By type
2022-04-10 01:39:46,887 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-10 01:39:51,404 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-10 01:39:54.485 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Apr 10, 2022 1:40:04 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 10, 2022 1:40:04 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 10, 2022 1:40:04 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 10, 2022 1:40:04 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-10 01:40:06.704 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-10 01:40:08.086 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-04-10 01:40:08.784 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-10 01:40:11.706 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-10 01:40:11.785 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-04-10 01:40:11.787 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-10 01:40:11.794 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-10 01:40:11.989 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-04-10 01:40:11.994 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-04-10 01:40:12.593 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-04-10 01:40:17.397 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 10, 2022 1:40:20 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-10 01:40:21.809 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 38.7 seconds (JVM running for 46.399) Apr 10, 2022 1:40:28 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-10 01:41:12.401 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-10 01:41:12.489 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-10 01:41:12.604 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-10 01:41:12.606 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-10 01:41:12.786 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-10 01:41:12.789 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-10 01:41:12.790 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-10 01:41:12.791 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-10 01:41:12.792 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 01:41:12.796 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-10 01:41:12.802 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-10 01:41:12.804 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-10 01:41:12.997 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-10 01:41:13.001 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 01:41:13.001 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 01:41:13.083 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 01:41:14.292 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-10 01:41:14.296 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-10 01:41:14.296 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-10 01:41:14.298 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 01:41:14.391 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-10 01:41:14.392 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-10 01:41:14.392 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 01:41:14.393 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 01:41:14.393 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 01:41:14.402 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 01:41:14.402 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 01:41:14.403 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 01:41:14.407 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 01:41:14.407 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 01:41:14.407 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 01:41:14.484 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-10 01:41:14.591 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 233655193531165248000344744005619972282849193069 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Apr 10 01:36:32 UTC 2022 Final Date: Fri Apr 09 01:36:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5 e37396dd0754081734ad7a934e0ea571c5b47ba0 6bdd6184f1ed27a6c40cb21e189f3238adebe591 160db623c83b7da807b6f529230788faac7b0fe8 35f6aec6fd207eb976ec621b17326b06c7540e83 2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9 297902d8f18f141d9d12c9403519f07b441cb148 eb87c659c72d8382ae59f29ded1cf067e7f20e3a 0d948f09fb44ced8d9cb790a4d94e1993eb55eff 4f48158a803f9d212a784404abcc7fac4b922871 3bd22b503ed3aee668097b5c3dc6f8eaccb58455 6726ba3ce5fc01813b59a845bbd65bd5eb5c52be 9981dc4fa26bd602ec75348696a15fa9da08bd5a 3e12e5f2edb2a2e62c0d16767958974b5027327e d8a5604bd9cf3db38b5096a5f3e3ba924767b655 649b3b14b98b0f81aba254f7d7e3f84063ea3710 39e016d1252e19691d5395854d4dfec1e36c56d5 2b701544e6525710850b4a79c0dad11d483c7d63 91a2f411e011892d634ead8a91a365250d759ae8 375a2a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0d:23:6e:6f:8b:82:7d:a2:46:73:35:fa:09:ea:91:a0:58:2a:07:4e] modulus: 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 public exponent: 10001 ] 2022-04-10 03:26:55.805 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-10 03:26:55.806 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-10 03:26:55.808 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-10 03:26:55.808 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-10 03:26:55.810 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-10 03:26:55.810 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-10 03:26:55.811 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-10 03:26:55.811 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-10 03:26:55.811 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-10 03:26:55.812 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-10 03:26:55.819 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-10 03:26:55.884 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:26:55.885 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:26:55.886 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:26:56.093 