By type
2021-10-10 01:45:05,401 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-10-10 01:45:09,703 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-10-10 01:45:12.798 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-10-10 01:45:27.092 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-10-10 01:45:28.394 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-10-10 01:45:29.003 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-10-10 01:45:41.592 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 38.595 seconds (JVM running for 46.657) 2021-10-10 01:46:22.997 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-10 01:46:23.089 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-10 01:46:23.203 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-10 01:46:23.206 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-10 01:46:23.297 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-10 01:46:23.300 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-10 01:46:23.301 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-10 01:46:23.389 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-10 01:46:23.390 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 01:46:23.393 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-10 01:46:23.398 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-10 01:46:23.401 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-10 01:46:23.597 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-10 01:46:23.601 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 01:46:23.601 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 01:46:23.604 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-10 01:46:24.999 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-10 01:46:25.002 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-10 01:46:25.003 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-10 01:46:25.086 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-10 01:46:25.099 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-10 01:46:25.100 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-10 01:46:25.101 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 01:46:25.102 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 01:46:25.102 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 01:46:25.195 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 01:46:25.196 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 01:46:25.197 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 01:46:25.204 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 01:46:25.286 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 01:46:25.287 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 01:46:25.290 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-10 01:46:25.495 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 520269055619073188917422170167108002635187022590 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 10 01:41:38 UTC 2021 Final Date: Fri Oct 10 01:41:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:4c:ee:ae:a6:b5:83:bd:b4:de:42:0e:84:4f:5c:19:b6:ae:86:67] modulus: abc76517afa7dd2b1df1a671680864e9da4f5e4926fefa71da85a784ee804b8d046869a3b8213f1361e2876317a10b67ba2a6129f6fe7ba2a0c612312084f2568fb42622064d0a7c1bc1ab59a0331b72a005e1e44aadb1e518485cab9a8b254edf0d88ab391e678b74615b093e4400f32a490e4d5b264d6d2923d6391cfeb7fa332815402f6213af368f2785b9836dbe2aaa6f6b5f4ae407d74d2587209a3e158c4c8816c903300dacdb9dfaf9c54341a11243b210908447d895d9ea6c9f8e8fd4c597435a39e220b8447dd88491af274b599ffba20bbaadfcfe833108580cff1a3ef4e31d77e79c353128bc09afa984fa247f18cefe9131f835f1db5ed29315281af0019c87ce699e8ee89ef4021aa1047309a2c0dc0dea9c9b8d8f315eeff45ac83af6f1d7e46bb26865fc2a87d604b208777f188edbcec166e3a94fbef2e03721b38cf8bc43e7cdb1f8dcf88b78d8627a1fa68777d26407d4d1a2974e59a4c10387bfb88bd3ff0f58887b80411eeaf499313ab4937cfeb9d29f8df7371b41 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 013a7c002c7a59d8310533ff0006a11e224ba0c9 d7c3f3ed0979130f97f8ef1ddd13fb958e3f0fe4 7c5f3db4d64f7e2d01af6de68bbffefb8bda1e58 640fab135c161ec1d930b0c5c7c17fbdcb8b80a3 d4117cc644fb0674f90679fa51511678ca1e7d10 6e23022a808d996c67cb0965d693e9d2fe13ca30 81e73a302291e4124fb9bd69497d8da5d7f639f7 9938bd03f659f57d22b617ce5762fa09fe3cd180 696139e233b1d7e67dae33191122f3aa4c48d7a7 28ea6a2baf9dcab7552e53b5f80fdca6eaed19c8 35e453a01e46f3e026c5a73ab0b5321c97c1957f 847a748498c54109c753650a068212616f6d7d48 0918c8a8a8ea92f0ce98956b4c799bcf1c061b82 db39a5c4c5fa37d70484a5d4f6dbbf2f0f6d0194 4197a1e11c530594851008eb6459c1f56acdd8ef 07ab1a892de73e0c6b65a652d9d4165df359b229 