By type
2022-06-08 02:10:25,606 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-08 02:10:30,292 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-08 02:10:33.099 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jun 08, 2022 2:10:42 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 08, 2022 2:10:42 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 08, 2022 2:10:42 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 08, 2022 2:10:42 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-08 02:10:44.709 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-08 02:10:45.930 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-06-08 02:10:46.617 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-08 02:10:50.202 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-08 02:10:50.205 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-06-08 02:10:50.206 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-08 02:10:50.209 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-08 02:10:50.415 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-08 02:10:50.419 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-08 02:10:50.901 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-06-08 02:10:55.803 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 08, 2022 2:10:59 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-08 02:11:00.208 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 38.195 seconds (JVM running for 46.125) Jun 08, 2022 2:11:02 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-08 02:12:09.411 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 02:12:09.498 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 02:12:09.693 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-08 02:12:09.698 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 02:12:09.794 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-08 02:12:09.797 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 02:12:09.798 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 02:12:09.799 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 02:12:09.799 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 02:12:09.802 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 02:12:09.807 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 02:12:09.810 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 02:12:10.010 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 02:12:10.014 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 02:12:10.014 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 02:12:10.094 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 02:12:11.595 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 02:12:11.602 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 02:12:11.691 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 02:12:11.694 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 02:12:11.796 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 02:12:11.797 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 02:12:11.798 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 02:12:11.798 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 02:12:11.799 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 02:12:11.896 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 02:12:11.896 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 02:12:11.897 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 02:12:11.904 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 02:12:11.904 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 02:12:11.905 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 02:12:11.906 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 02:12:12.007 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509415271303144873057533481101930615417384766864 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 02:07:12 UTC 2022 Final Date: Mon Jun 07 02:07:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c 4f78fae73d0a43ae507937677d9d03df866c1428 3c7d1fa3da2cc870f02940c925afca0e32a49f1c 46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5 0b9bfb15a94a8bf3b21fa604e3c1861c24225b95 6ba2d0d6835222c563e7e83b63022c3ba7dd139a 7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2 5e288033479c8583ec245dd06c41da90bec07598 d84695be959f6f0c92ad3fd3ae57d15a0af7141b a785ff6fba2f37610775c4592c695a0e7dc66cef 1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f 40132611603d1efccf094148c9b45b187ba19122 b26312166b052827daa08c61e8e2a5cc3f8fc467 7d43d108dccb1c2420f35e9ad9988f1f142aaebd 341ecf46a8eb77667d593a5a5c5c64231ac5b500 508e4f43357c1fafc5da827514279daba2ffad9e b462707b3760d8f3c8b4668668f181f7fe89529d 59ba9bd7bc45561b8b7be38e17464fc380985569 29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e 026f2ca4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d6:58:35:a4:0c:a7:a9:22:2a:c7:b1:08:60:62:8e:d5:17:96:89:0f] modulus: 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 public exponent: 10001 ] 2022-06-08 07:32:22.636 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 07:32:22.637 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 07:32:22.639 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:32:22.640 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 07:32:22.641 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:32:22.642 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 07:32:22.642 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 07:32:22.643 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 07:32:22.643 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 07:32:22.644 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 07:32:22.692 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 07:32:22.694 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:32:22.694 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:32:22.694 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:32:22.917 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 07:32:22.918 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 07:32:22.918 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 07:32:22.919 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:32:22.924 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 07:32:22.924 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 07:32:22.924 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:32:22.925 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:32:22.925 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:32:22.926 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:32:22.927 