52:16.295 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:52:16.297 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 13:52:16.304 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 50347799524664192059404471526967967375417630024 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 11:31:05 UTC 2021 Final Date: Sat Nov 08 11:31:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:98:ea:19:f6:a3:75:a0:6a:32:81:89:b7:91:6f:59:21:1c:4b:60] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0f0a8e89f8d6ed1d2bdcad36d0ad72f95ce3ffe be0813dddee6a8e700de148df3864831b08762ae c1912b86982d7da131d0b0d7fb5ffa63d0ead860 f51be79fa3c28364b5649b141151d8d638f995bb 5bc7a4b2e5221f99929f332ec0bac95b2634c815 2000c484394cb9596826a2cacd9bbf3aeed3e60a 7298f5461b3aed161a516f9499169a41a4495911 47a8df255a5afdda6f4decb590af26eaf32dc2e4 11d216a5962cbd24f57b4044d0dcd328c8749b2c 59ef9b796bdf85519acc40291991d4b49dfe4f0f 9e85ac4cf85a6d380b5c4ed623391ddc6b78df0e 10a5538c815a3a66b4cf02ea4084ac027210c858 dfc7fde0b00a870f6ab2c2677811fa9b2a8f6891 509d0c6feb1562182b44f2a6b98694fd5cf5f799 36815620212136efedef2db895d5740603a0ec0a 03ddbeb6fe2c04f37cc600a7e66aaa4a5ee9ae7c 4f2f994c2889b1c9cff1ca33f13d325f689f115c 8f3cd9b5b2caa9cc8db42995392d36a0046cee9e 56a6b44f239b0ef2e16209cb949672817efb6bab e10b38c5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:53:9f:88:88:13:f9:15:c3:08:fd:3e:2f:7d:33:09:15:31:69:1f] modulus: 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 public exponent: 10001 ] 2021-11-08 13:52:46.929 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 13:52:46.939 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 13:52:46.941 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-08 13:52:46.942 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 13:52:46.942 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-08 13:52:46.943 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 13:52:46.943 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 13:52:46.944 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 13:52:46.944 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 13:52:46.945 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 13:52:46.951 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 13:52:46.952 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 13:52:46.953 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 13:52:46.953 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 13:52:47.069 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 13:52:47.070 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 13:52:47.071 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 13:52:47.072 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 13:52:47.073 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 13:52:47.074 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 13:52:47.075 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:52:47.075 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:52:47.076 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:52:47.076 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:52:47.077 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:52:47.078 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:52:47.080 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:52:47.080 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:52:47.081 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:52:47.082 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 13:52:47.088 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 50347799524664192059404471526967967375417630024 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 11:31:05 UTC 2021 Final Date: Sat Nov 08 11:31:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:98:ea:19:f6:a3:75:a0:6a:32:81:89:b7:91:6f:59:21:1c:4b:60] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0f0a8e89f8d6ed1d2bdcad36d0ad72f95ce3ffe be0813dddee6a8e700de148df3864831b08762ae c1912b86982d7da131d0b0d7fb5ffa63d0ead860 f51be79fa3c28364b5649b141151d8d638f995bb 5bc7a4b2e5221f99929f332ec0bac95b2634c815 2000c484394cb9596826a2cacd9bbf3aeed3e60a 7298f5461b3aed161a516f9499169a41a4495911 47a8df255a5afdda6f4decb590af26eaf32dc2e4 11d216a5962cbd24f57b4044d0dcd328c8749b2c 59ef9b796bdf85519acc40291991d4b49dfe4f0f 9e85ac4cf85a6d380b5c4ed623391ddc6b78df0e 10a5538c815a3a66b4cf02ea4084ac027210c858 dfc7fde0b00a870f6ab2c2677811fa9b2a8f6891 509d0c6feb1562182b44f2a6b98694fd5cf5f799 36815620212136efedef2db895d5740603a0ec0a 03ddbeb6fe2c04f37cc600a7e66aaa4a5ee9ae7c 