By type
2023-01-07 03:01:55,399 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-07 03:01:57,054 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-07 03:01:57.846 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jan 07, 2023 3:02:00 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 07, 2023 3:02:00 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 07, 2023 3:02:00 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 07, 2023 3:02:00 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-07 03:02:00.733 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-07 03:02:01.067 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-01-07 03:02:01.261 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-07 03:02:02.081 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-07 03:02:02.087 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-07 03:02:02.090 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-07 03:02:02.097 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-07 03:02:02.153 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-07 03:02:02.160 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-01-07 03:02:02.342 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-01-07 03:02:03.035 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 07, 2023 3:02:03 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-07 03:02:04.000 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 9.679 seconds (JVM running for 11.848) Jan 07, 2023 3:02:22 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-07 03:03:13.705 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 03:03:13.721 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 03:03:13.815 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-07 03:03:13.837 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 03:03:13.885 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-07 03:03:13.889 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 03:03:13.891 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 03:03:13.894 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 03:03:13.895 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 03:03:13.901 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 03:03:13.961 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 03:03:13.973 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 03:03:14.077 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 03:03:14.094 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 03:03:14.095 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 03:03:14.099 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 03:03:14.949 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 03:03:14.955 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 03:03:14.956 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 03:03:14.957 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 03:03:14.968 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 03:03:14.969 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 03:03:14.970 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 03:03:14.970 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 03:03:14.971 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 03:03:14.989 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 03:03:14.990 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 03:03:14.990 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 03:03:15.002 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 03:03:15.003 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 03:03:15.003 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 03:03:15.005 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 03:03:15.308 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3a:8f:40:a4:e8:37:37:e9:cf:e0:e7:fa:9f:c6:27:8d:30:57:f8:ff],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 09:15:13.388 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 09:15:13.393 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 09:15:13.401 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 09:15:13.404 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 09:15:13.405 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 09:15:13.406 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 09:15:13.408 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 09:15:13.409 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 09:15:13.410 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 09:15:13.411 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 09:15:13.422 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 09:15:13.424 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 09:15:13.425 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 09:15:13.425 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:15:13.639 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 09:15:13.641 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 09:15:13.641 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 09:15:13.642 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:15:13.645 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 09:15:13.646 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 09:15:13.646 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:15:13.647 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:15:13.647 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:15:13.649 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:15:13.650 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:15:13.650 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:15:13.651 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:15:13.652 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:15:13.652 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:15:13.654 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 09:15:13.661 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:74:49:2f:6b:31:c6:e3:b3:b3:f4:0b:ce:9b:a7:0f:38:9e:54:c9],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 09:17:15.808 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 09:17:15.810 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 09:17:15.813 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-07 09:17:15.815 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 09:17:15.815 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-07 09:17:15.816 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 09:17:15.817 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 09:17:15.818 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 09:17:15.819 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 09:17:15.821 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 09:17:15.826 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 09:17:15.831 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 09:17:15.832 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 09:17:15.833 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:17:15.947 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 09:17:15.948 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 09:17:15.948 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 09:17:15.949 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:17:15.953 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 09:17:15.954 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 09:17:15.954 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:17:15.955 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:17:15.955 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:17:15.957 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:17:15.957 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:17:15.957 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:17:15.958 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:17:15.959 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:17:15.959 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:17:15.961 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 09:17:15.965 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [13:38:63:1b:d3:18:29:4d:0a:bd:d9:e8:9c:d1:12:15:f2:ec:23:71],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 09:19:27.833 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 09:19:27.836 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 09:19:27.838 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-07 09:19:27.839 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 09:19:27.840 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-07 09:19:27.840 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 09:19:27.841 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 09:19:27.842 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 09:19:27.842 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 09:19:27.843 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 09:19:27.847 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 09:19:27.850 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 09:19:27.851 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 09:19:27.851 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:19:27.966 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 09:19:27.967 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 09:19:27.968 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 09:19:27.968 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:19:27.971 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 09:19:27.972 