2022-01-15 02:56:37,411 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-01-15 02:56:40,915 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2022-01-15 02:56:43.420  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2022-01-15 02:56:55.626 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-01-15 02:56:56.834  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-01-15 02:56:57.326  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-01-15 02:57:07.625  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 32.011 seconds (JVM running for 38.258) 2022-01-15 03:01:03.238  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-01-15 03:01:03.317 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-01-15 03:01:03.435 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-01-15 03:01:03.438 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-15 03:01:03.520  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-01-15 03:01:03.524  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-01-15 03:01:03.524  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-01-15 03:01:03.526 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-01-15 03:01:03.527 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-15 03:01:03.610 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-01-15 03:01:03.617 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-01-15 03:01:03.620 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-01-15 03:01:03.732 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-01-15 03:01:03.736 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-15 03:01:03.736 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-15 03:01:03.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-15 03:01:05.022  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-01-15 03:01:05.026  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-01-15 03:01:05.110 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-01-15 03:01:05.113 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-15 03:01:05.122  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-01-15 03:01:05.123  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-01-15 03:01:05.124 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 03:01:05.124 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 03:01:05.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 03:01:05.209 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 03:01:05.210 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 03:01:05.210 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 03:01:05.218 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 03:01:05.218 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 03:01:05.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 03:01:05.221 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-15 03:01:05.324 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203487876945264968802104854975824454210455655535 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 15 02:52:07 UTC 2022 Final Date: Thu Jan 15 02:52:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:06:33:81:3f:35:07:07:48:d9:c3:77:55:48:fd:d9:26:49:7a:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7d47adf9ebf3bd9a90e172e8d85b0650b8ac976e f2c68fbbe066b9cb6fa4604d818e43d86c7b6d05 231c9e582f1132bd9f124431db95297a5a888771 7401f6b350e47d72bfa718550a4cfd1549759cd1 2ec75373e797434c7b82c87872648c4e42f09d20 9fba2949bffe587ca2bb60561ed77707c53e5b8b b9987f092ccd11686b93e69ddf93b1265309126c 4295f4a2838530c7e1befe12d9ba877e039b0add f949dcecde54a8a5db487edf46dea79ddde65b9d ce2769d20559cf2362742e12e3d997a5cd3f7782 5fd28cebfca5e1f915d63e69e2ff4399a18ef053 bf9dca13b127f5e7b21ae0109e054722784e366c 8da01d09a9733df1b05152a59b1bb358a3638848 890e40bf8ebefed03f4f4e3d89e28572bbe84d2c ca37d08ef432d6fe9293998a78e59622289d4b21 5f92f990c773be03222c6d6a1be3420f317d1558 ef1f7efab0e75df37f41858e4401f8502aa693a4 db3fd2f58885a0b2f70c918c3c19c75eeaab0961 96e4ac8cfd357de2dd97a1049859620e3d1522f2 ace2023c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:27:ed:a5:02:fe:5a:00:9a:48:99:97:73:52:f2:23:0d:8e:35:24] modulus: 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 public exponent: 10001 ] 2022-01-15 04:56:58.279  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-01-15 04:56:58.280 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-01-15 04:56:58.309 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-15 04:56:58.313 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-15 04:56:58.315  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-15 04:56:58.316  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-01-15 04:56:58.317  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-01-15 04:56:58.317 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-01-15 04:56:58.318 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-01-15 04:56:58.321 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-01-15 04:56:58.417 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-01-15 04:56:58.419 