5b8840813248914eabd9f1a30a1f6a134ce0d407 7c11af8f2a1d78cc11803da39bf286998e3887c1 81d1ca0482c1c3e37c81317a9fd0f3cc73ae9482 73e0f0a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0c:1b:15:55:54:b4:f8:1e:ce:56:06:6a:91:38:ed:43:1d:c5:d6:9d] modulus: dd02cdbc4aceb202420b06edd23c83c0da49c85893430851b2403d67aa165e8b1d50e586b83790327c25df62370e7636fa86d9542b08245fb43b97f857112b0075d102477707cfe8243b731d536eb794cbde218c2debebce9e86ae1ca039ddedea09aad13299084cdc531363860edd1d373b34a5ccad1b71465b24f8566284e759b4570e99d7b7a1c6f05564c107e91d02ca440f1ebcd9402e1d6d66520a5209a55f24025b805a560dd2a4f2395662d0fb4f419055396ad6431f82ed1e0085328e468ca0f0d9e7e8b97ef72975218134a48e38edc57932f09b5c34e2dbba3b81456a5ac3c5a34f916854da793251f659675796c64195219522f3ee79b9fa2b2d public exponent: 10001 ] 2021-10-10 04:52:24.374 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-10 04:52:24.377 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-10 04:52:24.380 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-10 04:52:24.388 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-10 04:52:24.389 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-10 04:52:24.390 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-10 04:52:24.391 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-10 04:52:24.392 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-10 04:52:24.392 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-10 04:52:24.393 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-10 04:52:24.405 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-10 04:52:24.406 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 04:52:24.407 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 04:52:24.407 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-10 04:52:24.687 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-10 04:52:24.687 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-10 04:52:24.688 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-10 04:52:24.688 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-10 04:52:24.691 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-10 04:52:24.691 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-10 04:52:24.692 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:52:24.692 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:52:24.692 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:52:24.694 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:52:24.694 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:52:24.694 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:52:24.695 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:52:24.695 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:52:24.696 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:52:24.697 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-10 04:52:24.701 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 520269055619073188917422170167108002635187022590 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 10 01:41:38 UTC 2021 Final Date: Fri Oct 10 01:41:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:4c:ee:ae:a6:b5:83:bd:b4:de:42:0e:84:4f:5c:19:b6:ae:86:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 013a7c002c7a59d8310533ff0006a11e224ba0c9 d7c3f3ed0979130f97f8ef1ddd13fb958e3f0fe4 7c5f3db4d64f7e2d01af6de68bbffefb8bda1e58 640fab135c161ec1d930b0c5c7c17fbdcb8b80a3 d4117cc644fb0674f90679fa51511678ca1e7d10 6e23022a808d996c67cb0965d693e9d2fe13ca30 81e73a302291e4124fb9bd69497d8da5d7f639f7 9938bd03f659f57d22b617ce5762fa09fe3cd180 696139e233b1d7e67dae33191122f3aa4c48d7a7 28ea6a2baf9dcab7552e53b5f80fdca6eaed19c8 35e453a01e46f3e026c5a73ab0b5321c97c1957f 847a748498c54109c753650a068212616f6d7d48 0918c8a8a8ea92f0ce98956b4c799bcf1c061b82 db39a5c4c5fa37d70484a5d4f6dbbf2f0f6d0194 4197a1e11c530594851008eb6459c1f56acdd8ef 07ab1a892de73e0c6b65a652d9d4165df359b229 5b8840813248914eabd9f1a30a1f6a134ce0d407 7c11af8f2a1d78cc11803da39bf286998e3887c1 81d1ca0482c1c3e37c81317a9fd0f3cc73ae9482 73e0f0a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:ef:4b:17:3f:5f:93:13:8d:a2:28:f5:1a:ea:b6:7b:80:74:9f:1c] modulus: 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 public exponent: 10001 ] 2021-10-10 04:54:18.052 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-10 04:54:18.054 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-10 04:54:18.056 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-10 04:54:18.057 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-10 04:54:18.058 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-10 04:54:18.059 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-10 