4f2f994c2889b1c9cff1ca33f13d325f689f115c 8f3cd9b5b2caa9cc8db42995392d36a0046cee9e 56a6b44f239b0ef2e16209cb949672817efb6bab e10b38c5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cf:e3:3b:5d:cd:5c:f9:24:d1:45:c8:0a:ad:b6:d8:67:1d:44:08:18] modulus: edc66833fe0730cde3db4caf51012b7b88ddf585d9c8a7921501075c9f3a38cddaf5b258b3b9a019670fe6fa02aadde2a1c9d8211f08792e54128f9dcaa95626dd3accbbd503c321d1c4c6e4bd4e92da03114602ca2cb027e1aa99ec0420f4fde16c58cbd53ba918004e60ae3fd56882b1d7424fb21c15b40d87eed1c7cd75324d840524cab2451a1c09f47f2c77c3e689ca239974daa4070d9d93a1724fe5cc8010fb9bbeed4ac49361261a7f600a186e2d365e93769b436d9f7a056c27f3df79c4689342a45f5875d72f0cd3bddd5f75dc64708061c9114583a9735b5af8a2e093f63f378d630e405ae8f20bbac9aa176a4b0f25507000b2ee6e901094219d public exponent: 10001 ] 2021-11-08 13:53:22.470 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 13:53:22.473 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 13:53:22.476 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-08 13:53:22.476 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 13:53:22.478 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-08 13:53:22.478 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 13:53:22.479 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 13:53:22.484 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 13:53:22.484 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 13:53:22.485 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 13:53:22.490 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 13:53:22.492 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 13:53:22.492 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 13:53:22.493 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 13:53:22.666 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 13:53:22.667 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 13:53:22.667 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 13:53:22.667 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 13:53:22.669 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 13:53:22.669 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 13:53:22.670 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:53:22.671 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:53:22.671 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:53:22.673 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:53:22.673 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:53:22.676 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:53:22.676 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:53:22.677 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:53:22.677 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:53:22.679 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 13:53:22.696 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 50347799524664192059404471526967967375417630024 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 11:31:05 UTC 2021 Final Date: Sat Nov 08 11:31:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:98:ea:19:f6:a3:75:a0:6a:32:81:89:b7:91:6f:59:21:1c:4b:60] modulus: b37e884f234f62b683f1a06797c95ac5e3e6a68504f296fb1938568e470a4f64ee515fb266fe85129de5997ce706a957c3263a9d1fee608c6168340143c21a757504c56520924f055043e99df5742b182ab5290097f7cb0adaa983a00a2002d09d958dc341a755c09274b490a2d968876d18625e8da31e2cba4d9b6a286ee460aab7cf749ac5a9e47990414d3b06c1c3e84ba21edbc7821e9b07040008ca6040f0a13331e16b1552bb215b0a4cff7827e944099af59467f959d87d575ae6447610371f0d88d40f1436ed62d940bf05d758351b1e103d70ee687584e30c5f90b3d17e10673532bd46b8caf5b175cd33efed2b8408b7b23e3bd2e3cb617371b4aad10121de831aaa3d2edafd56072009216606d20f9fdc7d64b9f9f9078775a491720d9309328d2599c8798142e9a9181b4e48bd196599ac1ee64c1826bdc7b2204d9ef4156d8bbb4e105e14bec9fef37151627a7a1e6b6d502faebd4ebf4e282c01a861c9c9ff9ad566167995d605371d8081364533c9ef0211bb691b003b760b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0f0a8e89f8d6ed1d2bdcad36d0ad72f95ce3ffe be0813dddee6a8e700de148df3864831b08762ae c1912b86982d7da131d0b0d7fb5ffa63d0ead860 f51be79fa3c28364b5649b141151d8d638f995bb 5bc7a4b2e5221f99929f332ec0bac95b2634c815 2000c484394cb9596826a2cacd9bbf3aeed3e60a 7298f5461b3aed161a516f9499169a41a4495911 47a8df255a5afdda6f4decb590af26eaf32dc2e4 11d216a5962cbd24f57b4044d0dcd328c8749b2c 59ef9b796bdf85519acc40291991d4b49dfe4f0f 9e85ac4cf85a6d380b5c4ed623391ddc6b78df0e 10a5538c815a3a66b4cf02ea4084ac027210c858 dfc7fde0b00a870f6ab2c2677811fa9b2a8f6891 