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-15 04:56:58.419 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-15 04:56:58.419 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-15 04:56:58.610  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-01-15 04:56:58.611  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-01-15 04:56:58.611 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-01-15 04:56:58.612 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-15 04:56:58.615  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-01-15 04:56:58.615  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-01-15 04:56:58.616 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 04:56:58.616 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 04:56:58.617 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 04:56:58.619 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 04:56:58.619 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 04:56:58.619 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 04:56:58.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 04:56:58.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 04:56:58.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 04:56:58.622 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-15 04:56:58.711 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203487876945264968802104854975824454210455655535 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 15 02:52:07 UTC 2022 Final Date: Thu Jan 15 02:52:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:06:33:81:3f:35:07:07:48:d9:c3:77:55:48:fd:d9:26:49:7a:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7d47adf9ebf3bd9a90e172e8d85b0650b8ac976e f2c68fbbe066b9cb6fa4604d818e43d86c7b6d05 231c9e582f1132bd9f124431db95297a5a888771 7401f6b350e47d72bfa718550a4cfd1549759cd1 2ec75373e797434c7b82c87872648c4e42f09d20 9fba2949bffe587ca2bb60561ed77707c53e5b8b b9987f092ccd11686b93e69ddf93b1265309126c 4295f4a2838530c7e1befe12d9ba877e039b0add f949dcecde54a8a5db487edf46dea79ddde65b9d ce2769d20559cf2362742e12e3d997a5cd3f7782 5fd28cebfca5e1f915d63e69e2ff4399a18ef053 bf9dca13b127f5e7b21ae0109e054722784e366c 8da01d09a9733df1b05152a59b1bb358a3638848 890e40bf8ebefed03f4f4e3d89e28572bbe84d2c ca37d08ef432d6fe9293998a78e59622289d4b21 5f92f990c773be03222c6d6a1be3420f317d1558 ef1f7efab0e75df37f41858e4401f8502aa693a4 db3fd2f58885a0b2f70c918c3c19c75eeaab0961 96e4ac8cfd357de2dd97a1049859620e3d1522f2 ace2023c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:ec:4b:37:89:96:db:97:12:01:a9:1b:24:4e:61:36:98:56:0e:b9] modulus: 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 public exponent: 10001 ] 2022-01-15 05:06:58.893  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-01-15 05:06:58.894 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-01-15 05:06:58.895 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-15 05:06:58.896 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-15 05:06:58.897  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-15 05:06:58.898  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-01-15 05:06:58.898  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-01-15 05:06:58.899 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-01-15 05:06:58.899 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-01-15 05:06:58.900 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-01-15 05:06:58.907 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-01-15 05:06:58.907 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-15 05:06:58.908 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-15 05:06:58.908 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-15 05:06:59.045  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-01-15 05:06:59.109  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-01-15 05:06:59.110 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-01-15 05:06:59.110 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-15 05:06:59.112  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-01-15 05:06:59.113  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-01-15 05:06:59.113 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 05:06:59.114 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 05:06:59.114 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 05:06:59.115 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 05:06:59.115 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 05:06:59.115 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 05:06:59.116 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 05:06:59.117 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 05:06:59.117 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 05:06:59.118 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-15 05:06:59.121 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203487876945264968802104854975824454210455655535 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 15 02:52:07 UTC 2022 Final Date: Thu Jan 15 