04:54:18.059 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-10 04:54:18.060 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-10 04:54:18.060 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-10 04:54:18.061 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-10 04:54:18.094 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-10 04:54:18.095 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 04:54:18.096 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 04:54:18.096 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-10 04:54:18.196 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-10 04:54:18.196 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-10 04:54:18.197 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-10 04:54:18.197 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-10 04:54:18.200 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-10 04:54:18.200 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-10 04:54:18.200 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:54:18.201 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:54:18.201 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:54:18.201 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:54:18.202 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:54:18.202 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:54:18.202 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:54:18.203 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:54:18.203 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:54:18.204 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-10 04:54:18.207 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 520269055619073188917422170167108002635187022590 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 10 01:41:38 UTC 2021 Final Date: Fri Oct 10 01:41:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:4c:ee:ae:a6:b5:83:bd:b4:de:42:0e:84:4f:5c:19:b6:ae:86:67] modulus: abc76517afa7dd2b1df1a671680864e9da4f5e4926fefa71da85a784ee804b8d046869a3b8213f1361e2876317a10b67ba2a6129f6fe7ba2a0c612312084f2568fb42622064d0a7c1bc1ab59a0331b72a005e1e44aadb1e518485cab9a8b254edf0d88ab391e678b74615b093e4400f32a490e4d5b264d6d2923d6391cfeb7fa332815402f6213af368f2785b9836dbe2aaa6f6b5f4ae407d74d2587209a3e158c4c8816c903300dacdb9dfaf9c54341a11243b210908447d895d9ea6c9f8e8fd4c597435a39e220b8447dd88491af274b599ffba20bbaadfcfe833108580cff1a3ef4e31d77e79c353128bc09afa984fa247f18cefe9131f835f1db5ed29315281af0019c87ce699e8ee89ef4021aa1047309a2c0dc0dea9c9b8d8f315eeff45ac83af6f1d7e46bb26865fc2a87d604b208777f188edbcec166e3a94fbef2e03721b38cf8bc43e7cdb1f8dcf88b78d8627a1fa68777d26407d4d1a2974e59a4c10387bfb88bd3ff0f58887b80411eeaf499313ab4937cfeb9d29f8df7371b41 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 013a7c002c7a59d8310533ff0006a11e224ba0c9 d7c3f3ed0979130f97f8ef1ddd13fb958e3f0fe4 7c5f3db4d64f7e2d01af6de68bbffefb8bda1e58 640fab135c161ec1d930b0c5c7c17fbdcb8b80a3 d4117cc644fb0674f90679fa51511678ca1e7d10 6e23022a808d996c67cb0965d693e9d2fe13ca30 81e73a302291e4124fb9bd69497d8da5d7f639f7 9938bd03f659f57d22b617ce5762fa09fe3cd180 696139e233b1d7e67dae33191122f3aa4c48d7a7 28ea6a2baf9dcab7552e53b5f80fdca6eaed19c8 35e453a01e46f3e026c5a73ab0b5321c97c1957f 847a748498c54109c753650a068212616f6d7d48 0918c8a8a8ea92f0ce98956b4c799bcf1c061b82 db39a5c4c5fa37d70484a5d4f6dbbf2f0f6d0194 4197a1e11c530594851008eb6459c1f56acdd8ef 07ab1a892de73e0c6b65a652d9d4165df359b229 5b8840813248914eabd9f1a30a1f6a134ce0d407 7c11af8f2a1d78cc11803da39bf286998e3887c1 81d1ca0482c1c3e37c81317a9fd0f3cc73ae9482 73e0f0a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9a:24:68:17:7b:3f:65:ce:6f:bb:d9:3e:9c:bb:7e:da:28:48:63:38] modulus: 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 public exponent: 10001 ] 2021-10-10 04:57:14.160 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-10 04:57:14.162 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-10 04:57:14.163 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-10 04:57:14.164 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-10 04:57:14.187 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-10 04:57:14.189 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-10 04:57:14.189 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-10 04:57:14.190 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-10 04:57:14.191 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-10 04:57:14.192 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-10 04:57:14.200 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-10 04:57:14.201 