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:32:22.927 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:32:22.929 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:32:22.929 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:32:22.930 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:32:22.932 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 07:32:22.936 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509415271303144873057533481101930615417384766864 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 02:07:12 UTC 2022 Final Date: Mon Jun 07 02:07:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c 4f78fae73d0a43ae507937677d9d03df866c1428 3c7d1fa3da2cc870f02940c925afca0e32a49f1c 46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5 0b9bfb15a94a8bf3b21fa604e3c1861c24225b95 6ba2d0d6835222c563e7e83b63022c3ba7dd139a 7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2 5e288033479c8583ec245dd06c41da90bec07598 d84695be959f6f0c92ad3fd3ae57d15a0af7141b a785ff6fba2f37610775c4592c695a0e7dc66cef 1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f 40132611603d1efccf094148c9b45b187ba19122 b26312166b052827daa08c61e8e2a5cc3f8fc467 7d43d108dccb1c2420f35e9ad9988f1f142aaebd 341ecf46a8eb77667d593a5a5c5c64231ac5b500 508e4f43357c1fafc5da827514279daba2ffad9e b462707b3760d8f3c8b4668668f181f7fe89529d 59ba9bd7bc45561b8b7be38e17464fc380985569 29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e 026f2ca4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [05:96:fc:5d:11:b9:3a:7b:3b:97:e2:3d:1d:36:36:d7:d6:95:8c:f9] modulus: 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 public exponent: 10001 ] 2022-06-08 07:35:30.257 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 07:35:30.259 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 07:35:30.260 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:35:30.261 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 07:35:30.261 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:35:30.262 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 07:35:30.262 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 07:35:30.263 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 07:35:30.263 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 07:35:30.263 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 07:35:30.293 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 07:35:30.294 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:35:30.294 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:35:30.294 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:35:30.401 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 07:35:30.402 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 07:35:30.402 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 07:35:30.403 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:35:30.406 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 07:35:30.406 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 07:35:30.407 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:35:30.407 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:35:30.407 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:35:30.408 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:35:30.408 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:35:30.408 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:35:30.409 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:35:30.409 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:35:30.409 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:35:30.410 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 07:35:30.412 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509415271303144873057533481101930615417384766864 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 02:07:12 UTC 2022 Final Date: Mon Jun 07 02:07:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c 4f78fae73d0a43ae507937677d9d03df866c1428 3c7d1fa3da2cc870f02940c925afca0e32a49f1c 46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5 0b9bfb15a94a8bf3b21fa604e3c1861c24225b95 6ba2d0d6835222c563e7e83b63022c3ba7dd139a 7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2 5e288033479c8583ec245dd06c41da90bec07598 d84695be959f6f0c92ad3fd3ae57d15a0af7141b a785ff6fba2f37610775c4592c695a0e7dc66cef 1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f 40132611603d1efccf094148c9b45b187ba19122 b26312166b052827daa08c61e8e2a5cc3f8fc467 7d43d108dccb1c2420f35e9ad9988f1f142aaebd 341ecf46a8eb77667d593a5a5c5c64231ac5b500 508e4f43357c1fafc5da827514279daba2ffad9e b462707b3760d8f3c8b4668668f181f7fe89529d 59ba9bd7bc45561b8b7be38e17464fc380985569 29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e 026f2ca4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5f:eb:d9:75:81:20:eb:bd:be:5d:4d:f0:81:fb:a0:86:c8:b3:7a:d4] modulus: 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 public exponent: 10001 ] 2022-06-08 07:37:54.623 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 07:37:54.624 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 07:37:54.626 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-08 07:37:54.626 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 07:37:54.627 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-08 07:37:54.627 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 07:37:54.627 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 07:37:54.628 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 07:37:54.628 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 07:37:54.628 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 07:37:54.632 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 07:37:54.633 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:37:54.633 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:37:54.633 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:37:54.726 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 07:37:54.727 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 07:37:54.727 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 07:37:54.727 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:37:54.729 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 07:37:54.729 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 07:37:54.730 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:37:54.730 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:37:54.731 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:37:54.732 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:37:54.733 