By type
2021-11-13 02:39:09,924 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-13 02:39:13,831 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-13 02:39:16.733 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-11-13 02:39:28.731 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-13 02:39:29.928 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-11-13 02:39:30.522 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-13 02:39:41.723 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 33.788 seconds (JVM running for 39.912) 2021-11-13 02:41:39.318 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-13 02:41:39.327 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-13 02:41:39.515 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-13 02:41:39.519 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 02:41:39.536 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-13 02:41:39.539 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-13 02:41:39.613 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-13 02:41:39.615 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-13 02:41:39.616 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 02:41:39.619 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-13 02:41:39.627 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-13 02:41:39.630 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-13 02:41:39.821 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-13 02:41:39.825 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 02:41:39.826 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 02:41:39.829 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 02:41:41.517 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-13 02:41:41.521 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-13 02:41:41.522 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-13 02:41:41.524 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 02:41:41.535 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-13 02:41:41.536 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-13 02:41:41.538 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 02:41:41.538 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 02:41:41.539 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 02:41:41.623 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 02:41:41.623 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 02:41:41.624 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 02:41:41.715 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 02:41:41.716 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 02:41:41.716 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 02:41:41.718 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 02:41:41.817 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 110456046414244145669829431371583329452402169430 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 02:27:48 UTC 2021 Final Date: Thu Nov 13 02:27:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915 326defc29b0f810cd48787e57e4d01116410de8f d80b7019bd3414844e366bb6774b80a4b1685718 6695bfc24807eed22eddfcd5816ab6bbf308017a 186027b4fc2cc3e5459644bde622c576a47b89a6 e3c48146096b1e87749e4e2307eef25d4e8dc974 310442cb7b153c3b5a03c5fe4f3cde154d27499a 5f7184c89eb2e58e402c3a4b077986cbe975df97 54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44 b3eedd33b67ac3e0fc7eff00e0590cd02502f587 039dd31b396d54c8a078d9cfb24d77ae1e2ddaca 15c53bf815dc0a1dba327346d3127cc629b6e956 8cbb14f5083972d0e7eacf906c7331b19a57d774 b8244c5393b1a34d68159d701ba5afcfede4af4f 97c0d1b12d66e0664a70c098eb2d46b892ddb015 248bea07b09f434a7217a7f4e96661acf860e6f9 1dc7a01601b7e9b7dbdf461e6e0316f103d824f3 c9671633857138fabf5d9b7f0adb04b9f5f5e898 77a253ae990e03c20b3b6bb2b1cf5a28cd617f97 14eeb389 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:d3:0c:7c:3d:11:e9:9d:d3:ff:71:e8:f9:95:59:35:cc:f7:cc:b7] modulus: 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 public exponent: 10001 ] 2021-11-13 04:29:30.102 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-13 04:29:30.104 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-13 04:29:30.114 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-13 04:29:30.115 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 04:29:30.117 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-13 04:29:30.118 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-13 04:29:30.119 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-13 04:29:30.120 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-13 04:29:30.120 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-13 04:29:30.122 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-13 04:29:30.217 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-13 04:29:30.217 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:29:30.218 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:29:30.218 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:29:30.415 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-13 04:29:30.416 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-13 04:29:30.416 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-13 04:29:30.417 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:29:30.420 