509d0c6feb1562182b44f2a6b98694fd5cf5f799 36815620212136efedef2db895d5740603a0ec0a 03ddbeb6fe2c04f37cc600a7e66aaa4a5ee9ae7c 4f2f994c2889b1c9cff1ca33f13d325f689f115c 8f3cd9b5b2caa9cc8db42995392d36a0046cee9e 56a6b44f239b0ef2e16209cb949672817efb6bab e10b38c5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cb:f2:3d:bb:e5:0b:fe:b8:e6:ac:73:f4:f8:85:36:af:d3:29:e3:a2] modulus: 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 public exponent: 10001 ] 2021-11-08 13:53:30.338 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 13:53:30.339 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 13:53:30.355 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-08 13:53:30.356 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 13:53:30.357 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-08 13:53:30.358 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 13:53:30.358 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 13:53:30.358 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 13:53:30.359 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 13:53:30.359 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 13:53:30.364 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 13:53:30.365 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 13:53:30.365 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 13:53:30.366 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 13:53:30.493 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 13:53:30.495 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 13:53:30.495 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 13:53:30.496 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 13:53:30.498 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 13:53:30.498 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 13:53:30.499 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:53:30.499 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:53:30.500 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:53:30.502 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:53:30.502 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:53:30.502 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:53:30.503 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:53:30.504 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:53:30.504 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:53:30.505 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 13:53:30.510 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 50347799524664192059404471526967967375417630024 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 11:31:05 UTC 2021 Final Date: Sat Nov 08 11:31:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:98:ea:19:f6:a3:75:a0:6a:32:81:89:b7:91:6f:59:21:1c:4b:60] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0f0a8e89f8d6ed1d2bdcad36d0ad72f95ce3ffe be0813dddee6a8e700de148df3864831b08762ae c1912b86982d7da131d0b0d7fb5ffa63d0ead860 f51be79fa3c28364b5649b141151d8d638f995bb 5bc7a4b2e5221f99929f332ec0bac95b2634c815 2000c484394cb9596826a2cacd9bbf3aeed3e60a 7298f5461b3aed161a516f9499169a41a4495911 47a8df255a5afdda6f4decb590af26eaf32dc2e4 11d216a5962cbd24f57b4044d0dcd328c8749b2c 59ef9b796bdf85519acc40291991d4b49dfe4f0f 9e85ac4cf85a6d380b5c4ed623391ddc6b78df0e 10a5538c815a3a66b4cf02ea4084ac027210c858 dfc7fde0b00a870f6ab2c2677811fa9b2a8f6891 509d0c6feb1562182b44f2a6b98694fd5cf5f799 36815620212136efedef2db895d5740603a0ec0a 03ddbeb6fe2c04f37cc600a7e66aaa4a5ee9ae7c 4f2f994c2889b1c9cff1ca33f13d325f689f115c 8f3cd9b5b2caa9cc8db42995392d36a0046cee9e 56a6b44f239b0ef2e16209cb949672817efb6bab e10b38c5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [02:b8:f4:5c:2e:87:3f:6e:62:8c:ec:ce:f6:51:64:4c:2a:c6:85:86] modulus: bd5f9da6513aebb79f36103374dcc73f16ec149ed67523321268bf9d0fe7d000641480ea62d89dccf45bbacc299db4d7736d25996c4c7cd29eb5a826b8c32640eb77f879ae3c913403da3c734e2ffb9300c2eed0ae182b36484eba293c01ebdfea436fa9ba5fa8a93663ba9e3aa92a3c652590b73abe537e52f276ae65c39b2e0abbab27276f96d426dc16ec2940ecd49c9b67c83f135906cbc61de8cfd703a9ce49b4cb4bcbf56806ed886bffcb499b9f4367357e6ed41422116a67d6ebb35336d56431357201ff37bcbad4fdc8414f44b702ae1ded6e7ddef79c087c531793414f77aa612d430ced9095fdc5da9d52c35b1d2b4be7db9b7929faa74b1c9de7 public exponent: 10001 ] 2021-11-08 13:55:09.756 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 13:55:09.760 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 13:55:09.764 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-08 13:55:09.765 