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-10 03:26:56.094 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-10 03:26:56.094 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-10 03:26:56.095 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:26:56.100 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-10 03:26:56.100 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-10 03:26:56.101 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:26:56.101 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:26:56.101 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:26:56.103 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:26:56.103 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:26:56.103 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:26:56.104 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:26:56.104 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:26:56.104 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:26:56.106 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-10 03:26:56.186 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 233655193531165248000344744005619972282849193069 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Apr 10 01:36:32 UTC 2022 Final Date: Fri Apr 09 01:36:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5 e37396dd0754081734ad7a934e0ea571c5b47ba0 6bdd6184f1ed27a6c40cb21e189f3238adebe591 160db623c83b7da807b6f529230788faac7b0fe8 35f6aec6fd207eb976ec621b17326b06c7540e83 2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9 297902d8f18f141d9d12c9403519f07b441cb148 eb87c659c72d8382ae59f29ded1cf067e7f20e3a 0d948f09fb44ced8d9cb790a4d94e1993eb55eff 4f48158a803f9d212a784404abcc7fac4b922871 3bd22b503ed3aee668097b5c3dc6f8eaccb58455 6726ba3ce5fc01813b59a845bbd65bd5eb5c52be 9981dc4fa26bd602ec75348696a15fa9da08bd5a 3e12e5f2edb2a2e62c0d16767958974b5027327e d8a5604bd9cf3db38b5096a5f3e3ba924767b655 649b3b14b98b0f81aba254f7d7e3f84063ea3710 39e016d1252e19691d5395854d4dfec1e36c56d5 2b701544e6525710850b4a79c0dad11d483c7d63 91a2f411e011892d634ead8a91a365250d759ae8 375a2a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [53:3e:f4:29:38:e8:87:8d:e4:fa:36:aa:2b:e2:1f:c5:a3:00:7d:58] modulus: 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 public exponent: 10001 ] 2022-04-10 03:30:22.631 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-10 03:30:22.632 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-10 03:30:22.634 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-10 03:30:22.635 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-10 03:30:22.636 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-10 03:30:22.637 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-10 03:30:22.638 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-10 03:30:22.638 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-10 03:30:22.639 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-10 03:30:22.639 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-10 03:30:22.647 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-10 03:30:22.648 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:30:22.648 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:30:22.648 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:30:22.758 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-10 03:30:22.759 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-10 03:30:22.783 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-10 03:30:22.784 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:30:22.787 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-10 03:30:22.787 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-10 03:30:22.788 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:30:22.788 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:30:22.789 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:30:22.789 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:30:22.790 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:30:22.790 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:30:22.791 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:30:22.793 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:30:22.793 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:30:22.795 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-10 03:30:22.798 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 233655193531165248000344744005619972282849193069 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Apr 10 01:36:32 UTC 2022 Final Date: Fri Apr 09 01:36:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5 e37396dd0754081734ad7a934e0ea571c5b47ba0 6bdd6184f1ed27a6c40cb21e189f3238adebe591 160db623c83b7da807b6f529230788faac7b0fe8 35f6aec6fd207eb976ec621b17326b06c7540e83 2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9 297902d8f18f141d9d12c9403519f07b441cb148 eb87c659c72d8382ae59f29ded1cf067e7f20e3a 0d948f09fb44ced8d9cb790a4d94e1993eb55eff 4f48158a803f9d212a784404abcc7fac4b922871 3bd22b503ed3aee668097b5c3dc6f8eaccb58455 6726ba3ce5fc01813b59a845bbd65bd5eb5c52be 9981dc4fa26bd602ec75348696a15fa9da08bd5a 3e12e5f2edb2a2e62c0d16767958974b5027327e d8a5604bd9cf3db38b5096a5f3e3ba924767b655 649b3b14b98b0f81aba254f7d7e3f84063ea3710 39e016d1252e19691d5395854d4dfec1e36c56d5 2b701544e6525710850b4a79c0dad11d483c7d63 91a2f411e011892d634ead8a91a365250d759ae8 375a2a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [58:d7:a7:ea:6a:d7:cd:76:19:f5:16:af:6c:3a:a6:af:e0:8f:c3:3e] modulus: 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 public exponent: 10001 ] 2022-04-10 03:31:46.499 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-10 03:31:46.501 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-10 03:31:46.503 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-10 03:31:46.504 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-10 03:31:46.505 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-10 03:31:46.506 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-10 