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-13 04:29:30.421 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-13 04:29:30.421 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:29:30.421 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:29:30.422 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:29:30.513 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:29:30.514 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:29:30.515 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:29:30.517 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:29:30.517 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:29:30.518 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:29:30.613 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 04:29:30.712 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 110456046414244145669829431371583329452402169430 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 02:27:48 UTC 2021 Final Date: Thu Nov 13 02:27:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915 326defc29b0f810cd48787e57e4d01116410de8f d80b7019bd3414844e366bb6774b80a4b1685718 6695bfc24807eed22eddfcd5816ab6bbf308017a 186027b4fc2cc3e5459644bde622c576a47b89a6 e3c48146096b1e87749e4e2307eef25d4e8dc974 310442cb7b153c3b5a03c5fe4f3cde154d27499a 5f7184c89eb2e58e402c3a4b077986cbe975df97 54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44 b3eedd33b67ac3e0fc7eff00e0590cd02502f587 039dd31b396d54c8a078d9cfb24d77ae1e2ddaca 15c53bf815dc0a1dba327346d3127cc629b6e956 8cbb14f5083972d0e7eacf906c7331b19a57d774 b8244c5393b1a34d68159d701ba5afcfede4af4f 97c0d1b12d66e0664a70c098eb2d46b892ddb015 248bea07b09f434a7217a7f4e96661acf860e6f9 1dc7a01601b7e9b7dbdf461e6e0316f103d824f3 c9671633857138fabf5d9b7f0adb04b9f5f5e898 77a253ae990e03c20b3b6bb2b1cf5a28cd617f97 14eeb389 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1f:97:29:83:a9:09:70:6a:e9:21:f2:2e:2f:26:1f:54:21:12:7c:cb] modulus: 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 public exponent: 10001 ] 2021-11-13 04:31:04.304 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-13 04:31:04.306 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-13 04:31:04.307 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-13 04:31:04.308 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 04:31:04.308 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-13 04:31:04.309 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-13 04:31:04.309 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-13 04:31:04.309 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-13 04:31:04.310 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-13 04:31:04.310 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-13 04:31:04.316 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-13 04:31:04.316 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:31:04.317 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:31:04.317 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:31:04.414 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-13 04:31:04.415 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-13 04:31:04.415 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-13 04:31:04.416 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:31:04.417 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-13 04:31:04.418 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-13 04:31:04.418 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:31:04.418 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:31:04.419 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:31:04.419 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:31:04.420 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:31:04.420 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:31:04.421 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:31:04.421 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:31:04.421 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:31:04.422 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 04:31:04.425 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 110456046414244145669829431371583329452402169430 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 02:27:48 UTC 2021 Final Date: Thu Nov 13 02:27:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915 326defc29b0f810cd48787e57e4d01116410de8f d80b7019bd3414844e366bb6774b80a4b1685718 6695bfc24807eed22eddfcd5816ab6bbf308017a 186027b4fc2cc3e5459644bde622c576a47b89a6 e3c48146096b1e87749e4e2307eef25d4e8dc974 310442cb7b153c3b5a03c5fe4f3cde154d27499a 5f7184c89eb2e58e402c3a4b077986cbe975df97 54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44 b3eedd33b67ac3e0fc7eff00e0590cd02502f587 039dd31b396d54c8a078d9cfb24d77ae1e2ddaca 15c53bf815dc0a1dba327346d3127cc629b6e956 8cbb14f5083972d0e7eacf906c7331b19a57d774 b8244c5393b1a34d68159d701ba5afcfede4af4f 97c0d1b12d66e0664a70c098eb2d46b892ddb015 248bea07b09f434a7217a7f4e96661acf860e6f9 1dc7a01601b7e9b7dbdf461e6e0316f103d824f3 c9671633857138fabf5d9b7f0adb04b9f5f5e898 77a253ae990e03c20b3b6bb2b1cf5a28cd617f97 14eeb389 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5e:db:44:8a:b2:b9:13:43:c2:4e:d6:c4:7f:7b:28:bb:b6:a8:90:6d] modulus: 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 public exponent: 10001 ] 2021-11-13 04:34:27.373 