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 04:57:14.202 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 04:57:14.202 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-10 04:57:14.384 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-10 04:57:14.386 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-10 04:57:14.387 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-10 04:57:14.387 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-10 04:57:14.389 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-10 04:57:14.390 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-10 04:57:14.391 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:57:14.391 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:57:14.392 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:57:14.393 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:57:14.394 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:57:14.394 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:57:14.395 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:57:14.396 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:57:14.396 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:57:14.398 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-10 04:57:14.402 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 520269055619073188917422170167108002635187022590 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 10 01:41:38 UTC 2021 Final Date: Fri Oct 10 01:41:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:4c:ee:ae:a6:b5:83:bd:b4:de:42:0e:84:4f:5c:19:b6:ae:86:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 013a7c002c7a59d8310533ff0006a11e224ba0c9 d7c3f3ed0979130f97f8ef1ddd13fb958e3f0fe4 7c5f3db4d64f7e2d01af6de68bbffefb8bda1e58 640fab135c161ec1d930b0c5c7c17fbdcb8b80a3 d4117cc644fb0674f90679fa51511678ca1e7d10 6e23022a808d996c67cb0965d693e9d2fe13ca30 81e73a302291e4124fb9bd69497d8da5d7f639f7 9938bd03f659f57d22b617ce5762fa09fe3cd180 696139e233b1d7e67dae33191122f3aa4c48d7a7 28ea6a2baf9dcab7552e53b5f80fdca6eaed19c8 35e453a01e46f3e026c5a73ab0b5321c97c1957f 847a748498c54109c753650a068212616f6d7d48 0918c8a8a8ea92f0ce98956b4c799bcf1c061b82 db39a5c4c5fa37d70484a5d4f6dbbf2f0f6d0194 4197a1e11c530594851008eb6459c1f56acdd8ef 07ab1a892de73e0c6b65a652d9d4165df359b229 5b8840813248914eabd9f1a30a1f6a134ce0d407 7c11af8f2a1d78cc11803da39bf286998e3887c1 81d1ca0482c1c3e37c81317a9fd0f3cc73ae9482 73e0f0a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c8:e4:24:42:54:00:fa:a8:30:b0:4b:9f:ff:84:98:11:e6:83:63:05] modulus: bd2a9eba9f7c7f747623a7c237111f1e3bd326c12adbf9b894dddaa7163a9e9035de19d5d001c47427faa1a5dbce2792273a61aa2c3b28e137ac36b675a6a44806bcc62adbeb36cc659f02b9c5b0552668b67621a111703143413547eb27fec47140f3d4dc03557dfe091bb7181c5aaaf1c63fea2c0d5320d252c3dbce3bb35f08be629945768b8c42267dad10af865677437404fb698ab46962ab7d1b1f771e9a73d0a183af7ae0103024bc2c5b3f844f206a4ba6dd001b87722b5404e77009f9a32361a90bb2dce21fdedd20423cb80c584b745efbf11f2316d9200da259145b59ef2fa3f269af702474e2acb3f7cf3a392a9676475d2cd35fa53617af1671 public exponent: 10001 ] 2021-10-10 04:57:28.919 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-10 04:57:28.921 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-10 04:57:28.923 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-10 04:57:28.924 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-10 04:57:28.925 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-10 04:57:28.925 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-10 04:57:28.926 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-10 04:57:28.926 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-10 04:57:28.927 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-10 04:57:28.927 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-10 04:57:28.990 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-10 04:57:28.991 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 04:57:28.991 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 04:57:28.991 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-10 04:57:29.098 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-10 04:57:29.099 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-10 04:57:29.100 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-10 04:57:29.100 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-10 04:57:29.103 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-10 04:57:29.103 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-10 04:57:29.103 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:57:29.104 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:57:29.104 