03:31:46.506 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-10 03:31:46.507 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-10 03:31:46.507 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-10 03:31:46.508 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-10 03:31:46.512 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-10 03:31:46.512 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:31:46.512 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:31:46.512 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:31:46.674 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-10 03:31:46.674 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-10 03:31:46.675 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-10 03:31:46.675 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:31:46.685 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-10 03:31:46.686 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-10 03:31:46.686 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:31:46.687 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:31:46.687 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:31:46.688 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:31:46.688 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:31:46.689 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:31:46.690 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:31:46.690 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:31:46.690 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:31:46.691 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-10 03:31:46.694 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 233655193531165248000344744005619972282849193069 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Apr 10 01:36:32 UTC 2022 Final Date: Fri Apr 09 01:36:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5 e37396dd0754081734ad7a934e0ea571c5b47ba0 6bdd6184f1ed27a6c40cb21e189f3238adebe591 160db623c83b7da807b6f529230788faac7b0fe8 35f6aec6fd207eb976ec621b17326b06c7540e83 2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9 297902d8f18f141d9d12c9403519f07b441cb148 eb87c659c72d8382ae59f29ded1cf067e7f20e3a 0d948f09fb44ced8d9cb790a4d94e1993eb55eff 4f48158a803f9d212a784404abcc7fac4b922871 3bd22b503ed3aee668097b5c3dc6f8eaccb58455 6726ba3ce5fc01813b59a845bbd65bd5eb5c52be 9981dc4fa26bd602ec75348696a15fa9da08bd5a 3e12e5f2edb2a2e62c0d16767958974b5027327e d8a5604bd9cf3db38b5096a5f3e3ba924767b655 649b3b14b98b0f81aba254f7d7e3f84063ea3710 39e016d1252e19691d5395854d4dfec1e36c56d5 2b701544e6525710850b4a79c0dad11d483c7d63 91a2f411e011892d634ead8a91a365250d759ae8 375a2a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6c:a2:d7:ee:9a:b8:52:55:0a:33:36:2b:00:0e:aa:ff:bd:77:20:93] modulus: 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 public exponent: 10001 ] 2022-04-10 03:35:15.765 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-10 03:35:15.766 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-10 03:35:15.767 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-10 03:35:15.767 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-10 03:35:15.767 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-10 03:35:15.768 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-10 03:35:15.768 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-10 03:35:15.768 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-10 03:35:15.768 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-10 03:35:15.769 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-10 03:35:15.774 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-10 03:35:15.774 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:35:15.774 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:35:15.774 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:35:15.864 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-10 03:35:15.865 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-10 03:35:15.865 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-10 03:35:15.865 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:35:15.866 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-10 03:35:15.883 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-10 03:35:15.884 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:35:15.884 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:35:15.885 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:35:15.885 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:35:15.886 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:35:15.886 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:35:15.887 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:35:15.887 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:35:15.888 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:35:15.889 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-10 03:35:15.893 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 233655193531165248000344744005619972282849193069 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Apr 10 01:36:32 UTC 2022 Final Date: Fri Apr 09 01:36:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5 e37396dd0754081734ad7a934e0ea571c5b47ba0 6bdd6184f1ed27a6c40cb21e189f3238adebe591 160db623c83b7da807b6f529230788faac7b0fe8 35f6aec6fd207eb976ec621b17326b06c7540e83 2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9 297902d8f18f141d9d12c9403519f07b441cb148 eb87c659c72d8382ae59f29ded1cf067e7f20e3a 0d948f09fb44ced8d9cb790a4d94e1993eb55eff 4f48158a803f9d212a784404abcc7fac4b922871 3bd22b503ed3aee668097b5c3dc6f8eaccb58455 6726ba3ce5fc01813b59a845bbd65bd5eb5c52be 9981dc4fa26bd602ec75348696a15fa9da08bd5a 3e12e5f2edb2a2e62c0d16767958974b5027327e d8a5604bd9cf3db38b5096a5f3e3ba924767b655 649b3b14b98b0f81aba254f7d7e3f84063ea3710 39e016d1252e19691d5395854d4dfec1e36c56d5 2b701544e6525710850b4a79c0dad11d483c7d63 91a2f411e011892d634ead8a91a365250d759ae8 