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-13 04:34:27.374 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-13 04:34:27.376 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-13 04:34:27.377 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 04:34:27.378 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-13 04:34:27.379 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-13 04:34:27.379 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-13 04:34:27.380 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-13 04:34:27.380 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-13 04:34:27.381 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-13 04:34:27.413 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-13 04:34:27.414 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:34:27.415 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:34:27.415 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:34:27.521 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-13 04:34:27.522 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-13 04:34:27.523 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-13 04:34:27.523 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:34:27.525 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-13 04:34:27.525 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-13 04:34:27.526 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:34:27.526 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:34:27.526 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:34:27.527 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:34:27.528 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:34:27.528 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:34:27.529 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:34:27.529 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:34:27.530 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:34:27.531 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 04:34:27.534 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 110456046414244145669829431371583329452402169430 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 02:27:48 UTC 2021 Final Date: Thu Nov 13 02:27:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915 326defc29b0f810cd48787e57e4d01116410de8f d80b7019bd3414844e366bb6774b80a4b1685718 6695bfc24807eed22eddfcd5816ab6bbf308017a 186027b4fc2cc3e5459644bde622c576a47b89a6 e3c48146096b1e87749e4e2307eef25d4e8dc974 310442cb7b153c3b5a03c5fe4f3cde154d27499a 5f7184c89eb2e58e402c3a4b077986cbe975df97 54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44 b3eedd33b67ac3e0fc7eff00e0590cd02502f587 039dd31b396d54c8a078d9cfb24d77ae1e2ddaca 15c53bf815dc0a1dba327346d3127cc629b6e956 8cbb14f5083972d0e7eacf906c7331b19a57d774 b8244c5393b1a34d68159d701ba5afcfede4af4f 97c0d1b12d66e0664a70c098eb2d46b892ddb015 248bea07b09f434a7217a7f4e96661acf860e6f9 1dc7a01601b7e9b7dbdf461e6e0316f103d824f3 c9671633857138fabf5d9b7f0adb04b9f5f5e898 77a253ae990e03c20b3b6bb2b1cf5a28cd617f97 14eeb389 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:bc:72:ef:54:b8:fd:b9:3c:75:15:7e:7a:ad:28:ad:9e:86:65:8a] modulus: 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 public exponent: 10001 ] 2021-11-13 04:34:27.820 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-13 04:34:27.821 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-13 04:34:27.823 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-13 04:34:27.823 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 04:34:27.824 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-13 04:34:27.825 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-13 04:34:27.825 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-13 04:34:27.826 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-13 04:34:27.826 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-13 04:34:27.827 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-13 04:34:27.835 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-13 04:34:27.836 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:34:27.836 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:34:27.836 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:34:27.907 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-13 04:34:27.908 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-13 04:34:27.908 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-13 04:34:27.908 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:34:27.910 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-13 04:34:27.912 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-13 04:34:27.912 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:34:27.913 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:34:27.913 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:34:27.914 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:34:27.914 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:34:27.915 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:34:27.915 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:34:27.916 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:34:27.916 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:34:27.917 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 