By type
2022-05-20 18:23:45,299 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-20 18:23:49,696 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-20 18:23:52.893 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default May 20, 2022 6:24:02 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 20, 2022 6:24:02 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 20, 2022 6:24:02 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 20, 2022 6:24:02 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-20 18:24:04.588 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-20 18:24:05.811 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-05-20 18:24:06.403 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-20 18:24:09.798 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-20 18:24:09.800 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-05-20 18:24:09.801 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-20 18:24:09.805 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-20 18:24:10.090 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-20 18:24:10.092 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-05-20 18:24:10.590 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-05-20 18:24:15.086 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 20, 2022 6:24:18 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-20 18:24:19.484 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 37.801 seconds (JVM running for 45.349) May 20, 2022 6:24:26 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-20 18:25:19.498 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 18:25:19.598 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 18:25:19.712 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-20 18:25:19.715 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 18:25:19.793 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-20 18:25:19.796 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 18:25:19.796 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 18:25:19.797 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 18:25:19.798 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 18:25:19.801 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 18:25:19.887 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 18:25:19.890 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 18:25:20.000 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 18:25:20.004 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 18:25:20.004 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 18:25:20.084 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 18:25:21.469 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 18:25:21.471 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 18:25:21.471 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 18:25:21.473 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 18:25:21.479 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 18:25:21.480 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 18:25:21.481 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 18:25:21.481 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 18:25:21.481 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 18:25:21.492 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 18:25:21.492 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 18:25:21.492 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 18:25:21.497 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 18:25:21.497 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 18:25:21.497 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 18:25:21.498 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 18:25:21.602 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 3218719463060024673605947257523774989138728131 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 18:19:34 UTC 2022 Final Date: Wed May 19 18:19:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [71:66:79:e6:d6:6e:41:b3:5d:38:d5:47:b2:da:21:09:e0:34:1a:8e] modulus: 8a3ce6bfcd4ec1470d5e6499f57a1108544aedf4856b64e8f185984dd25f784e6e04991e1797c35da2a3b552733b98ae7df59a1e57f60fa10016a052071e1bea9fa6ab61462b128a8f3da0b5db60c3a246914846744c0930d3bd7dbebaa877897a0af52bae4603227fdcefb7f9b22f12da6857a20f596c1dee4995f58e15fe6eef29df8f5d005e25582090cf9118e7913187a68a3ff81520efddf72233cd0e3be788d1f32ce499d529e52d0298cb91425ebb8062da2ae8e9badf14c5043bfd2e0575507dfa52210f12bb12429741b42b7bffd022680e17cb621b671a86f4d5d1d4a65cb38a3733cbfdd3839e6856dc3ba534553035663b083aef980333b8af270d4e38020e545307d30cbd1d59c8b6c1d91d7617525086e4327fc28906bf8d3417595737019f84a24b63ddf6e58c067dc233b34dcb6c5606e91a2078db8e6eb29d96eea932867b44e74b87d75d57bdf2a3bced9de567d7cc7bff16e94c2eb4aeff714995e620c8d5f1bb2db1b2bdb12e74a7b08460dd0fd05d969367fc6e55a1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4cf008e50684babae09b1d76d3e0132dc26b3d92 7acaaccefbd77f6f2716cbffd27d861fb56c10b2 49ee997178482fc5bf90f45605f49e8199c3c9ba b4d42f341ba1abe2f52c6edda4fa6e67b1883c30 5a99aed75a300fc4d209b477691cb712f99a5b75 42e8798ef843acde040858cf530f348a6c3e32c1 9f43baed1f536897b78f1933b94c6709a1640cd1 5cba12e57492e736bc208136cedc04c115afbbcf 29ca94ab11c30b0f07c1f58acc0014e2b93694b3 896a7fabca9e187cceb9b9e5b858db26efd2ae84 c1020407847f1fcdfafecb2bb08d6a6600b4a02c e0b38aa7cbafc19f2634b01e39d00f471b12aa2a 45267b712f15ed6462a58337fe46da4e5270e4b7 b795fc39d0a3be92cf244bfdff982417ed339318 2b0c886049afd0b4bca93e1b5d937b10000fdc06 