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:37:54.733 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:37:54.734 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:37:54.735 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:37:54.790 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:37:54.792 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 07:37:54.796 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509415271303144873057533481101930615417384766864 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 02:07:12 UTC 2022 Final Date: Mon Jun 07 02:07:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c] modulus: af10753b488b556abf38bd25a8baecd4ac09c4a0062434e27a2d290d3f6c3f9f4a5e5b9c06a8cae8a7560c915afb6913166b45f776a6f03f54ff4079c85da8f4791024c4b32bf8c0c1cdddc5e9ee4b296b1e02a8f51df0b47c646a902c38de0a6b8077ccd58ab88c340226415b8756f9f1b7c52452724d0f22a707558718c1075c0250bfaaeabae470aeb31559b6c22249da326a54ef02872f98f3bd556c1be6439942817e83617351ddf0240e0eaa8b072afc1cb29f609fee85f41dde39fae70f682498344ff9703343693cee92fa277b6e4fc0d51b96598d06f3382902e95b2da84032325cf86eb4ed1094afaf7f8b667ca985efc0a9f251cf54449638dcfedff007554dd9551919bf45a577a5791423ced68fa0020275bb2a9d6172b4fd9fc9a05afb848ac0cc72967141475b40dff3161f567c4ba5f02aeaa72562dfb7a3070d90616154223120314d7370c63089e3203b67874c2eef068daba33f307f61e892ecdd2dc90d9cc15d8255019b43f27b327f8248b1eff806bad66f5efacb0d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c 4f78fae73d0a43ae507937677d9d03df866c1428 3c7d1fa3da2cc870f02940c925afca0e32a49f1c 46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5 0b9bfb15a94a8bf3b21fa604e3c1861c24225b95 6ba2d0d6835222c563e7e83b63022c3ba7dd139a 7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2 5e288033479c8583ec245dd06c41da90bec07598 d84695be959f6f0c92ad3fd3ae57d15a0af7141b a785ff6fba2f37610775c4592c695a0e7dc66cef 1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f 40132611603d1efccf094148c9b45b187ba19122 b26312166b052827daa08c61e8e2a5cc3f8fc467 7d43d108dccb1c2420f35e9ad9988f1f142aaebd 341ecf46a8eb77667d593a5a5c5c64231ac5b500 508e4f43357c1fafc5da827514279daba2ffad9e b462707b3760d8f3c8b4668668f181f7fe89529d 59ba9bd7bc45561b8b7be38e17464fc380985569 29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e 026f2ca4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [12:18:08:0f:f9:af:b5:72:cc:e6:35:0b:38:3d:3f:c5:4d:85:6a:64] modulus: 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 public exponent: 10001 ] 2022-06-08 07:40:39.432 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 07:40:39.434 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 07:40:39.436 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:40:39.437 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 07:40:39.437 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:40:39.438 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 07:40:39.439 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 07:40:39.439 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 07:40:39.440 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 07:40:39.440 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 07:40:39.443 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 07:40:39.444 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:40:39.444 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:40:39.444 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:40:39.544 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 07:40:39.544 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 07:40:39.545 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 07:40:39.545 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:40:39.546 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 07:40:39.547 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 07:40:39.547 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:40:39.548 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:40:39.548 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:40:39.548 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:40:39.549 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:40:39.549 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:40:39.550 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:40:39.550 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:40:39.551 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:40:39.591 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 07:40:39.597 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509415271303144873057533481101930615417384766864 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 02:07:12 UTC 2022 Final Date: Mon Jun 07 02:07:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c] modulus: af10753b488b556abf38bd25a8baecd4ac09c4a0062434e27a2d290d3f6c3f9f4a5e5b9c06a8cae8a7560c915afb6913166b45f776a6f03f54ff4079c85da8f4791024c4b32bf8c0c1cdddc5e9ee4b296b1e02a8f51df0b47c646a902c38de0a6b8077ccd58ab88c340226415b8756f9f1b7c52452724d0f22a707558718c1075c0250bfaaeabae470aeb31559b6c22249da326a54ef02872f98f3bd556c1be6439942817e83617351ddf0240e0eaa8b072afc1cb29f609fee85f41dde39fae70f682498344ff9703343693cee92fa277b6e4fc0d51b96598d06f3382902e95b2da84032325cf86eb4ed1094afaf7f8b667ca985efc0a9f251cf54449638dcfedff007554dd9551919bf45a577a5791423ced68fa0020275bb2a9d6172b4fd9fc9a05afb848ac0cc72967141475b40dff3161f567c4ba5f02aeaa72562dfb7a3070d90616154223120314d7370c63089e3203b67874c2eef068daba33f307f61e892ecdd2dc90d9cc15d8255019b43f27b327f8248b1eff806bad66f5efacb0d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c 4f78fae73d0a43ae507937677d9d03df866c1428 3c7d1fa3da2cc870f02940c925afca0e32a49f1c 46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5 0b9bfb15a94a8bf3b21fa604e3c1861c24225b95 6ba2d0d6835222c563e7e83b63022c3ba7dd139a 7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2 5e288033479c8583ec245dd06c41da90bec07598 d84695be959f6f0c92ad3fd3ae57d15a0af7141b a785ff6fba2f37610775c4592c695a0e7dc66cef 1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f 40132611603d1efccf094148c9b45b187ba19122 b26312166b052827daa08c61e8e2a5cc3f8fc467 7d43d108dccb1c2420f35e9ad9988f1f142aaebd 341ecf46a8eb77667d593a5a5c5c64231ac5b500 508e4f43357c1fafc5da827514279daba2ffad9e b462707b3760d8f3c8b4668668f181f7fe89529d 59ba9bd7bc45561b8b7be38e17464fc380985569 29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e 026f2ca4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [52:42:dc:d5:eb:33:72:71:e1:4a:29:6d:00:68:d0:4b:f4:8a:e1:ab] modulus: b6ae6f5ac06f06b8fd1db0618b57a51b2ba89bb2ba4c7b0190ea243ede28ea0d6d8abb08c4061c67ca2d1c5082da0a4357a77ee55c771321b25f8b96438777e9bc964672e30f59fa1d03d3ff48eb90495d202982edc46990792bd58b48358cd65cc5557e72fe981313ee3a1d4d5f7981277c9abd2a77553800cc7c7ec235d45235cf86128b45c7a9a44d1350039a92d81e7c567687a2bcba1b37fe8ee55042e1dc2b40ff55c0b336d59afb1ddfa72b729fc41968684bb558ca21edd929bc7dbeaa00d8a1bba19bf00d41def064dd805d2664424a0f5d34653587cb998bd7e13d8073588f844c1fe4eb748b1c493e5ab2ac52ab06dd4c8847c7656249870b3c53 public exponent: 10001 ] 2022-06-08 07:44:36.319 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 07:44:36.320 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 07:44:36.322 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:44:36.323 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 07:44:36.323 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:44:36.324 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 07:44:36.324 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 07:44:36.324 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 07:44:36.325 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 07:44:36.325 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 07:44:36.329 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 07:44:36.330 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:44:36.330 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:44:36.331 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:44:36.476 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 07:44:36.477 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 07:44:36.477 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 07:44:36.477 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:44:36.479 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 07:44:36.480 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 07:44:36.480 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:44:36.481 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:44:36.481 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:44:36.482 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:44:36.482 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:44:36.482 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:44:36.490 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:44:36.491 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:44:36.491 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:44:36.491 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 07:44:36.494 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509415271303144873057533481101930615417384766864 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 02:07:12 UTC 2022 Final Date: Mon Jun 07 02:07:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c 4f78fae73d0a43ae507937677d9d03df866c1428 3c7d1fa3da2cc870f02940c925afca0e32a49f1c 46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5 0b9bfb15a94a8bf3b21fa604e3c1861c24225b95 6ba2d0d6835222c563e7e83b63022c3ba7dd139a 7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2 5e288033479c8583ec245dd06c41da90bec07598 d84695be959f6f0c92ad3fd3ae57d15a0af7141b a785ff6fba2f37610775c4592c695a0e7dc66cef 1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f 40132611603d1efccf094148c9b45b187ba19122 b26312166b052827daa08c61e8e2a5cc3f8fc467 7d43d108dccb1c2420f35e9ad9988f1f142aaebd 341ecf46a8eb77667d593a5a5c5c64231ac5b500 508e4f43357c1fafc5da827514279daba2ffad9e b462707b3760d8f3c8b4668668f181f7fe89529d 59ba9bd7bc45561b8b7be38e17464fc380985569 29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e 026f2ca4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [51:d1:f9:63:b9:6b:e6:9d:0f:fc:60:13:66:89:3f:c1:e4:77:95:33] modulus: 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 public exponent: 10001 ] 2022-06-08 07:48:56.092 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 07:48:56.093 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 07:48:56.095 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:48:56.096 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 07:48:56.097 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:48:56.097 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 07:48:56.097 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 07:48:56.097 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 07:48:56.098 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 07:48:56.098 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 07:48:56.102 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 07:48:56.103 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:48:56.103 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:48:56.103 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:48:56.190 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 07:48:56.191 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 07:48:56.191 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 07:48:56.191 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:48:56.193 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 07:48:56.193 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 07:48:56.194 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:48:56.194 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:48:56.194 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:48:56.195 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:48:56.195 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:48:56.196 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:48:56.196 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:48:56.197 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:48:56.197 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:48:56.198 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 07:48:56.202 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509415271303144873057533481101930615417384766864 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 02:07:12 UTC 2022 Final Date: Mon Jun 07 02:07:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c 4f78fae73d0a43ae507937677d9d03df866c1428 3c7d1fa3da2cc870f02940c925afca0e32a49f1c 46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5 0b9bfb15a94a8bf3b21fa604e3c1861c24225b95 6ba2d0d6835222c563e7e83b63022c3ba7dd139a 7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2 5e288033479c8583ec245dd06c41da90bec07598 d84695be959f6f0c92ad3fd3ae57d15a0af7141b a785ff6fba2f37610775c4592c695a0e7dc66cef 1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f 40132611603d1efccf094148c9b45b187ba19122 b26312166b052827daa08c61e8e2a5cc3f8fc467 7d43d108dccb1c2420f35e9ad9988f1f142aaebd 