04:34:27.920 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 110456046414244145669829431371583329452402169430 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 02:27:48 UTC 2021 Final Date: Thu Nov 13 02:27:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915 326defc29b0f810cd48787e57e4d01116410de8f d80b7019bd3414844e366bb6774b80a4b1685718 6695bfc24807eed22eddfcd5816ab6bbf308017a 186027b4fc2cc3e5459644bde622c576a47b89a6 e3c48146096b1e87749e4e2307eef25d4e8dc974 310442cb7b153c3b5a03c5fe4f3cde154d27499a 5f7184c89eb2e58e402c3a4b077986cbe975df97 54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44 b3eedd33b67ac3e0fc7eff00e0590cd02502f587 039dd31b396d54c8a078d9cfb24d77ae1e2ddaca 15c53bf815dc0a1dba327346d3127cc629b6e956 8cbb14f5083972d0e7eacf906c7331b19a57d774 b8244c5393b1a34d68159d701ba5afcfede4af4f 97c0d1b12d66e0664a70c098eb2d46b892ddb015 248bea07b09f434a7217a7f4e96661acf860e6f9 1dc7a01601b7e9b7dbdf461e6e0316f103d824f3 c9671633857138fabf5d9b7f0adb04b9f5f5e898 77a253ae990e03c20b3b6bb2b1cf5a28cd617f97 14eeb389 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ac:56:0f:7e:ad:c9:8b:23:4f:37:a3:72:31:5b:c1:83:04:ee:88:57] modulus: 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 public exponent: 10001 ] 2021-11-13 04:34:35.275 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-13 04:34:35.276 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-13 04:34:35.277 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-13 04:34:35.278 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 04:34:35.278 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-13 04:34:35.279 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-13 04:34:35.279 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-13 04:34:35.280 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-13 04:34:35.280 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-13 04:34:35.281 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-13 04:34:35.285 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-13 04:34:35.286 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:34:35.286 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:34:35.286 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:34:35.389 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-13 04:34:35.412 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-13 04:34:35.412 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-13 04:34:35.413 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:34:35.414 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-13 04:34:35.414 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-13 04:34:35.415 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:34:35.415 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:34:35.415 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:34:35.416 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:34:35.416 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:34:35.417 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:34:35.417 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:34:35.418 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:34:35.418 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:34:35.419 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 04:34:35.422 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 110456046414244145669829431371583329452402169430 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 02:27:48 UTC 2021 Final Date: Thu Nov 13 02:27:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915 326defc29b0f810cd48787e57e4d01116410de8f d80b7019bd3414844e366bb6774b80a4b1685718 6695bfc24807eed22eddfcd5816ab6bbf308017a 186027b4fc2cc3e5459644bde622c576a47b89a6 e3c48146096b1e87749e4e2307eef25d4e8dc974 310442cb7b153c3b5a03c5fe4f3cde154d27499a 5f7184c89eb2e58e402c3a4b077986cbe975df97 54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44 b3eedd33b67ac3e0fc7eff00e0590cd02502f587 039dd31b396d54c8a078d9cfb24d77ae1e2ddaca 15c53bf815dc0a1dba327346d3127cc629b6e956 8cbb14f5083972d0e7eacf906c7331b19a57d774 b8244c5393b1a34d68159d701ba5afcfede4af4f 97c0d1b12d66e0664a70c098eb2d46b892ddb015 248bea07b09f434a7217a7f4e96661acf860e6f9 1dc7a01601b7e9b7dbdf461e6e0316f103d824f3 c9671633857138fabf5d9b7f0adb04b9f5f5e898 77a253ae990e03c20b3b6bb2b1cf5a28cd617f97 14eeb389 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7f:0f:77:e9:e1:8d:67:69:64:49:7e:a2:a3:29:e1:e7:97:d1:ca:e6] modulus: 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 public exponent: 10001 ] 2021-11-13 04:34:35.798 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-13 04:34:35.799 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-13 04:34:35.800 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-13 04:34:35.801 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 04:34:35.801 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-13 04:34:35.802 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-13 04:34:35.802 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-13 04:34:35.802 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-13 04:34:35.803 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-13 04:34:35.803 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-13 04:34:35.807 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-13 