a2c3dbe916aeb5ec981109d022b6f78c37d16d01 2ba0f019dfa164224245c95926fba1eed2a16d04 d119f356a225b95e6a1cb9ebefe63ab495e0877d f67888810998f94dc9ab2ffe09752106a8050116 108c55d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [76:ed:8a:34:40:13:1c:45:78:ac:5c:08:f7:a2:6a:13:77:a7:ef:1d] modulus: b7a71c4015d81197dca1fff6487a038171084cdae29bcac6ee14647cde58fbea67ffc95edbf62f8f4397bbe2cee2d1afb7e66dcbdbd16380f178cc00977eb8a25e98039cc8a10b1f3bab6bdc95351011c2b149a818afca6bb1409bf005f17dab49871829af1bb9ef9db17009a7870c0da6820b207904e0ca731028c7876ab03e7690fb4ebc6476f28d7da06b77f3d5933e47dd98fd6d7b3fa7b5ade5ce65ae7614ea4fc6dcf4a03df1df2edfcda61b4843af0e82cf9b480cce3c15cf54dcfb6247b189b2e6b89c1accf40a6b513a827a94f4ad38257acc590c42ad6c337e6cdb823e5143460ce6f001e68fa36d70e39337a46bd1b342f61b95fef20a760b4a13 public exponent: 10001 ] 2022-05-20 22:56:35.671 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 22:56:35.672 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 22:56:35.673 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 22:56:35.674 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 22:56:35.675 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 22:56:35.676 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 22:56:35.677 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 22:56:35.677 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 22:56:35.677 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 22:56:35.678 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 22:56:35.687 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 22:56:35.688 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 22:56:35.689 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 22:56:35.689 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 22:56:35.901 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 22:56:35.902 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 22:56:35.902 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 22:56:35.903 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 22:56:35.908 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 22:56:35.909 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 22:56:35.909 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 22:56:35.910 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 22:56:35.910 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 22:56:35.982 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 22:56:35.983 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 22:56:35.983 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 22:56:35.984 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 22:56:35.985 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 22:56:35.985 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 22:56:35.986 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 22:56:35.990 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 3218719463060024673605947257523774989138728131 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 18:19:34 UTC 2022 Final Date: Wed May 19 18:19:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [71:66:79:e6:d6:6e:41:b3:5d:38:d5:47:b2:da:21:09:e0:34:1a:8e] modulus: 8a3ce6bfcd4ec1470d5e6499f57a1108544aedf4856b64e8f185984dd25f784e6e04991e1797c35da2a3b552733b98ae7df59a1e57f60fa10016a052071e1bea9fa6ab61462b128a8f3da0b5db60c3a246914846744c0930d3bd7dbebaa877897a0af52bae4603227fdcefb7f9b22f12da6857a20f596c1dee4995f58e15fe6eef29df8f5d005e25582090cf9118e7913187a68a3ff81520efddf72233cd0e3be788d1f32ce499d529e52d0298cb91425ebb8062da2ae8e9badf14c5043bfd2e0575507dfa52210f12bb12429741b42b7bffd022680e17cb621b671a86f4d5d1d4a65cb38a3733cbfdd3839e6856dc3ba534553035663b083aef980333b8af270d4e38020e545307d30cbd1d59c8b6c1d91d7617525086e4327fc28906bf8d3417595737019f84a24b63ddf6e58c067dc233b34dcb6c5606e91a2078db8e6eb29d96eea932867b44e74b87d75d57bdf2a3bced9de567d7cc7bff16e94c2eb4aeff714995e620c8d5f1bb2db1b2bdb12e74a7b08460dd0fd05d969367fc6e55a1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4cf008e50684babae09b1d76d3e0132dc26b3d92 7acaaccefbd77f6f2716cbffd27d861fb56c10b2 49ee997178482fc5bf90f45605f49e8199c3c9ba b4d42f341ba1abe2f52c6edda4fa6e67b1883c30 5a99aed75a300fc4d209b477691cb712f99a5b75 42e8798ef843acde040858cf530f348a6c3e32c1 9f43baed1f536897b78f1933b94c6709a1640cd1 5cba12e57492e736bc208136cedc04c115afbbcf 29ca94ab11c30b0f07c1f58acc0014e2b93694b3 896a7fabca9e187cceb9b9e5b858db26efd2ae84 c1020407847f1fcdfafecb2bb08d6a6600b4a02c e0b38aa7cbafc19f2634b01e39d00f471b12aa2a 45267b712f15ed6462a58337fe46da4e5270e4b7 b795fc39d0a3be92cf244bfdff982417ed339318 2b0c886049afd0b4bca93e1b5d937b10000fdc06 a2c3dbe916aeb5ec981109d022b6f78c37d16d01 2ba0f019dfa164224245c95926fba1eed2a16d04 d119f356a225b95e6a1cb9ebefe63ab495e0877d f67888810998f94dc9ab2ffe09752106a8050116 108c55d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [50:1a:e7:b6:62:a4:75:78:51:5f:7c:c3:08:9c:0c:09:e9:6e:c6:a0] modulus: c760a09947b60c1beb90248cc6c8fe654857ef4a7e599583b093c331929416397afb0234489cc23ae5955f9bd11d186f7f8aad9dcf178806009a2efffafb08f282f3dd2d4d86b1a133661cafc012100a1569ab233b7b633b5f602e075724aaf497d4f097eeb5c49c2ffe269c2b9fb9fd06f7f96c4ec2c8aadf6ed709438087579879244b5c311702ca2c80b4861a2eb0e35350eb92cd3a22a2984d7948feede11414c28c039b594e2b88da37f98a46f1c528f35cfe9993285120e70a889c05b8deb27dc2cf7b580778c467260309ee2fd71d95b4197bccf15f483de716f364abee3f21c4cf430e92f25976411d1e8528bc757118c83a9aa9c48c61c16a181c35 public exponent: 10001 ] 2022-05-20 23:05:26.692 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 