375a2a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [75:7e:e3:15:88:12:cc:d7:ad:cc:df:45:33:c8:e1:a7:07:51:36:92] modulus: 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 public exponent: 10001 ] 2022-04-10 03:38:34.025 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-10 03:38:34.027 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-10 03:38:34.029 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-10 03:38:34.030 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-10 03:38:34.031 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-10 03:38:34.032 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-10 03:38:34.032 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-10 03:38:34.033 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-10 03:38:34.034 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-10 03:38:34.035 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-10 03:38:34.039 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-10 03:38:34.039 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:38:34.039 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:38:34.040 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:38:34.158 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-10 03:38:34.183 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-10 03:38:34.184 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-10 03:38:34.184 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:38:34.186 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-10 03:38:34.186 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-10 03:38:34.187 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:38:34.187 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:38:34.188 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:38:34.188 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:38:34.189 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:38:34.189 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:38:34.190 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:38:34.191 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:38:34.191 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:38:34.193 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-10 03:38:34.198 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 233655193531165248000344744005619972282849193069 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Apr 10 01:36:32 UTC 2022 Final Date: Fri Apr 09 01:36:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5 e37396dd0754081734ad7a934e0ea571c5b47ba0 6bdd6184f1ed27a6c40cb21e189f3238adebe591 160db623c83b7da807b6f529230788faac7b0fe8 35f6aec6fd207eb976ec621b17326b06c7540e83 2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9 297902d8f18f141d9d12c9403519f07b441cb148 eb87c659c72d8382ae59f29ded1cf067e7f20e3a 0d948f09fb44ced8d9cb790a4d94e1993eb55eff 4f48158a803f9d212a784404abcc7fac4b922871 3bd22b503ed3aee668097b5c3dc6f8eaccb58455 6726ba3ce5fc01813b59a845bbd65bd5eb5c52be 9981dc4fa26bd602ec75348696a15fa9da08bd5a 3e12e5f2edb2a2e62c0d16767958974b5027327e d8a5604bd9cf3db38b5096a5f3e3ba924767b655 649b3b14b98b0f81aba254f7d7e3f84063ea3710 39e016d1252e19691d5395854d4dfec1e36c56d5 2b701544e6525710850b4a79c0dad11d483c7d63 91a2f411e011892d634ead8a91a365250d759ae8 375a2a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:59:32:96:a8:5c:da:e2:48:b5:06:ea:7f:df:07:0f:9a:88:0f:bc] modulus: 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 public exponent: 10001 ] 2022-04-10 03:40:50.184 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-10 03:40:50.186 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-10 03:40:50.187 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-10 03:40:50.188 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-10 03:40:50.189 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-10 03:40:50.192 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-10 03:40:50.194 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-10 03:40:50.196 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-10 03:40:50.196 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-10 03:40:50.197 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-10 03:40:50.201 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-10 03:40:50.201 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:40:50.202 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:40:50.202 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:40:50.288 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-10 03:40:50.289 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-10 03:40:50.289 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-10 03:40:50.290 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:40:50.293 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-10 03:40:50.294 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-10 03:40:50.294 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:40:50.295 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:40:50.295 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:40:50.296 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:40:50.297 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:40:50.297 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:40:50.298 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:40:50.299 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:40:50.299 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:40:50.300 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-10 03:40:50.304 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 233655193531165248000344744005619972282849193069 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Apr 10 01:36:32 UTC 2022 Final Date: Fri Apr 09 01:36:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5 e37396dd0754081734ad7a934e0ea571c5b47ba0 6bdd6184f1ed27a6c40cb21e189f3238adebe591 160db623c83b7da807b6f529230788faac7b0fe8 35f6aec6fd207eb976ec621b17326b06c7540e83 2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9 297902d8f18f141d9d12c9403519f07b441cb148 