04:34:35.807 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:34:35.808 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:34:35.808 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:34:35.867 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-13 04:34:35.912 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-13 04:34:35.913 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-13 04:34:35.913 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:34:35.914 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-13 04:34:35.915 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-13 04:34:35.915 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:34:35.915 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:34:35.916 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:34:35.916 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:34:35.917 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:34:35.917 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:34:35.918 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:34:35.918 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:34:35.918 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:34:35.919 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 04:34:35.921 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 110456046414244145669829431371583329452402169430 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 02:27:48 UTC 2021 Final Date: Thu Nov 13 02:27:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915 326defc29b0f810cd48787e57e4d01116410de8f d80b7019bd3414844e366bb6774b80a4b1685718 6695bfc24807eed22eddfcd5816ab6bbf308017a 186027b4fc2cc3e5459644bde622c576a47b89a6 e3c48146096b1e87749e4e2307eef25d4e8dc974 310442cb7b153c3b5a03c5fe4f3cde154d27499a 5f7184c89eb2e58e402c3a4b077986cbe975df97 54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44 b3eedd33b67ac3e0fc7eff00e0590cd02502f587 039dd31b396d54c8a078d9cfb24d77ae1e2ddaca 15c53bf815dc0a1dba327346d3127cc629b6e956 8cbb14f5083972d0e7eacf906c7331b19a57d774 b8244c5393b1a34d68159d701ba5afcfede4af4f 97c0d1b12d66e0664a70c098eb2d46b892ddb015 248bea07b09f434a7217a7f4e96661acf860e6f9 1dc7a01601b7e9b7dbdf461e6e0316f103d824f3 c9671633857138fabf5d9b7f0adb04b9f5f5e898 77a253ae990e03c20b3b6bb2b1cf5a28cd617f97 14eeb389 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7f:0f:77:e9:e1:8d:67:69:64:49:7e:a2:a3:29:e1:e7:97:d1:ca:e6] modulus: 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 public exponent: 10001 ] 2021-11-13 04:34:58.987 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-13 04:34:58.988 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-13 04:34:58.989 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-13 04:34:58.989 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 04:34:58.990 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-13 04:34:58.990 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-13 04:34:58.991 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-13 04:34:58.991 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-13 04:34:58.991 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-13 04:34:58.991 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-13 04:34:58.995 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-13 04:34:58.996 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:34:58.996 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:34:58.997 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:34:59.081 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-13 04:34:59.082 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-13 04:34:59.082 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-13 04:34:59.082 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:34:59.083 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-13 04:34:59.083 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-13 04:34:59.084 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:34:59.112 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:34:59.112 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:34:59.113 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:34:59.113 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:34:59.114 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:34:59.114 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:34:59.114 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:34:59.115 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:34:59.116 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 04:34:59.118 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 110456046414244145669829431371583329452402169430 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 02:27:48 UTC 2021 Final Date: Thu Nov 13 02:27:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915 326defc29b0f810cd48787e57e4d01116410de8f d80b7019bd3414844e366bb6774b80a4b1685718 6695bfc24807eed22eddfcd5816ab6bbf308017a 186027b4fc2cc3e5459644bde622c576a47b89a6 e3c48146096b1e87749e4e2307eef25d4e8dc974 310442cb7b153c3b5a03c5fe4f3cde154d27499a 5f7184c89eb2e58e402c3a4b077986cbe975df97 54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44 b3eedd33b67ac3e0fc7eff00e0590cd02502f587 039dd31b396d54c8a078d9cfb24d77ae1e2ddaca 15c53bf815dc0a1dba327346d3127cc629b6e956 