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:57:29.105 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:57:29.106 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:57:29.106 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:57:29.107 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:57:29.107 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:57:29.108 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:57:29.108 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-10 04:57:29.112 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 520269055619073188917422170167108002635187022590 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 10 01:41:38 UTC 2021 Final Date: Fri Oct 10 01:41:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:4c:ee:ae:a6:b5:83:bd:b4:de:42:0e:84:4f:5c:19:b6:ae:86:67] modulus: abc76517afa7dd2b1df1a671680864e9da4f5e4926fefa71da85a784ee804b8d046869a3b8213f1361e2876317a10b67ba2a6129f6fe7ba2a0c612312084f2568fb42622064d0a7c1bc1ab59a0331b72a005e1e44aadb1e518485cab9a8b254edf0d88ab391e678b74615b093e4400f32a490e4d5b264d6d2923d6391cfeb7fa332815402f6213af368f2785b9836dbe2aaa6f6b5f4ae407d74d2587209a3e158c4c8816c903300dacdb9dfaf9c54341a11243b210908447d895d9ea6c9f8e8fd4c597435a39e220b8447dd88491af274b599ffba20bbaadfcfe833108580cff1a3ef4e31d77e79c353128bc09afa984fa247f18cefe9131f835f1db5ed29315281af0019c87ce699e8ee89ef4021aa1047309a2c0dc0dea9c9b8d8f315eeff45ac83af6f1d7e46bb26865fc2a87d604b208777f188edbcec166e3a94fbef2e03721b38cf8bc43e7cdb1f8dcf88b78d8627a1fa68777d26407d4d1a2974e59a4c10387bfb88bd3ff0f58887b80411eeaf499313ab4937cfeb9d29f8df7371b41 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 013a7c002c7a59d8310533ff0006a11e224ba0c9 d7c3f3ed0979130f97f8ef1ddd13fb958e3f0fe4 7c5f3db4d64f7e2d01af6de68bbffefb8bda1e58 640fab135c161ec1d930b0c5c7c17fbdcb8b80a3 d4117cc644fb0674f90679fa51511678ca1e7d10 6e23022a808d996c67cb0965d693e9d2fe13ca30 81e73a302291e4124fb9bd69497d8da5d7f639f7 9938bd03f659f57d22b617ce5762fa09fe3cd180 696139e233b1d7e67dae33191122f3aa4c48d7a7 28ea6a2baf9dcab7552e53b5f80fdca6eaed19c8 35e453a01e46f3e026c5a73ab0b5321c97c1957f 847a748498c54109c753650a068212616f6d7d48 0918c8a8a8ea92f0ce98956b4c799bcf1c061b82 db39a5c4c5fa37d70484a5d4f6dbbf2f0f6d0194 4197a1e11c530594851008eb6459c1f56acdd8ef 07ab1a892de73e0c6b65a652d9d4165df359b229 5b8840813248914eabd9f1a30a1f6a134ce0d407 7c11af8f2a1d78cc11803da39bf286998e3887c1 81d1ca0482c1c3e37c81317a9fd0f3cc73ae9482 73e0f0a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e5:5b:58:5c:d0:b3:0e:3a:d9:a7:92:ce:59:dc:73:da:4b:e5:69:3e] modulus: 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 public exponent: 10001 ] 2021-10-10 04:57:45.705 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-10 04:57:45.706 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-10 04:57:45.708 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-10 04:57:45.709 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-10 04:57:45.709 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-10 04:57:45.710 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-10 04:57:45.711 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-10 04:57:45.711 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-10 04:57:45.712 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-10 04:57:45.712 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-10 04:57:45.717 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-10 04:57:45.717 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 04:57:45.717 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 04:57:45.718 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-10 04:57:45.870 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-10 04:57:45.871 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-10 04:57:45.871 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-10 04:57:45.872 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-10 04:57:45.890 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-10 04:57:45.891 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-10 04:57:45.891 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:57:45.891 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:57:45.892 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:57:45.892 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:57:45.893 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:57:45.893 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:57:45.894 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:57:45.894 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:57:45.894 