eb87c659c72d8382ae59f29ded1cf067e7f20e3a 0d948f09fb44ced8d9cb790a4d94e1993eb55eff 4f48158a803f9d212a784404abcc7fac4b922871 3bd22b503ed3aee668097b5c3dc6f8eaccb58455 6726ba3ce5fc01813b59a845bbd65bd5eb5c52be 9981dc4fa26bd602ec75348696a15fa9da08bd5a 3e12e5f2edb2a2e62c0d16767958974b5027327e d8a5604bd9cf3db38b5096a5f3e3ba924767b655 649b3b14b98b0f81aba254f7d7e3f84063ea3710 39e016d1252e19691d5395854d4dfec1e36c56d5 2b701544e6525710850b4a79c0dad11d483c7d63 91a2f411e011892d634ead8a91a365250d759ae8 375a2a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [56:e5:89:26:bf:f2:b4:49:39:09:7f:b6:da:39:56:40:ee:cb:26:f1] modulus: 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 public exponent: 10001 ] 2022-04-10 03:41:38.151 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-10 03:41:38.153 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-10 03:41:38.155 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-10 03:41:38.155 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-10 03:41:38.156 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-10 03:41:38.156 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-10 03:41:38.156 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-10 03:41:38.157 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-10 03:41:38.157 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-10 03:41:38.157 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-10 03:41:38.161 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-10 03:41:38.161 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:41:38.161 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:41:38.162 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:41:38.245 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-10 03:41:38.246 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-10 03:41:38.246 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-10 03:41:38.247 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:41:38.248 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-10 03:41:38.249 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-10 03:41:38.249 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:41:38.249 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:41:38.250 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:41:38.250 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:41:38.251 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:41:38.251 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:41:38.252 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:41:38.252 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:41:38.253 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:41:38.254 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-10 03:41:38.257 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 233655193531165248000344744005619972282849193069 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Apr 10 01:36:32 UTC 2022 Final Date: Fri Apr 09 01:36:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5 e37396dd0754081734ad7a934e0ea571c5b47ba0 6bdd6184f1ed27a6c40cb21e189f3238adebe591 160db623c83b7da807b6f529230788faac7b0fe8 35f6aec6fd207eb976ec621b17326b06c7540e83 2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9 297902d8f18f141d9d12c9403519f07b441cb148 eb87c659c72d8382ae59f29ded1cf067e7f20e3a 0d948f09fb44ced8d9cb790a4d94e1993eb55eff 4f48158a803f9d212a784404abcc7fac4b922871 3bd22b503ed3aee668097b5c3dc6f8eaccb58455 6726ba3ce5fc01813b59a845bbd65bd5eb5c52be 9981dc4fa26bd602ec75348696a15fa9da08bd5a 3e12e5f2edb2a2e62c0d16767958974b5027327e d8a5604bd9cf3db38b5096a5f3e3ba924767b655 649b3b14b98b0f81aba254f7d7e3f84063ea3710 39e016d1252e19691d5395854d4dfec1e36c56d5 2b701544e6525710850b4a79c0dad11d483c7d63 91a2f411e011892d634ead8a91a365250d759ae8 375a2a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5d:e3:a1:fe:6e:c6:2e:5e:53:47:63:d5:b0:48:aa:25:05:01:bb:96] modulus: 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 public exponent: 10001 ] 2022-04-10 03:48:09.602 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-10 03:48:09.604 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-10 03:48:09.605 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-10 03:48:09.606 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-10 03:48:09.606 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-10 03:48:09.607 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-10 03:48:09.607 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-10 03:48:09.607 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-10 03:48:09.607 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-10 03:48:09.608 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-10 03:48:09.613 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-10 03:48:09.613 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:48:09.614 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:48:09.614 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:48:09.707 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-10 03:48:09.707 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-10 03:48:09.707 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-10 03:48:09.708 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:48:09.710 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-10 03:48:09.710 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-10 03:48:09.711 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:48:09.711 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:48:09.711 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:48:09.712 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:48:09.712 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:48:09.713 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:48:09.714 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:48:09.714 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:48:09.714 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:48:09.715 