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 13:55:09.766 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-08 13:55:09.767 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 13:55:09.767 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 13:55:09.768 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 13:55:09.768 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 13:55:09.769 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 13:55:09.774 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 13:55:09.776 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 13:55:09.777 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 13:55:09.777 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 13:55:09.908 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 13:55:09.910 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 13:55:09.910 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 13:55:09.911 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 13:55:09.912 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 13:55:09.913 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 13:55:09.913 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:55:09.914 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:55:09.914 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:55:09.916 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:55:09.916 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:55:09.916 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:55:09.917 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 13:55:09.918 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 13:55:09.918 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 13:55:09.919 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 13:55:09.926 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 50347799524664192059404471526967967375417630024 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 11:31:05 UTC 2021 Final Date: Sat Nov 08 11:31:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:98:ea:19:f6:a3:75:a0:6a:32:81:89:b7:91:6f:59:21:1c:4b:60] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0f0a8e89f8d6ed1d2bdcad36d0ad72f95ce3ffe be0813dddee6a8e700de148df3864831b08762ae c1912b86982d7da131d0b0d7fb5ffa63d0ead860 f51be79fa3c28364b5649b141151d8d638f995bb 5bc7a4b2e5221f99929f332ec0bac95b2634c815 2000c484394cb9596826a2cacd9bbf3aeed3e60a 7298f5461b3aed161a516f9499169a41a4495911 47a8df255a5afdda6f4decb590af26eaf32dc2e4 11d216a5962cbd24f57b4044d0dcd328c8749b2c 59ef9b796bdf85519acc40291991d4b49dfe4f0f 9e85ac4cf85a6d380b5c4ed623391ddc6b78df0e 10a5538c815a3a66b4cf02ea4084ac027210c858 dfc7fde0b00a870f6ab2c2677811fa9b2a8f6891 509d0c6feb1562182b44f2a6b98694fd5cf5f799 36815620212136efedef2db895d5740603a0ec0a 03ddbeb6fe2c04f37cc600a7e66aaa4a5ee9ae7c 4f2f994c2889b1c9cff1ca33f13d325f689f115c 8f3cd9b5b2caa9cc8db42995392d36a0046cee9e 56a6b44f239b0ef2e16209cb949672817efb6bab e10b38c5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [93:1b:9d:d8:5f:09:0c:15:00:c1:e3:ad:3d:2c:60:9e:e4:e2:d6:15] modulus: a1b88db75c41257671f3a69ff1184683802339cd35d4c461fb82a6b6aaf06476364b245a0e6bd73f38963e29335a3b279e03d9722716f85603fb2886f7f291b8f9b4790e963155381682e3bf1638c184fe6616bf9c8bd388f715c34d64570724743539f327b7112aa60b53cf93f1b70c094e75fb418346acf02c02704b554143798f12afd6f672a2a92c973a6c7bd1cb9d49fd58e2dd9c0847d566f0a8bbf3c8418500fa7935321719ebcdea7f6a6ce0f6fd8cc24ee3f8d6e2480460bd7bb04b6d810be80982e40460cf578e783c963ebdb60ef1d85e5a32897195952b5c9d635d6bd184bcb4ef8bacdc93038f727e40023d45a94771a7e3d6925559d947f6bb public exponent: 10001 ] 2021-11-08 14:11:21.487 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 14:11:21.490 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 14:11:21.492 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-08 14:11:21.493 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 14:11:21.493 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-08 14:11:21.494 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 14:11:21.495 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 14:11:21.495 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 14:11:21.496 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 14:11:21.496 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 14:11:21.502 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 14:11:21.504 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 14:11:21.504 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 14:11:21.505 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 