341ecf46a8eb77667d593a5a5c5c64231ac5b500 508e4f43357c1fafc5da827514279daba2ffad9e b462707b3760d8f3c8b4668668f181f7fe89529d 59ba9bd7bc45561b8b7be38e17464fc380985569 29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e 026f2ca4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ee:23:cc:32:c3:6e:5f:4e:31:a8:f9:c4:5c:fc:7f:22:0a:28:93:1f] modulus: adb0278a3c0d15fc8f14b4f75ae2faa33c986eb0ee35a88debbed3b173ed53658f192a13827b65436d4217cf49d6964da3880eac6b0d2b90dee7cd1fe38462c295e51c72d67f940585faa6218523d14a861e9e4d2828125192258ef41570e195423ef18013a25f7cf90698d7f875cbbcf80024e4191b76a65229c97df8ccb9f68b2d180145d08394a94fac5ca6381937b70c8eeaf1ac5b6297365070023e13ad17c86a9da0c8db8fc7361f198a007405415e31f80803f2da3f194b0da3fa48af64dd0b0d19a66f47c3d273be4f2028b6fb8b330c02e8b340e45101c03fd346bf1f480099053165117d9693d58bab11fdaad59b9f4b74e4704eccacc4126bc2bd public exponent: 10001 ] 2022-06-08 07:51:01.063 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 07:51:01.064 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 07:51:01.065 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-08 07:51:01.066 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 07:51:01.066 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-08 07:51:01.090 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 07:51:01.091 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 07:51:01.091 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 07:51:01.092 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 07:51:01.092 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 07:51:01.100 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 07:51:01.101 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:51:01.102 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:51:01.102 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:51:01.277 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 07:51:01.277 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 07:51:01.278 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 07:51:01.278 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:51:01.292 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 07:51:01.292 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 07:51:01.293 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:51:01.293 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:51:01.293 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:51:01.294 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:51:01.295 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:51:01.295 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:51:01.296 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:51:01.296 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:51:01.296 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:51:01.297 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 07:51:01.391 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509415271303144873057533481101930615417384766864 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 02:07:12 UTC 2022 Final Date: Mon Jun 07 02:07:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c 4f78fae73d0a43ae507937677d9d03df866c1428 3c7d1fa3da2cc870f02940c925afca0e32a49f1c 46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5 0b9bfb15a94a8bf3b21fa604e3c1861c24225b95 6ba2d0d6835222c563e7e83b63022c3ba7dd139a 7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2 5e288033479c8583ec245dd06c41da90bec07598 d84695be959f6f0c92ad3fd3ae57d15a0af7141b a785ff6fba2f37610775c4592c695a0e7dc66cef 1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f 40132611603d1efccf094148c9b45b187ba19122 b26312166b052827daa08c61e8e2a5cc3f8fc467 7d43d108dccb1c2420f35e9ad9988f1f142aaebd 341ecf46a8eb77667d593a5a5c5c64231ac5b500 508e4f43357c1fafc5da827514279daba2ffad9e b462707b3760d8f3c8b4668668f181f7fe89529d 59ba9bd7bc45561b8b7be38e17464fc380985569 29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e 026f2ca4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [21:a5:30:0d:1c:ca:be:42:cd:2e:9b:9e:e3:c8:a7:0b:61:76:06:6c] modulus: 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 public exponent: 10001 ] 2022-06-08 07:53:24.437 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 07:53:24.438 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 07:53:24.440 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:53:24.441 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 07:53:24.441 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:53:24.442 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 07:53:24.442 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 07:53:24.442 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 07:53:24.443 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 07:53:24.443 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 07:53:24.447 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 07:53:24.447 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:53:24.447 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:53:24.447 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:53:24.532 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 07:53:24.533 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 07:53:24.533 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 07:53:24.533 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:53:24.535 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 07:53:24.536 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 07:53:24.536 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:53:24.537 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:53:24.537 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:53:24.537 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:53:24.538 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:53:24.538 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:53:24.539 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:53:24.539 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:53:24.539 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:53:24.540 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 07:53:24.544 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509415271303144873057533481101930615417384766864 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 02:07:12 UTC 2022 Final Date: Mon Jun 07 02:07:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c 4f78fae73d0a43ae507937677d9d03df866c1428 3c7d1fa3da2cc870f02940c925afca0e32a49f1c 46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5 