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:57:45.895 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-10 04:57:45.898 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 520269055619073188917422170167108002635187022590 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 10 01:41:38 UTC 2021 Final Date: Fri Oct 10 01:41:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:4c:ee:ae:a6:b5:83:bd:b4:de:42:0e:84:4f:5c:19:b6:ae:86:67] modulus: abc76517afa7dd2b1df1a671680864e9da4f5e4926fefa71da85a784ee804b8d046869a3b8213f1361e2876317a10b67ba2a6129f6fe7ba2a0c612312084f2568fb42622064d0a7c1bc1ab59a0331b72a005e1e44aadb1e518485cab9a8b254edf0d88ab391e678b74615b093e4400f32a490e4d5b264d6d2923d6391cfeb7fa332815402f6213af368f2785b9836dbe2aaa6f6b5f4ae407d74d2587209a3e158c4c8816c903300dacdb9dfaf9c54341a11243b210908447d895d9ea6c9f8e8fd4c597435a39e220b8447dd88491af274b599ffba20bbaadfcfe833108580cff1a3ef4e31d77e79c353128bc09afa984fa247f18cefe9131f835f1db5ed29315281af0019c87ce699e8ee89ef4021aa1047309a2c0dc0dea9c9b8d8f315eeff45ac83af6f1d7e46bb26865fc2a87d604b208777f188edbcec166e3a94fbef2e03721b38cf8bc43e7cdb1f8dcf88b78d8627a1fa68777d26407d4d1a2974e59a4c10387bfb88bd3ff0f58887b80411eeaf499313ab4937cfeb9d29f8df7371b41 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 013a7c002c7a59d8310533ff0006a11e224ba0c9 d7c3f3ed0979130f97f8ef1ddd13fb958e3f0fe4 7c5f3db4d64f7e2d01af6de68bbffefb8bda1e58 640fab135c161ec1d930b0c5c7c17fbdcb8b80a3 d4117cc644fb0674f90679fa51511678ca1e7d10 6e23022a808d996c67cb0965d693e9d2fe13ca30 81e73a302291e4124fb9bd69497d8da5d7f639f7 9938bd03f659f57d22b617ce5762fa09fe3cd180 696139e233b1d7e67dae33191122f3aa4c48d7a7 28ea6a2baf9dcab7552e53b5f80fdca6eaed19c8 35e453a01e46f3e026c5a73ab0b5321c97c1957f 847a748498c54109c753650a068212616f6d7d48 0918c8a8a8ea92f0ce98956b4c799bcf1c061b82 db39a5c4c5fa37d70484a5d4f6dbbf2f0f6d0194 4197a1e11c530594851008eb6459c1f56acdd8ef 07ab1a892de73e0c6b65a652d9d4165df359b229 5b8840813248914eabd9f1a30a1f6a134ce0d407 7c11af8f2a1d78cc11803da39bf286998e3887c1 81d1ca0482c1c3e37c81317a9fd0f3cc73ae9482 73e0f0a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:03:4f:8b:18:60:54:c1:a8:08:25:be:c8:7e:cb:0b:c3:4c:88:83] modulus: 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 public exponent: 10001 ] 2021-10-10 04:58:20.757 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-10 04:58:20.759 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-10 04:58:20.760 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-10 04:58:20.761 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-10 04:58:20.762 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-10 04:58:20.762 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-10 04:58:20.762 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-10 04:58:20.763 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-10 04:58:20.763 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-10 04:58:20.764 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-10 04:58:20.769 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-10 04:58:20.787 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 04:58:20.787 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 04:58:20.787 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-10 04:58:20.898 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-10 04:58:20.898 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-10 04:58:20.899 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-10 04:58:20.899 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-10 04:58:20.901 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-10 04:58:20.901 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-10 04:58:20.902 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:58:20.902 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:58:20.902 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:58:20.903 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:58:20.903 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:58:20.904 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:58:20.904 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:58:20.905 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:58:20.905 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:58:20.906 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-10 04:58:20.909 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 520269055619073188917422170167108002635187022590 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 10 01:41:38 UTC 2021 Final Date: Fri Oct 10 