14:11:21.685 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 14:11:21.686 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 14:11:21.686 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 14:11:21.687 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 14:11:21.689 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 14:11:21.690 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 14:11:21.691 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 14:11:21.692 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 14:11:21.692 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 14:11:21.694 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 14:11:21.695 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 14:11:21.695 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 14:11:21.696 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 14:11:21.697 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 14:11:21.698 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 14:11:21.699 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 14:11:21.706 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 50347799524664192059404471526967967375417630024 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 11:31:05 UTC 2021 Final Date: Sat Nov 08 11:31:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:98:ea:19:f6:a3:75:a0:6a:32:81:89:b7:91:6f:59:21:1c:4b:60] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0f0a8e89f8d6ed1d2bdcad36d0ad72f95ce3ffe be0813dddee6a8e700de148df3864831b08762ae c1912b86982d7da131d0b0d7fb5ffa63d0ead860 f51be79fa3c28364b5649b141151d8d638f995bb 5bc7a4b2e5221f99929f332ec0bac95b2634c815 2000c484394cb9596826a2cacd9bbf3aeed3e60a 7298f5461b3aed161a516f9499169a41a4495911 47a8df255a5afdda6f4decb590af26eaf32dc2e4 11d216a5962cbd24f57b4044d0dcd328c8749b2c 59ef9b796bdf85519acc40291991d4b49dfe4f0f 9e85ac4cf85a6d380b5c4ed623391ddc6b78df0e 10a5538c815a3a66b4cf02ea4084ac027210c858 dfc7fde0b00a870f6ab2c2677811fa9b2a8f6891 509d0c6feb1562182b44f2a6b98694fd5cf5f799 36815620212136efedef2db895d5740603a0ec0a 03ddbeb6fe2c04f37cc600a7e66aaa4a5ee9ae7c 4f2f994c2889b1c9cff1ca33f13d325f689f115c 8f3cd9b5b2caa9cc8db42995392d36a0046cee9e 56a6b44f239b0ef2e16209cb949672817efb6bab e10b38c5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [46:96:e4:f2:d1:67:bf:40:ee:33:9a:ba:03:4e:65:ee:29:c3:df:7e] modulus: e016e3c605a9023451071a2422aa1820a39f8606111ec10d5d501ae477e573f27c89bad577386c1b7af2c52e8bdcbda6d6f68119ed23683d75deafb20c1be3032532b4a22bca2a4fc75aca3b172e77c5ffdaddbaa878d2f42c69c1bd5f064da9288911702e94906cf7d204b9098688a88a61f90c1d69941317328c8145a28df8cac93f35fe811163e56fe1f0a2095410e894743ff4a5542a3ad5a6a316774e9df1b4e2bd9b75b28da797d0ca0829b01461d1294f3289ad9785cb47e3d89fd4116a9f1bc1a0d8e1c03644010d2667e91728b7e335eaef4ea3d2f8d128542241956a9e60c81e6d4ae53b25c8a753b5cd94817b41ddab08c59df73362d49c6ba931 public exponent: 10001 ] 2021-11-08 14:15:10.004 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 14:15:10.007 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 14:15:10.009 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-08 14:15:10.011 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 14:15:10.011 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-08 14:15:10.014 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 14:15:10.014 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 14:15:10.015 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 14:15:10.015 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 14:15:10.016 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 14:15:10.021 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 14:15:10.022 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 14:15:10.022 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 14:15:10.023 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 14:15:10.179 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 14:15:10.180 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 14:15:10.181 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 14:15:10.181 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 14:15:10.183 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 14:15:10.184 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 14:15:10.185 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 14:15:10.185 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 14:15:10.186 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 14:15:10.187 