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-10 03:48:09.719 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 233655193531165248000344744005619972282849193069 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Apr 10 01:36:32 UTC 2022 Final Date: Fri Apr 09 01:36:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5 e37396dd0754081734ad7a934e0ea571c5b47ba0 6bdd6184f1ed27a6c40cb21e189f3238adebe591 160db623c83b7da807b6f529230788faac7b0fe8 35f6aec6fd207eb976ec621b17326b06c7540e83 2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9 297902d8f18f141d9d12c9403519f07b441cb148 eb87c659c72d8382ae59f29ded1cf067e7f20e3a 0d948f09fb44ced8d9cb790a4d94e1993eb55eff 4f48158a803f9d212a784404abcc7fac4b922871 3bd22b503ed3aee668097b5c3dc6f8eaccb58455 6726ba3ce5fc01813b59a845bbd65bd5eb5c52be 9981dc4fa26bd602ec75348696a15fa9da08bd5a 3e12e5f2edb2a2e62c0d16767958974b5027327e d8a5604bd9cf3db38b5096a5f3e3ba924767b655 649b3b14b98b0f81aba254f7d7e3f84063ea3710 39e016d1252e19691d5395854d4dfec1e36c56d5 2b701544e6525710850b4a79c0dad11d483c7d63 91a2f411e011892d634ead8a91a365250d759ae8 375a2a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:62:3d:f5:99:26:c2:bf:d1:68:8a:63:02:a7:e2:06:00:f0:d6:77] modulus: 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 public exponent: 10001 ] 2022-04-10 03:48:58.476 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-10 03:48:58.477 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-10 03:48:58.478 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-10 03:48:58.479 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-10 03:48:58.479 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-10 03:48:58.479 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-10 03:48:58.480 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-10 03:48:58.480 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-10 03:48:58.480 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-10 03:48:58.480 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-10 03:48:58.485 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-10 03:48:58.485 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:48:58.485 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:48:58.486 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:48:58.569 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-10 03:48:58.569 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-10 03:48:58.570 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-10 03:48:58.570 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:48:58.571 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-10 03:48:58.571 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-10 03:48:58.583 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:48:58.584 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:48:58.584 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:48:58.584 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:48:58.585 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:48:58.585 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:48:58.586 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:48:58.586 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:48:58.587 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:48:58.588 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-10 03:48:58.592 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 233655193531165248000344744005619972282849193069 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Apr 10 01:36:32 UTC 2022 Final Date: Fri Apr 09 01:36:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5 e37396dd0754081734ad7a934e0ea571c5b47ba0 6bdd6184f1ed27a6c40cb21e189f3238adebe591 160db623c83b7da807b6f529230788faac7b0fe8 35f6aec6fd207eb976ec621b17326b06c7540e83 2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9 297902d8f18f141d9d12c9403519f07b441cb148 eb87c659c72d8382ae59f29ded1cf067e7f20e3a 0d948f09fb44ced8d9cb790a4d94e1993eb55eff 4f48158a803f9d212a784404abcc7fac4b922871 3bd22b503ed3aee668097b5c3dc6f8eaccb58455 6726ba3ce5fc01813b59a845bbd65bd5eb5c52be 9981dc4fa26bd602ec75348696a15fa9da08bd5a 3e12e5f2edb2a2e62c0d16767958974b5027327e d8a5604bd9cf3db38b5096a5f3e3ba924767b655 649b3b14b98b0f81aba254f7d7e3f84063ea3710 39e016d1252e19691d5395854d4dfec1e36c56d5 2b701544e6525710850b4a79c0dad11d483c7d63 91a2f411e011892d634ead8a91a365250d759ae8 375a2a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [96:3a:90:09:ff:d0:da:2e:9e:32:05:30:b1:2f:2a:26:61:7b:c6:86] modulus: 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 public exponent: 10001 ] 2022-04-10 03:58:54.843 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-10 03:58:54.845 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-10 03:58:54.847 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-10 03:58:54.848 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-10 03:58:54.848 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-10 03:58:54.849 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-10 03:58:54.849 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-10 03:58:54.850 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-10 03:58:54.850 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-10 03:58:54.851 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-10 03:58:54.854 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-10 03:58:54.855 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:58:54.855 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:58:54.855 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:58:54.959 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-10 03:58:54.960 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-10 03:58:54.960 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-10 03:58:54.961 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:58:54.962 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-10 03:58:54.963 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-10 03:58:54.964 