0b9bfb15a94a8bf3b21fa604e3c1861c24225b95 6ba2d0d6835222c563e7e83b63022c3ba7dd139a 7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2 5e288033479c8583ec245dd06c41da90bec07598 d84695be959f6f0c92ad3fd3ae57d15a0af7141b a785ff6fba2f37610775c4592c695a0e7dc66cef 1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f 40132611603d1efccf094148c9b45b187ba19122 b26312166b052827daa08c61e8e2a5cc3f8fc467 7d43d108dccb1c2420f35e9ad9988f1f142aaebd 341ecf46a8eb77667d593a5a5c5c64231ac5b500 508e4f43357c1fafc5da827514279daba2ffad9e b462707b3760d8f3c8b4668668f181f7fe89529d 59ba9bd7bc45561b8b7be38e17464fc380985569 29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e 026f2ca4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f2:95:b1:0a:ae:67:5f:d5:01:33:e1:d9:0c:5d:c0:e9:81:38:0a:b2] modulus: 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 public exponent: 10001 ] 2022-06-08 07:58:23.776 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 07:58:23.777 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 07:58:23.779 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:58:23.780 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 07:58:23.780 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 07:58:23.781 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 07:58:23.782 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 07:58:23.782 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 07:58:23.782 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 07:58:23.783 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 07:58:23.789 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 07:58:23.789 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:58:23.789 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 07:58:23.789 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:58:23.889 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 07:58:23.889 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 07:58:23.889 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 07:58:23.890 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 07:58:23.891 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 07:58:23.891 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 07:58:23.891 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:58:23.891 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:58:23.892 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:58:23.892 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:58:23.892 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:58:23.893 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:58:23.893 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 07:58:23.893 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 07:58:23.894 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 07:58:23.894 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 07:58:23.898 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509415271303144873057533481101930615417384766864 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 02:07:12 UTC 2022 Final Date: Mon Jun 07 02:07:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c 4f78fae73d0a43ae507937677d9d03df866c1428 3c7d1fa3da2cc870f02940c925afca0e32a49f1c 46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5 0b9bfb15a94a8bf3b21fa604e3c1861c24225b95 6ba2d0d6835222c563e7e83b63022c3ba7dd139a 7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2 5e288033479c8583ec245dd06c41da90bec07598 d84695be959f6f0c92ad3fd3ae57d15a0af7141b a785ff6fba2f37610775c4592c695a0e7dc66cef 1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f 40132611603d1efccf094148c9b45b187ba19122 b26312166b052827daa08c61e8e2a5cc3f8fc467 7d43d108dccb1c2420f35e9ad9988f1f142aaebd 341ecf46a8eb77667d593a5a5c5c64231ac5b500 508e4f43357c1fafc5da827514279daba2ffad9e b462707b3760d8f3c8b4668668f181f7fe89529d 59ba9bd7bc45561b8b7be38e17464fc380985569 29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e 026f2ca4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2f:57:ec:bf:62:03:4e:83:f8:ea:5d:c8:f2:a9:fc:42:83:9f:4a:cd] modulus: db9daff2f5517f1d86f31e90324b79bac041d80c995934c0ee6c0c38235702f75c7381e62cf5f6a7b8ba30e27c3b2f60b5ba59032f3036c9bbbfcd8c2d61be745f917cc6af4466783a994d2692964545f59b9d76617df5b12348ca4e8103b7a26ca3db75b1ac693f0300123647200ef91a472a63d7496c8e0e87c5b7c92f2fcacece0a53d990153161da37580b933aae2058c586bc2e3c48bbe3ad50e77fa811642e2a21aae6738543d21332346a1c86086dded743694e02df441f11d6be07d3016e063909b3122cd943fb179cdcb944d24049c30277da8b31aea9a5422942710d05ace19c5e9e4ad4c5fa876f634e0c432af1f318f9a2d90cef2415ac203811 public exponent: 10001 ] 2022-06-08 08:00:04.657 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 08:00:04.658 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 08:00:04.660 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-08 08:00:04.660 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 08:00:04.661 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-08 08:00:04.661 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 08:00:04.662 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 08:00:04.662 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 08:00:04.662 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 08:00:04.663 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 08:00:04.667 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 08:00:04.667 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 08:00:04.667 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 08:00:04.667 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 08:00:04.758 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 08:00:04.758 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 08:00:04.759 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 08:00:04.759 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 08:00:04.761 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 08:00:04.762 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 08:00:04.762 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 08:00:04.763 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 08:00:04.763 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 08:00:04.764 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 08:00:04.764 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 08:00:04.765 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 08:00:04.765 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 08:00:04.765 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 08:00:04.765 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 