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 14:15:10.187 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 14:15:10.188 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 14:15:10.189 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 14:15:10.189 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 14:15:10.190 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 14:15:10.190 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 14:15:10.196 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 50347799524664192059404471526967967375417630024 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 11:31:05 UTC 2021 Final Date: Sat Nov 08 11:31:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:98:ea:19:f6:a3:75:a0:6a:32:81:89:b7:91:6f:59:21:1c:4b:60] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0f0a8e89f8d6ed1d2bdcad36d0ad72f95ce3ffe be0813dddee6a8e700de148df3864831b08762ae c1912b86982d7da131d0b0d7fb5ffa63d0ead860 f51be79fa3c28364b5649b141151d8d638f995bb 5bc7a4b2e5221f99929f332ec0bac95b2634c815 2000c484394cb9596826a2cacd9bbf3aeed3e60a 7298f5461b3aed161a516f9499169a41a4495911 47a8df255a5afdda6f4decb590af26eaf32dc2e4 11d216a5962cbd24f57b4044d0dcd328c8749b2c 59ef9b796bdf85519acc40291991d4b49dfe4f0f 9e85ac4cf85a6d380b5c4ed623391ddc6b78df0e 10a5538c815a3a66b4cf02ea4084ac027210c858 dfc7fde0b00a870f6ab2c2677811fa9b2a8f6891 509d0c6feb1562182b44f2a6b98694fd5cf5f799 36815620212136efedef2db895d5740603a0ec0a 03ddbeb6fe2c04f37cc600a7e66aaa4a5ee9ae7c 4f2f994c2889b1c9cff1ca33f13d325f689f115c 8f3cd9b5b2caa9cc8db42995392d36a0046cee9e 56a6b44f239b0ef2e16209cb949672817efb6bab e10b38c5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [54:a4:bd:e3:df:73:1b:4a:df:45:cc:4d:53:83:98:76:58:0d:f4:f3] modulus: 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 public exponent: 10001 ] 2021-11-08 14:15:43.260 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 14:15:43.263 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 14:15:43.265 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-08 14:15:43.267 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 14:15:43.267 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-08 14:15:43.268 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 14:15:43.268 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 14:15:43.269 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 14:15:43.269 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 14:15:43.270 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 14:15:43.275 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 14:15:43.277 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 14:15:43.277 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 14:15:43.278 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 14:15:43.429 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 14:15:43.430 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 14:15:43.431 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 14:15:43.431 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 14:15:43.432 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 14:15:43.433 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 14:15:43.433 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 14:15:43.433 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 14:15:43.433 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 14:15:43.434 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 14:15:43.436 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 14:15:43.436 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 14:15:43.437 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 14:15:43.437 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 14:15:43.437 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 14:15:43.439 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 14:15:43.444 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 50347799524664192059404471526967967375417630024 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 11:31:05 UTC 2021 Final Date: Sat Nov 08 11:31:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:98:ea:19:f6:a3:75:a0:6a:32:81:89:b7:91:6f:59:21:1c:4b:60] modulus: b37e884f234f62b683f1a06797c95ac5e3e6a68504f296fb1938568e470a4f64ee515fb266fe85129de5997ce706a957c3263a9d1fee608c6168340143c21a757504c56520924f055043e99df5742b182ab5290097f7cb0adaa983a00a2002d09d958dc341a755c09274b490a2d968876d18625e8da31e2cba4d9b6a286ee460aab7cf749ac5a9e47990414d3b06c1c3e84ba21edbc7821e9b07040008ca6040f0a13331e16b1552bb215b0a4cff7827e944099af59467f959d87d575ae6447610371f0d88d40f1436ed62d940bf05d758351b1e103d70ee687584e30c5f90b3d17e10673532bd46b8caf5b175cd33efed2b8408b7b23e3bd2e3cb617371b4aad10121de831aaa3d2edafd56072009216606d20f9fdc7d64b9f9f9078775a491720d9309328d2599c8798142e9a9181b4e48bd196599ac1ee64c1826bdc7b2204d9ef4156d8bbb4e105e14bec9fef37151627a7a1e6b6d502faebd4ebf4e282c01a861c9c9ff9ad566167995d605371d8081364533c9ef0211bb691b003b760b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0f0a8e89f8d6ed1d2bdcad36d0ad72f95ce3ffe be0813dddee6a8e700de148df3864831b08762ae c1912b86982d7da131d0b0d7fb5ffa63d0ead860 f51be79fa3c28364b5649b141151d8d638f995bb 5bc7a4b2e5221f99929f332ec0bac95b2634c815 2000c484394cb9596826a2cacd9bbf3aeed3e60a 7298f5461b3aed161a516f9499169a41a4495911 47a8df255a5afdda6f4decb590af26eaf32dc2e4 11d216a5962cbd24f57b4044d0dcd328c8749b2c 59ef9b796bdf85519acc40291991d4b49dfe4f0f 9e85ac4cf85a6d380b5c4ed623391ddc6b78df0e 10a5538c815a3a66b4cf02ea4084ac027210c858 dfc7fde0b00a870f6ab2c2677811fa9b2a8f6891 509d0c6feb1562182b44f2a6b98694fd5cf5f799 36815620212136efedef2db895d5740603a0ec0a 03ddbeb6fe2c04f37cc600a7e66aaa4a5ee9ae7c 4f2f994c2889b1c9cff1ca33f13d325f689f115c 8f3cd9b5b2caa9cc8db42995392d36a0046cee9e 56a6b44f239b0ef2e16209cb949672817efb6bab e10b38c5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ec:86:2b:24:70:c5:25:fb:8c:ba:16:86:6d:2d:28:2f:60:db:ff:fb] modulus: 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 public exponent: 10001 ] 2021-11-08 14:16:16.597 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 14:16:16.599 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 14:16:16.601 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-08 14:16:16.602 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 14:16:16.602 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-08 14:16:16.606 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 14:16:16.607 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 14:16:16.607 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 14:16:16.614 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 14:16:16.614 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 14:16:16.619 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 14:16:16.620 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 14:16:16.620 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 14:16:16.621 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 14:16:16.731 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 14:16:16.732 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 14:16:16.732 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 14:16:16.733 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 14:16:16.734 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 14:16:16.735 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 14:16:16.735 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 14:16:16.736 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 14:16:16.736 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 14:16:16.741 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 14:16:16.741 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 14:16:16.741 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 14:16:16.742 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 14:16:16.742 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 14:16:16.743 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 14:16:16.744 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 14:16:16.748 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 50347799524664192059404471526967967375417630024 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 11:31:05 UTC 2021 Final Date: Sat Nov 08 11:31:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:98:ea:19:f6:a3:75:a0:6a:32:81:89:b7:91:6f:59:21:1c:4b:60] modulus: b37e884f234f62b683f1a06797c95ac5e3e6a68504f296fb1938568e470a4f64ee515fb266fe85129de5997ce706a957c3263a9d1fee608c6168340143c21a757504c56520924f055043e99df5742b182ab5290097f7cb0adaa983a00a2002d09d958dc341a755c09274b490a2d968876d18625e8da31e2cba4d9b6a286ee460aab7cf749ac5a9e47990414d3b06c1c3e84ba21edbc7821e9b07040008ca6040f0a13331e16b1552bb215b0a4cff7827e944099af59467f959d87d575ae6447610371f0d88d40f1436ed62d940bf05d758351b1e103d70ee687584e30c5f90b3d17e10673532bd46b8caf5b175cd33efed2b8408b7b23e3bd2e3cb617371b4aad10121de831aaa3d2edafd56072009216606d20f9fdc7d64b9f9f9078775a491720d9309328d2599c8798142e9a9181b4e48bd196599ac1ee64c1826bdc7b2204d9ef4156d8bbb4e105e14bec9fef37151627a7a1e6b6d502faebd4ebf4e282c01a861c9c9ff9ad566167995d605371d8081364533c9ef0211bb691b003b760b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0f0a8e89f8d6ed1d2bdcad36d0ad72f95ce3ffe