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 09:19:27.973 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:19:27.973 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:19:27.974 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:19:27.975 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:19:27.976 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:19:27.976 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:19:27.978 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:19:27.978 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:19:27.979 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:19:27.980 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 09:19:27.992 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:8e:75:82:7a:08:b3:5d:64:4c:82:0f:87:32:fd:87:ac:c2:eb:24],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 09:22:07.313 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 09:22:07.315 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 09:22:07.317 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 09:22:07.317 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 09:22:07.317 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 09:22:07.318 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 09:22:07.322 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 09:22:07.324 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 09:22:07.324 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 09:22:07.325 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 09:22:07.344 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 09:22:07.345 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 09:22:07.345 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 09:22:07.345 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:22:07.508 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 09:22:07.509 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 09:22:07.509 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 09:22:07.510 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:22:07.512 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 09:22:07.514 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 09:22:07.514 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:22:07.515 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:22:07.516 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:22:07.518 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:22:07.519 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:22:07.519 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:22:07.521 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:22:07.521 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:22:07.522 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:22:07.523 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 09:22:07.527 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:21:05:9a:98:73:20:62:29:90:e2:22:f2:92:1a:8e:7b:06:82:bd],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 09:29:34.309 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 09:29:34.317 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 09:29:34.322 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 09:29:34.324 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 09:29:34.325 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 09:29:34.326 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 09:29:34.327 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 09:29:34.328 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 09:29:34.329 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 09:29:34.330 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 09:29:34.337 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 09:29:34.338 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 09:29:34.339 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 09:29:34.340 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:29:34.482 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 09:29:34.483 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 09:29:34.483 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 09:29:34.483 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:29:34.485 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 09:29:34.486 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 09:29:34.486 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:29:34.487 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:29:34.487 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:29:34.489 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:29:34.489 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:29:34.490 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:29:34.491 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:29:34.491 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:29:34.491 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:29:34.492 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 09:29:34.496 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:25:e4:a5:31:cc:2b:6c:98:52:7c:fd:04:ae:23:6f:31:09:6e:83],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 09:35:33.937 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 09:35:33.942 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 09:35:33.945 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 09:35:33.946 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 09:35:33.947 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 09:35:33.947 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 09:35:33.948 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 09:35:33.948 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 09:35:33.949 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 09:35:33.950 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 09:35:33.955 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 09:35:33.956 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 09:35:33.957 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 09:35:33.957 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:35:34.085 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 09:35:34.086 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 09:35:34.086 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 09:35:34.087 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:35:34.088 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 09:35:34.089 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 09:35:34.089 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:35:34.090 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:35:34.090 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:35:34.091 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:35:34.091 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:35:34.092 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:35:34.093 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:35:34.094 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:35:34.094 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:35:34.095 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 09:35:34.101 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [37:b3:53:0e:48:9e:be:d5:8a:97:30:7f:6d:fe:2e:5c:1a:82:81:da],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 09:42:56.012 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 09:42:56.014 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 09:42:56.016 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-07 09:42:56.017 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 09:42:56.017 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-07 09:42:56.018 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 09:42:56.018 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 09:42:56.019 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 09:42:56.019 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 09:42:56.019 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 09:42:56.023 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 09:42:56.024 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 09:42:56.024 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 09:42:56.025 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:42:56.162 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 09:42:56.163 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 09:42:56.163 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 09:42:56.163 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:42:56.164 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 09:42:56.165 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 09:42:56.165 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:42:56.166 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:42:56.166 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:42:56.168 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:42:56.168 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:42:56.169 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:42:56.169 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:42:56.170 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:42:56.170 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:42:56.171 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 09:42:56.175 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:cd:35:a9:ab:e5:1d:53:41:e7:e7:1d:23:2c:0e:17:09:f7:2a:36],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 09:50:41.306 