08:00:04.766 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 08:00:04.769 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509415271303144873057533481101930615417384766864 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 02:07:12 UTC 2022 Final Date: Mon Jun 07 02:07:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c] modulus: af10753b488b556abf38bd25a8baecd4ac09c4a0062434e27a2d290d3f6c3f9f4a5e5b9c06a8cae8a7560c915afb6913166b45f776a6f03f54ff4079c85da8f4791024c4b32bf8c0c1cdddc5e9ee4b296b1e02a8f51df0b47c646a902c38de0a6b8077ccd58ab88c340226415b8756f9f1b7c52452724d0f22a707558718c1075c0250bfaaeabae470aeb31559b6c22249da326a54ef02872f98f3bd556c1be6439942817e83617351ddf0240e0eaa8b072afc1cb29f609fee85f41dde39fae70f682498344ff9703343693cee92fa277b6e4fc0d51b96598d06f3382902e95b2da84032325cf86eb4ed1094afaf7f8b667ca985efc0a9f251cf54449638dcfedff007554dd9551919bf45a577a5791423ced68fa0020275bb2a9d6172b4fd9fc9a05afb848ac0cc72967141475b40dff3161f567c4ba5f02aeaa72562dfb7a3070d90616154223120314d7370c63089e3203b67874c2eef068daba33f307f61e892ecdd2dc90d9cc15d8255019b43f27b327f8248b1eff806bad66f5efacb0d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c 4f78fae73d0a43ae507937677d9d03df866c1428 3c7d1fa3da2cc870f02940c925afca0e32a49f1c 46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5 0b9bfb15a94a8bf3b21fa604e3c1861c24225b95 6ba2d0d6835222c563e7e83b63022c3ba7dd139a 7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2 5e288033479c8583ec245dd06c41da90bec07598 d84695be959f6f0c92ad3fd3ae57d15a0af7141b a785ff6fba2f37610775c4592c695a0e7dc66cef 1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f 40132611603d1efccf094148c9b45b187ba19122 b26312166b052827daa08c61e8e2a5cc3f8fc467 7d43d108dccb1c2420f35e9ad9988f1f142aaebd 341ecf46a8eb77667d593a5a5c5c64231ac5b500 508e4f43357c1fafc5da827514279daba2ffad9e b462707b3760d8f3c8b4668668f181f7fe89529d 59ba9bd7bc45561b8b7be38e17464fc380985569 29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e 026f2ca4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ff:8b:ff:51:32:f4:be:a1:7f:62:2e:da:12:d5:fc:ea:3d:49:c5:23] modulus: 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 public exponent: 10001 ] 2022-06-08 08:01:26.327 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 08:01:26.329 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 08:01:26.330 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-08 08:01:26.331 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 08:01:26.331 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-08 08:01:26.331 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 08:01:26.332 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 08:01:26.332 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 08:01:26.332 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 08:01:26.333 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 08:01:26.338 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 08:01:26.338 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 08:01:26.338 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 08:01:26.338 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 08:01:26.423 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 08:01:26.424 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 08:01:26.424 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 08:01:26.424 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 08:01:26.426 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 08:01:26.426 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 08:01:26.427 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 08:01:26.427 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 08:01:26.427 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 08:01:26.428 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 08:01:26.429 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 08:01:26.429 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 08:01:26.429 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 08:01:26.430 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 08:01:26.430 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 08:01:26.431 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 08:01:26.439 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509415271303144873057533481101930615417384766864 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 02:07:12 UTC 2022 Final Date: Mon Jun 07 02:07:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c 4f78fae73d0a43ae507937677d9d03df866c1428 3c7d1fa3da2cc870f02940c925afca0e32a49f1c 46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5 0b9bfb15a94a8bf3b21fa604e3c1861c24225b95 6ba2d0d6835222c563e7e83b63022c3ba7dd139a 7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2 5e288033479c8583ec245dd06c41da90bec07598 d84695be959f6f0c92ad3fd3ae57d15a0af7141b a785ff6fba2f37610775c4592c695a0e7dc66cef 1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f 40132611603d1efccf094148c9b45b187ba19122 b26312166b052827daa08c61e8e2a5cc3f8fc467 7d43d108dccb1c2420f35e9ad9988f1f142aaebd 341ecf46a8eb77667d593a5a5c5c64231ac5b500 508e4f43357c1fafc5da827514279daba2ffad9e b462707b3760d8f3c8b4668668f181f7fe89529d 59ba9bd7bc45561b8b7be38e17464fc380985569 29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e 026f2ca4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [05:cc:6c:f2:49:7c:14:89:c0:f3:95:dc:46:36:b3:27:1f:a3:91:5e] modulus: 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 public exponent: 10001 ] 2022-06-08 08:03:51.033 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 08:03:51.034 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 08:03:51.036 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-08 08:03:51.036 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 08:03:51.037 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-08 08:03:51.037 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 08:03:51.037 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 08:03:51.038 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 08:03:51.038 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 08:03:51.038 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 08:03:51.044 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 08:03:51.044 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 08:03:51.045 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 08:03:51.045 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 08:03:51.191 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 08:03:51.191 