be0813dddee6a8e700de148df3864831b08762ae c1912b86982d7da131d0b0d7fb5ffa63d0ead860 f51be79fa3c28364b5649b141151d8d638f995bb 5bc7a4b2e5221f99929f332ec0bac95b2634c815 2000c484394cb9596826a2cacd9bbf3aeed3e60a 7298f5461b3aed161a516f9499169a41a4495911 47a8df255a5afdda6f4decb590af26eaf32dc2e4 11d216a5962cbd24f57b4044d0dcd328c8749b2c 59ef9b796bdf85519acc40291991d4b49dfe4f0f 9e85ac4cf85a6d380b5c4ed623391ddc6b78df0e 10a5538c815a3a66b4cf02ea4084ac027210c858 dfc7fde0b00a870f6ab2c2677811fa9b2a8f6891 509d0c6feb1562182b44f2a6b98694fd5cf5f799 36815620212136efedef2db895d5740603a0ec0a 03ddbeb6fe2c04f37cc600a7e66aaa4a5ee9ae7c 4f2f994c2889b1c9cff1ca33f13d325f689f115c 8f3cd9b5b2caa9cc8db42995392d36a0046cee9e 56a6b44f239b0ef2e16209cb949672817efb6bab e10b38c5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4d:8c:67:64:47:b7:eb:56:d6:6e:5d:ad:e9:dc:d2:7a:6a:e0:eb:03] modulus: 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 public exponent: 10001 ] 2021-11-08 14:18:02.710 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 14:18:02.719 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 14:18:02.723 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-08 14:18:02.724 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 14:18:02.724 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-08 14:18:02.725 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 14:18:02.726 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 14:18:02.726 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 14:18:02.727 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 14:18:02.727 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 14:18:02.740 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 14:18:02.741 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 14:18:02.741 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 14:18:02.742 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 14:18:02.899 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 14:18:02.900 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 14:18:02.900 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 14:18:02.900 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 14:18:02.902 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 14:18:02.903 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 14:18:02.903 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 14:18:02.903 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 14:18:02.903 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 14:18:02.904 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 14:18:02.904 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 14:18:02.905 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 14:18:02.905 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 14:18:02.905 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 14:18:02.906 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 14:18:02.907 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 14:18:02.911 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 50347799524664192059404471526967967375417630024 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 11:31:05 UTC 2021 Final Date: Sat Nov 08 11:31:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:98:ea:19:f6:a3:75:a0:6a:32:81:89:b7:91:6f:59:21:1c:4b:60] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a0f0a8e89f8d6ed1d2bdcad36d0ad72f95ce3ffe be0813dddee6a8e700de148df3864831b08762ae c1912b86982d7da131d0b0d7fb5ffa63d0ead860 f51be79fa3c28364b5649b141151d8d638f995bb 5bc7a4b2e5221f99929f332ec0bac95b2634c815 2000c484394cb9596826a2cacd9bbf3aeed3e60a 7298f5461b3aed161a516f9499169a41a4495911 47a8df255a5afdda6f4decb590af26eaf32dc2e4 11d216a5962cbd24f57b4044d0dcd328c8749b2c 59ef9b796bdf85519acc40291991d4b49dfe4f0f 9e85ac4cf85a6d380b5c4ed623391ddc6b78df0e 10a5538c815a3a66b4cf02ea4084ac027210c858 dfc7fde0b00a870f6ab2c2677811fa9b2a8f6891 509d0c6feb1562182b44f2a6b98694fd5cf5f799 36815620212136efedef2db895d5740603a0ec0a 03ddbeb6fe2c04f37cc600a7e66aaa4a5ee9ae7c 4f2f994c2889b1c9cff1ca33f13d325f689f115c 8f3cd9b5b2caa9cc8db42995392d36a0046cee9e 56a6b44f239b0ef2e16209cb949672817efb6bab e10b38c5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:03:6c:99:d7:2a:f5:b3:72:2e:52:47:d8:03:16:f9:57:65:c1:7f] modulus: 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 public exponent: 10001 ]