01:41:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:4c:ee:ae:a6:b5:83:bd:b4:de:42:0e:84:4f:5c:19:b6:ae:86:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 013a7c002c7a59d8310533ff0006a11e224ba0c9 d7c3f3ed0979130f97f8ef1ddd13fb958e3f0fe4 7c5f3db4d64f7e2d01af6de68bbffefb8bda1e58 640fab135c161ec1d930b0c5c7c17fbdcb8b80a3 d4117cc644fb0674f90679fa51511678ca1e7d10 6e23022a808d996c67cb0965d693e9d2fe13ca30 81e73a302291e4124fb9bd69497d8da5d7f639f7 9938bd03f659f57d22b617ce5762fa09fe3cd180 696139e233b1d7e67dae33191122f3aa4c48d7a7 28ea6a2baf9dcab7552e53b5f80fdca6eaed19c8 35e453a01e46f3e026c5a73ab0b5321c97c1957f 847a748498c54109c753650a068212616f6d7d48 0918c8a8a8ea92f0ce98956b4c799bcf1c061b82 db39a5c4c5fa37d70484a5d4f6dbbf2f0f6d0194 4197a1e11c530594851008eb6459c1f56acdd8ef 07ab1a892de73e0c6b65a652d9d4165df359b229 5b8840813248914eabd9f1a30a1f6a134ce0d407 7c11af8f2a1d78cc11803da39bf286998e3887c1 81d1ca0482c1c3e37c81317a9fd0f3cc73ae9482 73e0f0a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:2b:8b:9f:92:4c:56:59:92:8e:aa:91:f1:b6:5c:58:dc:cd:80:f3] modulus: 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 public exponent: 10001 ] 2021-10-10 04:59:41.875 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-10 04:59:41.876 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-10 04:59:41.888 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-10 04:59:41.889 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-10 04:59:41.889 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-10 04:59:41.890 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-10 04:59:41.890 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-10 04:59:41.890 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-10 04:59:41.891 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-10 04:59:41.891 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-10 04:59:41.898 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-10 04:59:41.898 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 04:59:41.899 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 04:59:41.899 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-10 04:59:42.001 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-10 04:59:42.002 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-10 04:59:42.003 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-10 04:59:42.003 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-10 04:59:42.005 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-10 04:59:42.005 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-10 04:59:42.005 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:59:42.006 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:59:42.006 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:59:42.007 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:59:42.007 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:59:42.008 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:59:42.009 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 04:59:42.009 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 04:59:42.010 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 04:59:42.011 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-10 04:59:42.015 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 520269055619073188917422170167108002635187022590 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 10 01:41:38 UTC 2021 Final Date: Fri Oct 10 01:41:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:4c:ee:ae:a6:b5:83:bd:b4:de:42:0e:84:4f:5c:19:b6:ae:86:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 013a7c002c7a59d8310533ff0006a11e224ba0c9 d7c3f3ed0979130f97f8ef1ddd13fb958e3f0fe4 7c5f3db4d64f7e2d01af6de68bbffefb8bda1e58 640fab135c161ec1d930b0c5c7c17fbdcb8b80a3 d4117cc644fb0674f90679fa51511678ca1e7d10 6e23022a808d996c67cb0965d693e9d2fe13ca30 81e73a302291e4124fb9bd69497d8da5d7f639f7 9938bd03f659f57d22b617ce5762fa09fe3cd180 696139e233b1d7e67dae33191122f3aa4c48d7a7 28ea6a2baf9dcab7552e53b5f80fdca6eaed19c8 35e453a01e46f3e026c5a73ab0b5321c97c1957f 847a748498c54109c753650a068212616f6d7d48 0918c8a8a8ea92f0ce98956b4c799bcf1c061b82 db39a5c4c5fa37d70484a5d4f6dbbf2f0f6d0194 4197a1e11c530594851008eb6459c1f56acdd8ef 07ab1a892de73e0c6b65a652d9d4165df359b229 5b8840813248914eabd9f1a30a1f6a134ce0d407 7c11af8f2a1d78cc11803da39bf286998e3887c1 81d1ca0482c1c3e37c81317a9fd0f3cc73ae9482 73e0f0a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cc:cf:f0:d6:2a:f7:5f:95:24:dd:f3:bc:27:61:1e:3b:08:40:fa:16] modulus: e50f0af935e8dbaba759bc32cdcd546ea29c586a54dacdc5dd35786b5825abb9aed00b7cc198bd41206086125b1e2d6dcc4a76e35129fc99cd5e0e6bd9e5624bf0f9aa13213628ff9f071617d1b6986760e612b59ee34edebf9dbee04a195fb84dbbccae2122526e10fc0c42705eb1bcb6f309e0aad197b98efb83b9948cfbf9acaeaf4ef421f31c78a53dcc51044ca457ba83748709f02866d67195d18ec839a6f93b6c5b74b14253c77d07d5348a1910daef8b7abc162c11d6dc521fdfaacdb9b1646ec5c5caf55ddc46f03440d1b9caca73d6bcefc0c2708ddfbb300858a0398637f839945fd1514d2756a90eb8384b24d765c21043c4f8e799b1530a2321 public exponent: 10001 ] 2021-10-10 05:00:25.396 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-10 05:00:25.397 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-10 05:00:25.398 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-10 05:00:25.399 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-10 05:00:25.399 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-10 05:00:25.400 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-10 05:00:25.400 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-10 05:00:25.400 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-10 05:00:25.401 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-10 05:00:25.401 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-10 05:00:25.406 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-10 05:00:25.407 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 05:00:25.407 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-10 05:00:25.408 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-10 05:00:25.502 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-10 05:00:25.504 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-10 05:00:25.504 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-10 05:00:25.504 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-10 05:00:25.506 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-10 05:00:25.507 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-10 05:00:25.507 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 05:00:25.507 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 05:00:25.508 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 05:00:25.508 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 05:00:25.508 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 05:00:25.509 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 05:00:25.510 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-10 05:00:25.510 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-10 05:00:25.510 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-10 05:00:25.511 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-10 05:00:25.514 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 520269055619073188917422170167108002635187022590 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Oct 10 01:41:38 UTC 2021 Final Date: Fri Oct 10 01:41:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:4c:ee:ae:a6:b5:83:bd:b4:de:42:0e:84:4f:5c:19:b6:ae:86:67] modulus: abc76517afa7dd2b1df1a671680864e9da4f5e4926fefa71da85a784ee804b8d046869a3b8213f1361e2876317a10b67ba2a6129f6fe7ba2a0c612312084f2568fb42622064d0a7c1bc1ab59a0331b72a005e1e44aadb1e518485cab9a8b254edf0d88ab391e678b74615b093e4400f32a490e4d5b264d6d2923d6391cfeb7fa332815402f6213af368f2785b9836dbe2aaa6f6b5f4ae407d74d2587209a3e158c4c8816c903300dacdb9dfaf9c54341a11243b210908447d895d9ea6c9f8e8fd4c597435a39e220b8447dd88491af274b599ffba20bbaadfcfe833108580cff1a3ef4e31d77e79c353128bc09afa984fa247f18cefe9131f835f1db5ed29315281af0019c87ce699e8ee89ef4021aa1047309a2c0dc0dea9c9b8d8f315eeff45ac83af6f1d7e46bb26865fc2a87d604b208777f188edbcec166e3a94fbef2e03721b38cf8bc43e7cdb1f8dcf88b78d8627a1fa68777d26407d4d1a2974e59a4c10387bfb88bd3ff0f58887b80411eeaf499313ab4937cfeb9d29f8df7371b41 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 013a7c002c7a59d8310533ff0006a11e224ba0c9 d7c3f3ed0979130f97f8ef1ddd13fb958e3f0fe4 7c5f3db4d64f7e2d01af6de68bbffefb8bda1e58 640fab135c161ec1d930b0c5c7c17fbdcb8b80a3 d4117cc644fb0674f90679fa51511678ca1e7d10 6e23022a808d996c67cb0965d693e9d2fe13ca30 81e73a302291e4124fb9bd69497d8da5d7f639f7 9938bd03f659f57d22b617ce5762fa09fe3cd180 696139e233b1d7e67dae33191122f3aa4c48d7a7 28ea6a2baf9dcab7552e53b5f80fdca6eaed19c8 35e453a01e46f3e026c5a73ab0b5321c97c1957f 847a748498c54109c753650a068212616f6d7d48 0918c8a8a8ea92f0ce98956b4c799bcf1c061b82 db39a5c4c5fa37d70484a5d4f6dbbf2f0f6d0194 4197a1e11c530594851008eb6459c1f56acdd8ef 07ab1a892de73e0c6b65a652d9d4165df359b229 5b8840813248914eabd9f1a30a1f6a134ce0d407 7c11af8f2a1d78cc11803da39bf286998e3887c1 81d1ca0482c1c3e37c81317a9fd0f3cc73ae9482 73e0f0a2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1d:ff:e2:c9:28:2b:73:6f:b7:83:25:8e:56:19:84:60:64:ee:ed:8b] modulus: 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 public exponent: 10001 ]