23:05:26.694 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 23:05:26.697 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 23:05:26.698 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 23:05:26.698 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 23:05:26.699 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 23:05:26.699 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 23:05:26.700 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 23:05:26.700 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 23:05:26.700 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 23:05:26.707 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 23:05:26.707 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 23:05:26.707 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 23:05:26.708 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 23:05:26.893 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 23:05:26.894 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 23:05:26.895 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 23:05:26.895 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 23:05:26.897 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 23:05:26.898 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 23:05:26.899 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:05:26.899 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:05:26.899 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:05:26.900 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:05:26.901 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:05:26.901 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:05:26.901 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:05:26.901 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:05:26.902 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:05:26.902 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 23:05:26.905 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 3218719463060024673605947257523774989138728131 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 18:19:34 UTC 2022 Final Date: Wed May 19 18:19:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [71:66:79:e6:d6:6e:41:b3:5d:38:d5:47:b2:da:21:09:e0:34:1a:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4cf008e50684babae09b1d76d3e0132dc26b3d92 7acaaccefbd77f6f2716cbffd27d861fb56c10b2 49ee997178482fc5bf90f45605f49e8199c3c9ba b4d42f341ba1abe2f52c6edda4fa6e67b1883c30 5a99aed75a300fc4d209b477691cb712f99a5b75 42e8798ef843acde040858cf530f348a6c3e32c1 9f43baed1f536897b78f1933b94c6709a1640cd1 5cba12e57492e736bc208136cedc04c115afbbcf 29ca94ab11c30b0f07c1f58acc0014e2b93694b3 896a7fabca9e187cceb9b9e5b858db26efd2ae84 c1020407847f1fcdfafecb2bb08d6a6600b4a02c e0b38aa7cbafc19f2634b01e39d00f471b12aa2a 45267b712f15ed6462a58337fe46da4e5270e4b7 b795fc39d0a3be92cf244bfdff982417ed339318 2b0c886049afd0b4bca93e1b5d937b10000fdc06 a2c3dbe916aeb5ec981109d022b6f78c37d16d01 2ba0f019dfa164224245c95926fba1eed2a16d04 d119f356a225b95e6a1cb9ebefe63ab495e0877d f67888810998f94dc9ab2ffe09752106a8050116 108c55d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:af:37:e4:fa:d9:30:c5:7f:e5:bd:a0:38:98:9b:e0:2b:4b:ab:ce] modulus: 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 public exponent: 10001 ] 2022-05-20 23:09:31.447 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 23:09:31.448 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 23:09:31.449 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-20 23:09:31.450 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 23:09:31.451 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-20 23:09:31.451 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 23:09:31.452 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 23:09:31.452 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 23:09:31.452 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 23:09:31.453 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 23:09:31.457 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 23:09:31.458 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 23:09:31.458 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 23:09:31.458 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 23:09:31.612 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 23:09:31.613 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 23:09:31.614 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 23:09:31.614 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 23:09:31.617 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 23:09:31.617 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 23:09:31.618 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:09:31.618 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:09:31.618 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:09:31.619 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:09:31.619 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:09:31.620 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:09:31.620 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:09:31.621 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:09:31.621 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:09:31.622 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 23:09:31.625 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 3218719463060024673605947257523774989138728131 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 18:19:34 UTC 2022 Final Date: Wed May 19 18:19:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [71:66:79:e6:d6:6e:41:b3:5d:38:d5:47:b2:da:21:09:e0:34:1a:8e] modulus: 8a3ce6bfcd4ec1470d5e6499f57a1108544aedf4856b64e8f185984dd25f784e6e04991e1797c35da2a3b552733b98ae7df59a1e57f60fa10016a052071e1bea9fa6ab61462b128a8f3da0b5db60c3a246914846744c0930d3bd7dbebaa877897a0af52bae4603227fdcefb7f9b22f12da6857a20f596c1dee4995f58e15fe6eef29df8f5d005e25582090cf9118e7913187a68a3ff81520efddf72233cd0e3be788d1f32ce499d529e52d0298cb91425ebb8062da2ae8e9badf14c5043bfd2e0575507dfa52210f12bb12429741b42b7bffd022680e17cb621b671a86f4d5d1d4a65cb38a3733cbfdd3839e6856dc3ba534553035663b083aef980333b8af270d4e38020e545307d30cbd1d59c8b6c1d91d7617525086e4327fc28906bf8d3417595737019f84a24b63ddf6e58c067dc233b34dcb6c5606e91a2078db8e6eb29d96eea932867b44e74b87d75d57bdf2a3bced9de567d7cc7bff16e94c2eb4aeff714995e620c8d5f1bb2db1b2bdb12e74a7b08460dd0fd05d969367fc6e55a1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4cf008e50684babae09b1d76d3e0132dc26b3d92 7acaaccefbd77f6f2716cbffd27d861fb56c10b2 49ee997178482fc5bf90f45605f49e8199c3c9ba b4d42f341ba1abe2f52c6edda4fa6e67b1883c30 5a99aed75a300fc4d209b477691cb712f99a5b75 42e8798ef843acde040858cf530f348a6c3e32c1 9f43baed1f536897b78f1933b94c6709a1640cd1 5cba12e57492e736bc208136cedc04c115afbbcf 29ca94ab11c30b0f07c1f58acc0014e2b93694b3 896a7fabca9e187cceb9b9e5b858db26efd2ae84 c1020407847f1fcdfafecb2bb08d6a6600b4a02c e0b38aa7cbafc19f2634b01e39d00f471b12aa2a 45267b712f15ed6462a58337fe46da4e5270e4b7 b795fc39d0a3be92cf244bfdff982417ed339318 2b0c886049afd0b4bca93e1b5d937b10000fdc06 a2c3dbe916aeb5ec981109d022b6f78c37d16d01 2ba0f019dfa164224245c95926fba1eed2a16d04 d119f356a225b95e6a1cb9ebefe63ab495e0877d f67888810998f94dc9ab2ffe09752106a8050116 108c55d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [16:44:ec:2e:a2:49:fb:8b:44:d5:fb:23:4d:16:7f:17:ae:17:31:d2] modulus: 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 public exponent: 10001 ] 2022-05-20 23:10:24.235 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 23:10:24.236 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 23:10:24.238 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 23:10:24.238 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 23:10:24.239 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 23:10:24.239 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 23:10:24.240 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 23:10:24.240 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 23:10:24.241 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 23:10:24.241 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 23:10:24.245 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 23:10:24.246 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 23:10:24.246 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 23:10:24.246 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 23:10:24.337 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 23:10:24.338 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 23:10:24.338 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 23:10:24.339 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 23:10:24.341 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 23:10:24.341 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 23:10:24.342 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:10:24.342 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:10:24.343 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:10:24.382 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:10:24.382 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:10:24.383 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:10:24.384 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:10:24.385 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:10:24.385 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:10:24.387 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 23:10:24.390 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 3218719463060024673605947257523774989138728131 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 18:19:34 UTC 2022 Final Date: Wed May 19 18:19:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [71:66:79:e6:d6:6e:41:b3:5d:38:d5:47:b2:da:21:09:e0:34:1a:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4cf008e50684babae09b1d76d3e0132dc26b3d92 7acaaccefbd77f6f2716cbffd27d861fb56c10b2 49ee997178482fc5bf90f45605f49e8199c3c9ba b4d42f341ba1abe2f52c6edda4fa6e67b1883c30 5a99aed75a300fc4d209b477691cb712f99a5b75 42e8798ef843acde040858cf530f348a6c3e32c1 9f43baed1f536897b78f1933b94c6709a1640cd1 5cba12e57492e736bc208136cedc04c115afbbcf 29ca94ab11c30b0f07c1f58acc0014e2b93694b3 896a7fabca9e187cceb9b9e5b858db26efd2ae84 c1020407847f1fcdfafecb2bb08d6a6600b4a02c e0b38aa7cbafc19f2634b01e39d00f471b12aa2a 45267b712f15ed6462a58337fe46da4e5270e4b7 b795fc39d0a3be92cf244bfdff982417ed339318 2b0c886049afd0b4bca93e1b5d937b10000fdc06 a2c3dbe916aeb5ec981109d022b6f78c37d16d01 2ba0f019dfa164224245c95926fba1eed2a16d04 d119f356a225b95e6a1cb9ebefe63ab495e0877d f67888810998f94dc9ab2ffe09752106a8050116 108c55d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [64:d6:d0:14:8d:f1:1f:e1:f9:da:3d:10:d1:04:cc:e4:c8:02:7f:5d] modulus: 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 public exponent: 10001 ] 2022-05-20 23:17:59.930 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 23:17:59.932 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 23:17:59.933 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 