8cbb14f5083972d0e7eacf906c7331b19a57d774 b8244c5393b1a34d68159d701ba5afcfede4af4f 97c0d1b12d66e0664a70c098eb2d46b892ddb015 248bea07b09f434a7217a7f4e96661acf860e6f9 1dc7a01601b7e9b7dbdf461e6e0316f103d824f3 c9671633857138fabf5d9b7f0adb04b9f5f5e898 77a253ae990e03c20b3b6bb2b1cf5a28cd617f97 14eeb389 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [15:3a:70:a7:63:02:34:ef:72:21:7a:bd:7a:b7:5e:32:bc:75:4b:49] modulus: b37be376936dd66b4e38efd4d552cf859b737660fa584188bea01f99f23eacf8e5e1b541a4a94356c9b0c9b37620a843d67b5df555872f8c1a1e414b6d5e2b67e7c3c0edc2181db7bd094741d82bb745e01d30e4234967649df3d2afa210b7e95da6bd2258e1abe18bb522af901d6eadae154afc1019d8c63f06ee965ff40c5ea55436aa0ea3e0d5fb88e30d9b7a407b9c0d2d5c1e537b2d061fbc1ea4c096e8037bb131e867dd4531aa1d5cf8b02e3c58c0e15f24f553a178d430dc7733ba9369b6a26bc4dffb36e1e63d921fd82256746552f2a3050fe3f57411f4eae40b94bb966538fb859c5219c0683a5b321e2e79af426edd2ce472d6bfac139a450ed3 public exponent: 10001 ] 2021-11-13 04:35:32.662 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-13 04:35:32.663 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-13 04:35:32.664 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-13 04:35:32.665 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 04:35:32.665 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-13 04:35:32.666 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-13 04:35:32.667 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-13 04:35:32.667 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-13 04:35:32.667 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-13 04:35:32.668 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-13 04:35:32.672 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-13 04:35:32.672 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:35:32.672 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:35:32.673 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:35:32.755 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-13 04:35:32.756 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-13 04:35:32.756 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-13 04:35:32.756 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:35:32.757 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-13 04:35:32.757 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-13 04:35:32.758 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:35:32.758 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:35:32.758 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:35:32.759 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:35:32.759 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:35:32.759 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:35:32.760 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:35:32.760 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:35:32.760 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:35:32.761 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 04:35:32.763 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 110456046414244145669829431371583329452402169430 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 02:27:48 UTC 2021 Final Date: Thu Nov 13 02:27:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3] modulus: a5d37512a5b6280c9d4adc02d58eb24f6451e44edcaf04ae2c366bebc4a6bdc04d7af84b304482a5e1c02fc0d9884118879aed774db2db1bb75f770b98925ca66ab33909685efce39a9680ef6164c3a69bbf14b9a4159ec3eb9e462eaac11d5c5b666b5bd11fbdb3b5d605883c8790bd2b36ae3f065ad6295b61adc425e2cb1ac63f38e7f8daa78ea0037bb90a8b21235bce223048db8507488f61e81e2ae8e493106c3addbd0b210f4dbde5cd1b83fffa75d97c2329bf27d666bcf5a3d092be864d98314cd71a65e39a8466201a0ce90f7ebd99200370dd316851f2340282080112611bbc20655f73c53dc2ada18b3281a20479eb30ca28bd5d291819d793b1f1d95d1ed8ce6570de0b278cc03b48dfd07424e591a189a67ab59bb74a528165c73d86701208079f0b5cc5cf840450ec29aee7f6cdfe178c255b3a2dd25753ef2ea7bf04affc4dcecf1ca272a127aa764e8771be3046d57a67e22c94d490d8b289189b32043a73253c8eb8dd3f30d66592642f0c21ca029405ae96990b3632cb public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915 326defc29b0f810cd48787e57e4d01116410de8f d80b7019bd3414844e366bb6774b80a4b1685718 6695bfc24807eed22eddfcd5816ab6bbf308017a 186027b4fc2cc3e5459644bde622c576a47b89a6 e3c48146096b1e87749e4e2307eef25d4e8dc974 310442cb7b153c3b5a03c5fe4f3cde154d27499a 5f7184c89eb2e58e402c3a4b077986cbe975df97 54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44 b3eedd33b67ac3e0fc7eff00e0590cd02502f587 039dd31b396d54c8a078d9cfb24d77ae1e2ddaca 15c53bf815dc0a1dba327346d3127cc629b6e956 8cbb14f5083972d0e7eacf906c7331b19a57d774 b8244c5393b1a34d68159d701ba5afcfede4af4f 97c0d1b12d66e0664a70c098eb2d46b892ddb015 248bea07b09f434a7217a7f4e96661acf860e6f9 1dc7a01601b7e9b7dbdf461e6e0316f103d824f3 c9671633857138fabf5d9b7f0adb04b9f5f5e898 77a253ae990e03c20b3b6bb2b1cf5a28cd617f97 14eeb389 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:d1:c6:41:83:40:d8:ef:cd:63:27:20:42:e1:23:9b:31:66:cb:05] modulus: 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 public exponent: 10001 ] 2021-11-13 04:35:33.016 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-13 04:35:33.017 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-13 04:35:33.019 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-13 