02:52:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:06:33:81:3f:35:07:07:48:d9:c3:77:55:48:fd:d9:26:49:7a:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7d47adf9ebf3bd9a90e172e8d85b0650b8ac976e f2c68fbbe066b9cb6fa4604d818e43d86c7b6d05 231c9e582f1132bd9f124431db95297a5a888771 7401f6b350e47d72bfa718550a4cfd1549759cd1 2ec75373e797434c7b82c87872648c4e42f09d20 9fba2949bffe587ca2bb60561ed77707c53e5b8b b9987f092ccd11686b93e69ddf93b1265309126c 4295f4a2838530c7e1befe12d9ba877e039b0add f949dcecde54a8a5db487edf46dea79ddde65b9d ce2769d20559cf2362742e12e3d997a5cd3f7782 5fd28cebfca5e1f915d63e69e2ff4399a18ef053 bf9dca13b127f5e7b21ae0109e054722784e366c 8da01d09a9733df1b05152a59b1bb358a3638848 890e40bf8ebefed03f4f4e3d89e28572bbe84d2c ca37d08ef432d6fe9293998a78e59622289d4b21 5f92f990c773be03222c6d6a1be3420f317d1558 ef1f7efab0e75df37f41858e4401f8502aa693a4 db3fd2f58885a0b2f70c918c3c19c75eeaab0961 96e4ac8cfd357de2dd97a1049859620e3d1522f2 ace2023c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b6:94:6a:a0:d9:d4:d0:7c:97:99:2d:04:88:02:05:cb:8e:3b:f4:93] modulus: 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 public exponent: 10001 ] 2022-01-15 05:06:59.803  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-01-15 05:06:59.804 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-01-15 05:06:59.805 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-15 05:06:59.806 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-15 05:06:59.806  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-15 05:06:59.807  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-01-15 05:06:59.807  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-01-15 05:06:59.808 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-01-15 05:06:59.808 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-01-15 05:06:59.808 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-01-15 05:06:59.816 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-01-15 05:06:59.816 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-15 05:06:59.816 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-15 05:06:59.817 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-15 05:06:59.884  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-01-15 05:06:59.884  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-01-15 05:06:59.885 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-01-15 05:06:59.885 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-15 05:06:59.910  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-01-15 05:06:59.911  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-01-15 05:06:59.911 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 05:06:59.912 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 05:06:59.912 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 05:06:59.913 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 05:06:59.913 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 05:06:59.913 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 05:06:59.914 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 05:06:59.914 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 05:06:59.914 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 05:06:59.915 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-15 05:06:59.918 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203487876945264968802104854975824454210455655535 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 15 02:52:07 UTC 2022 Final Date: Thu Jan 15 02:52:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:06:33:81:3f:35:07:07:48:d9:c3:77:55:48:fd:d9:26:49:7a:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7d47adf9ebf3bd9a90e172e8d85b0650b8ac976e f2c68fbbe066b9cb6fa4604d818e43d86c7b6d05 231c9e582f1132bd9f124431db95297a5a888771 7401f6b350e47d72bfa718550a4cfd1549759cd1 2ec75373e797434c7b82c87872648c4e42f09d20 9fba2949bffe587ca2bb60561ed77707c53e5b8b b9987f092ccd11686b93e69ddf93b1265309126c 4295f4a2838530c7e1befe12d9ba877e039b0add f949dcecde54a8a5db487edf46dea79ddde65b9d ce2769d20559cf2362742e12e3d997a5cd3f7782 5fd28cebfca5e1f915d63e69e2ff4399a18ef053 bf9dca13b127f5e7b21ae0109e054722784e366c 8da01d09a9733df1b05152a59b1bb358a3638848 890e40bf8ebefed03f4f4e3d89e28572bbe84d2c ca37d08ef432d6fe9293998a78e59622289d4b21 5f92f990c773be03222c6d6a1be3420f317d1558 ef1f7efab0e75df37f41858e4401f8502aa693a4 db3fd2f58885a0b2f70c918c3c19c75eeaab0961 96e4ac8cfd357de2dd97a1049859620e3d1522f2 ace2023c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ca:40:08:09:62:9b:f9:85:25:a1:1d:be:d1:a7:7c:61:81:6c:e0:6b] modulus: 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 public exponent: 10001 ] 2022-01-15 05:10:03.605  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-01-15 05:10:03.607 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-01-15 05:10:03.608 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-15 05:10:03.608 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-15 05:10:03.608  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-15 05:10:03.609  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-01-15 05:10:03.609  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-01-15 05:10:03.