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 09:50:41.309 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 09:50:41.312 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-07 09:50:41.313 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 09:50:41.313 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-07 09:50:41.314 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 09:50:41.315 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 09:50:41.315 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 09:50:41.316 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 09:50:41.316 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 09:50:41.321 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 09:50:41.322 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 09:50:41.322 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 09:50:41.323 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:50:41.470 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 09:50:41.471 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 09:50:41.471 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 09:50:41.472 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:50:41.473 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 09:50:41.474 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 09:50:41.474 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:50:41.474 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:50:41.475 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:50:41.476 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:50:41.477 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:50:41.477 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:50:41.479 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:50:41.479 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:50:41.480 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:50:41.481 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 09:50:41.485 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:e8:9f:98:89:50:94:8a:03:20:15:86:c9:64:b4:cf:11:c9:81:69],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 09:51:00.274 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 09:51:00.276 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 09:51:00.278 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-07 09:51:00.279 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 09:51:00.280 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-07 09:51:00.281 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 09:51:00.281 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 09:51:00.282 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 09:51:00.283 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 09:51:00.283 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 09:51:00.289 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 09:51:00.291 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 09:51:00.291 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 09:51:00.292 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:51:00.395 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 09:51:00.395 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 09:51:00.396 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 09:51:00.396 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:51:00.398 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 09:51:00.398 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 09:51:00.399 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:51:00.399 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:51:00.400 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:51:00.400 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:51:00.401 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:51:00.401 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:51:00.402 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:51:00.402 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:51:00.402 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:51:00.403 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 09:51:00.406 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d0:52:fb:37:17:1b:2d:89:6d:0d:01:38:d7:20:c4:40:6f:96:4b:85],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 10:16:58.370 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 10:16:58.373 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 10:16:58.377 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-07 10:16:58.378 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 10:16:58.379 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-07 10:16:58.379 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 10:16:58.380 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 10:16:58.380 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 10:16:58.381 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 10:16:58.381 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 10:16:58.385 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 10:16:58.387 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 10:16:58.387 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 10:16:58.387 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 10:16:58.537 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 10:16:58.537 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 10:16:58.538 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 10:16:58.538 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 10:16:58.540 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 10:16:58.540 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 10:16:58.540 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 10:16:58.541 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 10:16:58.541 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 10:16:58.542 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 10:16:58.542 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 10:16:58.543 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 10:16:58.544 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 10:16:58.544 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 10:16:58.544 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 10:16:58.545 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 10:16:58.549 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [82:f9:0b:60:41:bb:e9:7f:3e:a9:f6:cf:f4:fd:8b:9b:29:6b:d3:2b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 10:17:05.723 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 10:17:05.724 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 10:17:05.725 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-07 10:17:05.726 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 10:17:05.726 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-07 10:17:05.727 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 10:17:05.727 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 10:17:05.728 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 10:17:05.728 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 10:17:05.728 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 10:17:05.733 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 10:17:05.734 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 10:17:05.734 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 10:17:05.735 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 10:17:05.833 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 10:17:05.834 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 10:17:05.835 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 10:17:05.835 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 10:17:05.836 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 10:17:05.837 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 10:17:05.837 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 10:17:05.838 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 10:17:05.838 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 10:17:05.839 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 10:17:05.840 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 10:17:05.840 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 10:17:05.841 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 10:17:05.841 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 10:17:05.842 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 10:17:05.843 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 10:17:05.847 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 96ea6d7c5b369bf05b0ebe2804a4b14f30154a256f84f369dcb0e1f47823404af5a760e8ae0910734bfa058a0519af616d85df2858351ff492705a3b3700e97a2111a50022bc8fe38edacee9cf8c7c4340c914b8956c2a65e7fec7716d35a9d71db8057f5494543e2251e1660e9fbab76ce692937db23e2a384b46219915750f301b268fd01fa00093bf4d1cf3db269e3182103be1eb604397f958816f10518029b94631859d632940bb86892fede90a09c52ef7cccd3aba2b28d9a3b351ed8a13792c9200c94063a18b6def96737d6782a7f4fcd449463737fd9e1344ef7444ac478ceed760087b617e385872e1e98a5c8768fddd4bef584152fc4a9def4f731e340e4a5a648b37e3ebdd7e0e13a8897032c9f8af9e18acd91ab6fabdabd950261d97329ae19e703c4193c9e19b5cdee5b383621443a9349a5d5128388a1e31b45c1a6a0d0c38d979d3b97fd5ff83e76ebdb89db6b40256a3a2c7c1997cefb09209e6987bc549b88088985dd915447200e8981c227fe9cecbfafa3fa24b8acb public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:da:80:21:48:59:9f:80:85:4a:43:ca:0c:04:5c:0e:12:90:aa:8e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]