04:35:33.019 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 04:35:33.020 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-13 04:35:33.021 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-13 04:35:33.021 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-13 04:35:33.021 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-13 04:35:33.022 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-13 04:35:33.022 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-13 04:35:33.030 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-13 04:35:33.030 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:35:33.031 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:35:33.031 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:35:33.081 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-13 04:35:33.082 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-13 04:35:33.082 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-13 04:35:33.083 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:35:33.084 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-13 04:35:33.112 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-13 04:35:33.113 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:35:33.113 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:35:33.113 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:35:33.114 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:35:33.114 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:35:33.115 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:35:33.116 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:35:33.116 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:35:33.116 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:35:33.117 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 04:35:33.121 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 110456046414244145669829431371583329452402169430 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 02:27:48 UTC 2021 Final Date: Thu Nov 13 02:27:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915 326defc29b0f810cd48787e57e4d01116410de8f d80b7019bd3414844e366bb6774b80a4b1685718 6695bfc24807eed22eddfcd5816ab6bbf308017a 186027b4fc2cc3e5459644bde622c576a47b89a6 e3c48146096b1e87749e4e2307eef25d4e8dc974 310442cb7b153c3b5a03c5fe4f3cde154d27499a 5f7184c89eb2e58e402c3a4b077986cbe975df97 54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44 b3eedd33b67ac3e0fc7eff00e0590cd02502f587 039dd31b396d54c8a078d9cfb24d77ae1e2ddaca 15c53bf815dc0a1dba327346d3127cc629b6e956 8cbb14f5083972d0e7eacf906c7331b19a57d774 b8244c5393b1a34d68159d701ba5afcfede4af4f 97c0d1b12d66e0664a70c098eb2d46b892ddb015 248bea07b09f434a7217a7f4e96661acf860e6f9 1dc7a01601b7e9b7dbdf461e6e0316f103d824f3 c9671633857138fabf5d9b7f0adb04b9f5f5e898 77a253ae990e03c20b3b6bb2b1cf5a28cd617f97 14eeb389 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:d1:c6:41:83:40:d8:ef:cd:63:27:20:42:e1:23:9b:31:66:cb:05] modulus: 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 public exponent: 10001 ] 2021-11-13 04:36:26.675 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-13 04:36:26.675 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-13 04:36:26.676 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-13 04:36:26.677 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 04:36:26.677 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-13 04:36:26.677 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-13 04:36:26.677 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-13 04:36:26.678 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-13 04:36:26.678 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-13 04:36:26.678 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-13 04:36:26.682 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-13 04:36:26.682 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:36:26.682 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:36:26.683 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:36:26.832 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-13 04:36:26.833 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-13 04:36:26.833 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-13 04:36:26.833 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:36:26.834 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-13 04:36:26.834 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-13 04:36:26.834 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:36:26.835 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:36:26.835 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:36:26.835 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:36:26.835 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:36:26.836 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:36:26.836 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:36:26.836 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:36:26.837 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:36:26.837 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 04:36:26.839 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 110456046414244145669829431371583329452402169430 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 02:27:48 UTC 2021 