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-01-15 05:10:03.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-01-15 05:10:03.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-01-15 05:10:03.615 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-01-15 05:10:03.615 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-15 05:10:03.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-15 05:10:03.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-15 05:10:03.694  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-01-15 05:10:03.695  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-01-15 05:10:03.695 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-01-15 05:10:03.695 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-15 05:10:03.709  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-01-15 05:10:03.710  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-01-15 05:10:03.710 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 05:10:03.710 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 05:10:03.710 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 05:10:03.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 05:10:03.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 05:10:03.712 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 05:10:03.712 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 05:10:03.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 05:10:03.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 05:10:03.714 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-15 05:10:03.716 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203487876945264968802104854975824454210455655535 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 15 02:52:07 UTC 2022 Final Date: Thu Jan 15 02:52:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:06:33:81:3f:35:07:07:48:d9:c3:77:55:48:fd:d9:26:49:7a:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7d47adf9ebf3bd9a90e172e8d85b0650b8ac976e f2c68fbbe066b9cb6fa4604d818e43d86c7b6d05 231c9e582f1132bd9f124431db95297a5a888771 7401f6b350e47d72bfa718550a4cfd1549759cd1 2ec75373e797434c7b82c87872648c4e42f09d20 9fba2949bffe587ca2bb60561ed77707c53e5b8b b9987f092ccd11686b93e69ddf93b1265309126c 4295f4a2838530c7e1befe12d9ba877e039b0add f949dcecde54a8a5db487edf46dea79ddde65b9d ce2769d20559cf2362742e12e3d997a5cd3f7782 5fd28cebfca5e1f915d63e69e2ff4399a18ef053 bf9dca13b127f5e7b21ae0109e054722784e366c 8da01d09a9733df1b05152a59b1bb358a3638848 890e40bf8ebefed03f4f4e3d89e28572bbe84d2c ca37d08ef432d6fe9293998a78e59622289d4b21 5f92f990c773be03222c6d6a1be3420f317d1558 ef1f7efab0e75df37f41858e4401f8502aa693a4 db3fd2f58885a0b2f70c918c3c19c75eeaab0961 96e4ac8cfd357de2dd97a1049859620e3d1522f2 ace2023c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4f:b2:36:d1:fc:b4:1f:a0:d4:33:23:85:8f:e9:e4:99:72:db:00:65] modulus: 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 public exponent: 10001 ] 2022-01-15 05:12:59.517  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-01-15 05:12:59.518 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-01-15 05:12:59.519 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-15 05:12:59.520 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-15 05:12:59.520  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-15 05:12:59.521  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-01-15 05:12:59.521  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-01-15 05:12:59.522 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-01-15 05:12:59.522 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-01-15 05:12:59.522 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-01-15 05:12:59.527 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-01-15 05:12:59.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-15 05:12:59.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-15 05:12:59.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-15 05:12:59.603  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-01-15 05:12:59.604  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-01-15 05:12:59.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-01-15 05:12:59.