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 08:03:51.192 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 08:03:51.192 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 08:03:51.194 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 08:03:51.194 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 08:03:51.195 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 08:03:51.196 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 08:03:51.196 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 08:03:51.197 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 08:03:51.197 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 08:03:51.198 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 08:03:51.199 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 08:03:51.199 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 08:03:51.199 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 08:03:51.200 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 08:03:51.291 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509415271303144873057533481101930615417384766864 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 02:07:12 UTC 2022 Final Date: Mon Jun 07 02:07:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c 4f78fae73d0a43ae507937677d9d03df866c1428 3c7d1fa3da2cc870f02940c925afca0e32a49f1c 46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5 0b9bfb15a94a8bf3b21fa604e3c1861c24225b95 6ba2d0d6835222c563e7e83b63022c3ba7dd139a 7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2 5e288033479c8583ec245dd06c41da90bec07598 d84695be959f6f0c92ad3fd3ae57d15a0af7141b a785ff6fba2f37610775c4592c695a0e7dc66cef 1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f 40132611603d1efccf094148c9b45b187ba19122 b26312166b052827daa08c61e8e2a5cc3f8fc467 7d43d108dccb1c2420f35e9ad9988f1f142aaebd 341ecf46a8eb77667d593a5a5c5c64231ac5b500 508e4f43357c1fafc5da827514279daba2ffad9e b462707b3760d8f3c8b4668668f181f7fe89529d 59ba9bd7bc45561b8b7be38e17464fc380985569 29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e 026f2ca4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [87:5e:f4:75:cb:e2:55:35:18:0d:d3:70:18:5c:33:32:db:13:fa:a1] modulus: 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 public exponent: 10001 ] 2022-06-08 08:07:52.652 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-06-08 08:07:52.653 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-06-08 08:07:52.655 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 08:07:52.656 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-08 08:07:52.656 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-08 08:07:52.657 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-06-08 08:07:52.657 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-06-08 08:07:52.657 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-06-08 08:07:52.657 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-06-08 08:07:52.658 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-06-08 08:07:52.662 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-06-08 08:07:52.663 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 08:07:52.663 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-06-08 08:07:52.663 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 08:07:52.768 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-06-08 08:07:52.768 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-06-08 08:07:52.768 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-06-08 08:07:52.768 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-06-08 08:07:52.770 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-06-08 08:07:52.770 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-06-08 08:07:52.770 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 08:07:52.770 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 08:07:52.771 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 08:07:52.771 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 08:07:52.771 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 08:07:52.771 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 08:07:52.772 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-08 08:07:52.772 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-06-08 08:07:52.773 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-06-08 08:07:52.773 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-08 08:07:52.792 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 509415271303144873057533481101930615417384766864 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 08 02:07:12 UTC 2022 Final Date: Mon Jun 07 02:07:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:6c:de:7c:bf:6f:15:10:7a:08:ff:e0:7b:ad:c9:f7:f8:3e:45:0c] modulus: af10753b488b556abf38bd25a8baecd4ac09c4a0062434e27a2d290d3f6c3f9f4a5e5b9c06a8cae8a7560c915afb6913166b45f776a6f03f54ff4079c85da8f4791024c4b32bf8c0c1cdddc5e9ee4b296b1e02a8f51df0b47c646a902c38de0a6b8077ccd58ab88c340226415b8756f9f1b7c52452724d0f22a707558718c1075c0250bfaaeabae470aeb31559b6c22249da326a54ef02872f98f3bd556c1be6439942817e83617351ddf0240e0eaa8b072afc1cb29f609fee85f41dde39fae70f682498344ff9703343693cee92fa277b6e4fc0d51b96598d06f3382902e95b2da84032325cf86eb4ed1094afaf7f8b667ca985efc0a9f251cf54449638dcfedff007554dd9551919bf45a577a5791423ced68fa0020275bb2a9d6172b4fd9fc9a05afb848ac0cc72967141475b40dff3161f567c4ba5f02aeaa72562dfb7a3070d90616154223120314d7370c63089e3203b67874c2eef068daba33f307f61e892ecdd2dc90d9cc15d8255019b43f27b327f8248b1eff806bad66f5efacb0d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: acb3b573036e907f64cda2bc4eda3d56bddbed9c 4f78fae73d0a43ae507937677d9d03df866c1428 3c7d1fa3da2cc870f02940c925afca0e32a49f1c 46b7884e905b8e0dfd8e08efde82a1f2d2bdf6a5 0b9bfb15a94a8bf3b21fa604e3c1861c24225b95 6ba2d0d6835222c563e7e83b63022c3ba7dd139a 7abcd2ef5f7c2e25f4f6b334381fef31fb9164a2 5e288033479c8583ec245dd06c41da90bec07598 d84695be959f6f0c92ad3fd3ae57d15a0af7141b a785ff6fba2f37610775c4592c695a0e7dc66cef 1e20660f007b1cc21fc0d62a77d97b77c1bd4d5f 40132611603d1efccf094148c9b45b187ba19122 b26312166b052827daa08c61e8e2a5cc3f8fc467 7d43d108dccb1c2420f35e9ad9988f1f142aaebd 341ecf46a8eb77667d593a5a5c5c64231ac5b500 508e4f43357c1fafc5da827514279daba2ffad9e b462707b3760d8f3c8b4668668f181f7fe89529d 59ba9bd7bc45561b8b7be38e17464fc380985569 29f80cfbc1eec6e2c3c8d6b15ad7485e941fcc2e 026f2ca4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e7:36:dd:60:58:71:92:30:29:18:cc:03:37:80:d8:02:24:8e:0c:a9] modulus: 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 public exponent: 10001 ]