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:58:54.964 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:58:54.964 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:58:54.965 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:58:54.965 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:58:54.965 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:58:54.966 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:58:54.966 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:58:54.967 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:58:54.967 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-10 03:58:54.970 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 233655193531165248000344744005619972282849193069 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Apr 10 01:36:32 UTC 2022 Final Date: Fri Apr 09 01:36:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5 e37396dd0754081734ad7a934e0ea571c5b47ba0 6bdd6184f1ed27a6c40cb21e189f3238adebe591 160db623c83b7da807b6f529230788faac7b0fe8 35f6aec6fd207eb976ec621b17326b06c7540e83 2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9 297902d8f18f141d9d12c9403519f07b441cb148 eb87c659c72d8382ae59f29ded1cf067e7f20e3a 0d948f09fb44ced8d9cb790a4d94e1993eb55eff 4f48158a803f9d212a784404abcc7fac4b922871 3bd22b503ed3aee668097b5c3dc6f8eaccb58455 6726ba3ce5fc01813b59a845bbd65bd5eb5c52be 9981dc4fa26bd602ec75348696a15fa9da08bd5a 3e12e5f2edb2a2e62c0d16767958974b5027327e d8a5604bd9cf3db38b5096a5f3e3ba924767b655 649b3b14b98b0f81aba254f7d7e3f84063ea3710 39e016d1252e19691d5395854d4dfec1e36c56d5 2b701544e6525710850b4a79c0dad11d483c7d63 91a2f411e011892d634ead8a91a365250d759ae8 375a2a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:5c:ad:f3:2c:93:b3:47:df:6a:73:95:d9:d7:f7:24:55:fa:76:7a] modulus: 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 public exponent: 10001 ] 2022-04-10 03:59:50.965 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-10 03:59:50.966 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-10 03:59:50.968 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-10 03:59:50.969 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-10 03:59:50.969 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-10 03:59:50.970 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-10 03:59:50.970 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-10 03:59:50.970 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-10 03:59:50.971 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-10 03:59:50.971 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-10 03:59:50.977 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-10 03:59:50.977 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:59:50.977 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-10 03:59:50.978 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:59:51.057 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-10 03:59:51.057 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-10 03:59:51.058 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-10 03:59:51.058 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-10 03:59:51.059 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-10 03:59:51.059 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-10 03:59:51.060 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:59:51.060 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:59:51.060 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:59:51.061 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:59:51.061 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:59:51.061 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:59:51.061 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-10 03:59:51.062 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-10 03:59:51.062 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-10 03:59:51.063 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-10 03:59:51.066 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 233655193531165248000344744005619972282849193069 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Apr 10 01:36:32 UTC 2022 Final Date: Fri Apr 09 01:36:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4] modulus: 96e5d1f21d22aa2803e8ebdd22951f41d2307e086a703db89dec4249242184701b0ea52687d2225fc2bd4a6eb49660e751fcee8976d2b26bcd2f1b57db4447f5e508c64fb53b008d05b2ad4fe3a4f55803d78bb37975907755bd501228c5a758d11aad42a62d3441aa6240c50fc284b039852767a398ab78034415734ce5fc4082e44c5b84c8a95d295f17a231a63f6fdc94b2629d85a4af68b9bd9150a98b9b89c1e1894a748de83f9218f2225b18d4e9b2e9580019b7884be9c7881435b21d7446470654fe510b9754d1cce73a29f77fecfb5cd7d9312b65610c26573a91f6ac89d9c99263041f5788fcebfb97813c05362a5ff13cd078f1fd60e276436ffb17a049dbdab5d3a30257e3b2944812fd4f61efab480f8eb05b893ea6caa807de40abffebc6729a4109fa86a02e8676a55baf8c791a07050299736b2662388add0357412eb6dbce2cbb1aadd25684dd7525122aba9e4b3e08d039cf9febf4f212dfaada8d7d5b0e3cc95625b6b7382e706575c457cbb1d7aa26e170d2bebe0df3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5 e37396dd0754081734ad7a934e0ea571c5b47ba0 6bdd6184f1ed27a6c40cb21e189f3238adebe591 160db623c83b7da807b6f529230788faac7b0fe8 35f6aec6fd207eb976ec621b17326b06c7540e83 2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9 297902d8f18f141d9d12c9403519f07b441cb148 eb87c659c72d8382ae59f29ded1cf067e7f20e3a 0d948f09fb44ced8d9cb790a4d94e1993eb55eff 4f48158a803f9d212a784404abcc7fac4b922871 3bd22b503ed3aee668097b5c3dc6f8eaccb58455 6726ba3ce5fc01813b59a845bbd65bd5eb5c52be 9981dc4fa26bd602ec75348696a15fa9da08bd5a 3e12e5f2edb2a2e62c0d16767958974b5027327e d8a5604bd9cf3db38b5096a5f3e3ba924767b655 649b3b14b98b0f81aba254f7d7e3f84063ea3710 39e016d1252e19691d5395854d4dfec1e36c56d5 2b701544e6525710850b4a79c0dad11d483c7d63 91a2f411e011892d634ead8a91a365250d759ae8 375a2a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1c:91:b1:d8:5c:07:13:bf:dc:5f:69:7d:27:1c:6a:50:a2:b4:f3:19] modulus: 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 public exponent: 10001 ]