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-15 05:12:59.605  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-01-15 05:12:59.606  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-01-15 05:12:59.609 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 05:12:59.609 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 05:12:59.610 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 05:12:59.610 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 05:12:59.610 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 05:12:59.611 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 05:12:59.611 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 05:12:59.612 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 05:12:59.612 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 05:12:59.613 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-15 05:12:59.616 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203487876945264968802104854975824454210455655535 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 15 02:52:07 UTC 2022 Final Date: Thu Jan 15 02:52:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:06:33:81:3f:35:07:07:48:d9:c3:77:55:48:fd:d9:26:49:7a:36] modulus: 8ccd8178543047b4a89216de0fc9a7211ddc39eebdca65b435ee8875fbf869e2d97ede94e2e562a1e30bede28454ea90b549ebabd8d107c430bef8247729212395d5dadc3f9f0e54cc994daf21519681125b5d77389c3b9dc9c2bd289b8846decf653787a069a177be317e0c5c07d7d43eba15677c237ab46c9f0f892f9a1e342a59d53a9ece20d65713a90f36f5dabe8dafe6336e0af05cb7a7e108d0a7675553d23e10ff20ae7ff43867bcbaa0572af6a57537300602a2ffd319c032b4bc207e98c0d4f90adaeae022aa6aa8f60f109003e6464c3600dcc7d865b1bf742c3cb0c822783cea1fadd71c0729b67b945163ddaf7ae604c0750376cc196689e97aa162c8379545d0addb67bea57897d807624b2ad27042b3c83d00b2007127b2b411006bc4a9f9631193b7cd32f17d85a50d0d0823b545a18b1b16f3f3bec6ccd3d89539ff586a52aec7f0cdfd44c416617bd172e593ff32aa5afc4fcb480b7d1e89e26dbf01e441ca26341f4002e38c042f628995e30c27754411ae85fc43c531 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7d47adf9ebf3bd9a90e172e8d85b0650b8ac976e f2c68fbbe066b9cb6fa4604d818e43d86c7b6d05 231c9e582f1132bd9f124431db95297a5a888771 7401f6b350e47d72bfa718550a4cfd1549759cd1 2ec75373e797434c7b82c87872648c4e42f09d20 9fba2949bffe587ca2bb60561ed77707c53e5b8b b9987f092ccd11686b93e69ddf93b1265309126c 4295f4a2838530c7e1befe12d9ba877e039b0add f949dcecde54a8a5db487edf46dea79ddde65b9d ce2769d20559cf2362742e12e3d997a5cd3f7782 5fd28cebfca5e1f915d63e69e2ff4399a18ef053 bf9dca13b127f5e7b21ae0109e054722784e366c 8da01d09a9733df1b05152a59b1bb358a3638848 890e40bf8ebefed03f4f4e3d89e28572bbe84d2c ca37d08ef432d6fe9293998a78e59622289d4b21 5f92f990c773be03222c6d6a1be3420f317d1558 ef1f7efab0e75df37f41858e4401f8502aa693a4 db3fd2f58885a0b2f70c918c3c19c75eeaab0961 96e4ac8cfd357de2dd97a1049859620e3d1522f2 ace2023c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d0:5d:3e:47:d0:02:36:4b:ea:c4:e2:05:74:43:ad:2d:83:21:55:02] modulus: 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 public exponent: 10001 ] 2022-01-15 05:16:17.833  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-01-15 05:16:17.835 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-01-15 05:16:17.836 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-15 05:16:17.836 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-15 05:16:17.837  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-15 05:16:17.837  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-01-15 05:16:17.838  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-01-15 05:16:17.838 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-01-15 05:16:17.838 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-01-15 05:16:17.838 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-01-15 05:16:17.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-01-15 05:16:17.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-15 05:16:17.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-15 05:16:17.844 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-15 05:16:17.982  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-01-15 05:16:18.010  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-01-15 05:16:18.010 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-01-15 05:16:18.010 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-15 05:16:18.011  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-01-15 05:16:18.012  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-01-15 05:16:18.012 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 05:16:18.012 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 05:16:18.013 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 05:16:18.013 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 05:16:18.013 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 05:16:18.014 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 05:16:18.014 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 05:16:18.015 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 05:16:18.015 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 05:16:18.015 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-15 05:16:18.018 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203487876945264968802104854975824454210455655535 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 15 02:52:07 UTC 2022 Final Date: Thu Jan 15 02:52:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:06:33:81:3f:35:07:07:48:d9:c3:77:55:48:fd:d9:26:49:7a:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7d47adf9ebf3bd9a90e172e8d85b0650b8ac976e f2c68fbbe066b9cb6fa4604d818e43d86c7b6d05 231c9e582f1132bd9f124431db95297a5a888771 7401f6b350e47d72bfa718550a4cfd1549759cd1 2ec75373e797434c7b82c87872648c4e42f09d20 