Final Date: Thu Nov 13 02:27:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915 326defc29b0f810cd48787e57e4d01116410de8f d80b7019bd3414844e366bb6774b80a4b1685718 6695bfc24807eed22eddfcd5816ab6bbf308017a 186027b4fc2cc3e5459644bde622c576a47b89a6 e3c48146096b1e87749e4e2307eef25d4e8dc974 310442cb7b153c3b5a03c5fe4f3cde154d27499a 5f7184c89eb2e58e402c3a4b077986cbe975df97 54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44 b3eedd33b67ac3e0fc7eff00e0590cd02502f587 039dd31b396d54c8a078d9cfb24d77ae1e2ddaca 15c53bf815dc0a1dba327346d3127cc629b6e956 8cbb14f5083972d0e7eacf906c7331b19a57d774 b8244c5393b1a34d68159d701ba5afcfede4af4f 97c0d1b12d66e0664a70c098eb2d46b892ddb015 248bea07b09f434a7217a7f4e96661acf860e6f9 1dc7a01601b7e9b7dbdf461e6e0316f103d824f3 c9671633857138fabf5d9b7f0adb04b9f5f5e898 77a253ae990e03c20b3b6bb2b1cf5a28cd617f97 14eeb389 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fa:e6:b3:ac:12:56:4a:7f:f8:a8:67:ac:d5:68:6c:cd:41:36:17:f7] modulus: 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 public exponent: 10001 ] 2021-11-13 04:37:17.161 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-13 04:37:17.162 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-13 04:37:17.163 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-13 04:37:17.164 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-13 04:37:17.164 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-13 04:37:17.164 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-13 04:37:17.165 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-13 04:37:17.165 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-13 04:37:17.165 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-13 04:37:17.166 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-13 04:37:17.170 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-13 04:37:17.171 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:37:17.171 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-13 04:37:17.171 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:37:17.243 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-13 04:37:17.243 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-13 04:37:17.244 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-13 04:37:17.244 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-13 04:37:17.245 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-13 04:37:17.245 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-13 04:37:17.245 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:37:17.246 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:37:17.246 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:37:17.246 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:37:17.246 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:37:17.247 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:37:17.247 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-13 04:37:17.247 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-13 04:37:17.247 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-13 04:37:17.248 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-13 04:37:17.251 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 110456046414244145669829431371583329452402169430 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 13 02:27:48 UTC 2021 Final Date: Thu Nov 13 02:27:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b8:9d:56:73:f7:c8:bf:38:b6:f3:2d:92:cd:5d:e9:d0:a8:9c:00:c3] modulus: a5d37512a5b6280c9d4adc02d58eb24f6451e44edcaf04ae2c366bebc4a6bdc04d7af84b304482a5e1c02fc0d9884118879aed774db2db1bb75f770b98925ca66ab33909685efce39a9680ef6164c3a69bbf14b9a4159ec3eb9e462eaac11d5c5b666b5bd11fbdb3b5d605883c8790bd2b36ae3f065ad6295b61adc425e2cb1ac63f38e7f8daa78ea0037bb90a8b21235bce223048db8507488f61e81e2ae8e493106c3addbd0b210f4dbde5cd1b83fffa75d97c2329bf27d666bcf5a3d092be864d98314cd71a65e39a8466201a0ce90f7ebd99200370dd316851f2340282080112611bbc20655f73c53dc2ada18b3281a20479eb30ca28bd5d291819d793b1f1d95d1ed8ce6570de0b278cc03b48dfd07424e591a189a67ab59bb74a528165c73d86701208079f0b5cc5cf840450ec29aee7f6cdfe178c255b3a2dd25753ef2ea7bf04affc4dcecf1ca272a127aa764e8771be3046d57a67e22c94d490d8b289189b32043a73253c8eb8dd3f30d66592642f0c21ca029405ae96990b3632cb public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d3a3d5f85f2f00c698c85bea66045ed727ba915 326defc29b0f810cd48787e57e4d01116410de8f d80b7019bd3414844e366bb6774b80a4b1685718 6695bfc24807eed22eddfcd5816ab6bbf308017a 186027b4fc2cc3e5459644bde622c576a47b89a6 e3c48146096b1e87749e4e2307eef25d4e8dc974 310442cb7b153c3b5a03c5fe4f3cde154d27499a 5f7184c89eb2e58e402c3a4b077986cbe975df97 54cd35f52f1f0a5a1650d0cdb3ce489f51f1ec44 b3eedd33b67ac3e0fc7eff00e0590cd02502f587 039dd31b396d54c8a078d9cfb24d77ae1e2ddaca 15c53bf815dc0a1dba327346d3127cc629b6e956 8cbb14f5083972d0e7eacf906c7331b19a57d774 b8244c5393b1a34d68159d701ba5afcfede4af4f 97c0d1b12d66e0664a70c098eb2d46b892ddb015 248bea07b09f434a7217a7f4e96661acf860e6f9 1dc7a01601b7e9b7dbdf461e6e0316f103d824f3 c9671633857138fabf5d9b7f0adb04b9f5f5e898 77a253ae990e03c20b3b6bb2b1cf5a28cd617f97 14eeb389 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f2:ad:12:da:6e:ee:d3:73:75:f1:0c:65:54:72:d4:69:50:f4:d6:93] modulus: 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 public exponent: 10001 ]