9fba2949bffe587ca2bb60561ed77707c53e5b8b b9987f092ccd11686b93e69ddf93b1265309126c 4295f4a2838530c7e1befe12d9ba877e039b0add f949dcecde54a8a5db487edf46dea79ddde65b9d ce2769d20559cf2362742e12e3d997a5cd3f7782 5fd28cebfca5e1f915d63e69e2ff4399a18ef053 bf9dca13b127f5e7b21ae0109e054722784e366c 8da01d09a9733df1b05152a59b1bb358a3638848 890e40bf8ebefed03f4f4e3d89e28572bbe84d2c ca37d08ef432d6fe9293998a78e59622289d4b21 5f92f990c773be03222c6d6a1be3420f317d1558 ef1f7efab0e75df37f41858e4401f8502aa693a4 db3fd2f58885a0b2f70c918c3c19c75eeaab0961 96e4ac8cfd357de2dd97a1049859620e3d1522f2 ace2023c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e6:ee:ce:ca:38:ce:c8:8b:4b:1d:d5:ea:de:a0:ba:b8:33:ba:55:0b] modulus: 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 public exponent: 10001 ] 2022-01-15 05:20:22.130  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-01-15 05:20:22.131 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-01-15 05:20:22.132 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-15 05:20:22.133 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-15 05:20:22.133  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-15 05:20:22.134  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-01-15 05:20:22.134  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-01-15 05:20:22.134 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-01-15 05:20:22.135 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-01-15 05:20:22.135 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-01-15 05:20:22.139 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-01-15 05:20:22.139 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-15 05:20:22.140 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-15 05:20:22.140 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-15 05:20:22.221  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-01-15 05:20:22.221  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-01-15 05:20:22.221 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-01-15 05:20:22.222 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-15 05:20:22.223  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-01-15 05:20:22.224  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-01-15 05:20:22.224 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 05:20:22.224 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 05:20:22.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 05:20:22.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 05:20:22.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 05:20:22.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 05:20:22.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-15 05:20:22.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-15 05:20:22.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-15 05:20:22.228 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-15 05:20:22.231 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203487876945264968802104854975824454210455655535 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 15 02:52:07 UTC 2022 Final Date: Thu Jan 15 02:52:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:06:33:81:3f:35:07:07:48:d9:c3:77:55:48:fd:d9:26:49:7a:36] modulus: 8ccd8178543047b4a89216de0fc9a7211ddc39eebdca65b435ee8875fbf869e2d97ede94e2e562a1e30bede28454ea90b549ebabd8d107c430bef8247729212395d5dadc3f9f0e54cc994daf21519681125b5d77389c3b9dc9c2bd289b8846decf653787a069a177be317e0c5c07d7d43eba15677c237ab46c9f0f892f9a1e342a59d53a9ece20d65713a90f36f5dabe8dafe6336e0af05cb7a7e108d0a7675553d23e10ff20ae7ff43867bcbaa0572af6a57537300602a2ffd319c032b4bc207e98c0d4f90adaeae022aa6aa8f60f109003e6464c3600dcc7d865b1bf742c3cb0c822783cea1fadd71c0729b67b945163ddaf7ae604c0750376cc196689e97aa162c8379545d0addb67bea57897d807624b2ad27042b3c83d00b2007127b2b411006bc4a9f9631193b7cd32f17d85a50d0d0823b545a18b1b16f3f3bec6ccd3d89539ff586a52aec7f0cdfd44c416617bd172e593ff32aa5afc4fcb480b7d1e89e26dbf01e441ca26341f4002e38c042f628995e30c27754411ae85fc43c531 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7d47adf9ebf3bd9a90e172e8d85b0650b8ac976e f2c68fbbe066b9cb6fa4604d818e43d86c7b6d05 231c9e582f1132bd9f124431db95297a5a888771 7401f6b350e47d72bfa718550a4cfd1549759cd1 2ec75373e797434c7b82c87872648c4e42f09d20 9fba2949bffe587ca2bb60561ed77707c53e5b8b b9987f092ccd11686b93e69ddf93b1265309126c 4295f4a2838530c7e1befe12d9ba877e039b0add f949dcecde54a8a5db487edf46dea79ddde65b9d ce2769d20559cf2362742e12e3d997a5cd3f7782 5fd28cebfca5e1f915d63e69e2ff4399a18ef053 bf9dca13b127f5e7b21ae0109e054722784e366c 8da01d09a9733df1b05152a59b1bb358a3638848 890e40bf8ebefed03f4f4e3d89e28572bbe84d2c ca37d08ef432d6fe9293998a78e59622289d4b21 5f92f990c773be03222c6d6a1be3420f317d1558 ef1f7efab0e75df37f41858e4401f8502aa693a4 db3fd2f58885a0b2f70c918c3c19c75eeaab0961 96e4ac8cfd357de2dd97a1049859620e3d1522f2 ace2023c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [88:5f:25:3b:c9:cb:dc:0d:73:49:50:8f:cf:83:4e:ff:ed:e1:4f:9a] modulus: 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 public exponent: 10001 ]