23:17:59.934 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 23:17:59.934 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 23:17:59.935 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 23:17:59.935 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 23:17:59.936 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 23:17:59.936 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 23:17:59.937 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 23:17:59.943 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 23:17:59.944 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 23:17:59.944 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 23:17:59.944 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 23:18:00.082 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 23:18:00.083 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 23:18:00.084 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 23:18:00.084 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 23:18:00.086 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 23:18:00.086 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 23:18:00.087 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:18:00.087 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:18:00.088 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:18:00.088 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:18:00.089 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:18:00.089 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:18:00.090 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:18:00.090 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:18:00.091 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:18:00.092 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 23:18:00.096 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 3218719463060024673605947257523774989138728131 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 18:19:34 UTC 2022 Final Date: Wed May 19 18:19:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [71:66:79:e6:d6:6e:41:b3:5d:38:d5:47:b2:da:21:09:e0:34:1a:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4cf008e50684babae09b1d76d3e0132dc26b3d92 7acaaccefbd77f6f2716cbffd27d861fb56c10b2 49ee997178482fc5bf90f45605f49e8199c3c9ba b4d42f341ba1abe2f52c6edda4fa6e67b1883c30 5a99aed75a300fc4d209b477691cb712f99a5b75 42e8798ef843acde040858cf530f348a6c3e32c1 9f43baed1f536897b78f1933b94c6709a1640cd1 5cba12e57492e736bc208136cedc04c115afbbcf 29ca94ab11c30b0f07c1f58acc0014e2b93694b3 896a7fabca9e187cceb9b9e5b858db26efd2ae84 c1020407847f1fcdfafecb2bb08d6a6600b4a02c e0b38aa7cbafc19f2634b01e39d00f471b12aa2a 45267b712f15ed6462a58337fe46da4e5270e4b7 b795fc39d0a3be92cf244bfdff982417ed339318 2b0c886049afd0b4bca93e1b5d937b10000fdc06 a2c3dbe916aeb5ec981109d022b6f78c37d16d01 2ba0f019dfa164224245c95926fba1eed2a16d04 d119f356a225b95e6a1cb9ebefe63ab495e0877d f67888810998f94dc9ab2ffe09752106a8050116 108c55d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:63:db:15:d9:33:8a:7c:92:c2:e3:53:15:aa:fb:03:c3:30:0a:ba] modulus: df898922e3f1b0560f40fc2a56604654ad5859927ac4d2155249e89b77e2d81511de693450138b09d0f526c202f570bfc74f544880f4f02621a0f07d161c75ee8a282ca97efeb9d60aac2c76fb17592cbef6c3d2194dfcf21fa0c1d88e53d4d5abb932f968e2813e03f59731b3675df5d8ad6852f2b3e3359f4ab38bc98b2673bc2fc4b7153dc1e1cb79004f7b9fd887a9b48db4d6f5a0cc4604d8a9782ec4b2975fa10b07d5434ae9cd1d0bf220b91d0d78df7a1338cd5d9359c016ae905eaff88afb7afde74fde9950a65023afade38a59a4361a75050582d2bfa630224fa29dd0ef508955ae997e4cf66ab932d75f01666b206d921dafaa7c80f9b0aaf1a1 public exponent: 10001 ] 2022-05-20 23:23:42.045 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 23:23:42.046 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 23:23:42.048 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 23:23:42.048 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 23:23:42.049 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 23:23:42.049 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 23:23:42.049 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 23:23:42.050 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 23:23:42.050 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 23:23:42.050 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 23:23:42.055 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 23:23:42.056 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 23:23:42.056 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 23:23:42.056 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 23:23:42.173 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 23:23:42.173 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 23:23:42.174 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 23:23:42.174 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 23:23:42.175 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 23:23:42.175 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 23:23:42.175 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:23:42.176 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:23:42.176 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:23:42.176 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:23:42.177 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:23:42.177 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:23:42.177 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:23:42.178 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:23:42.178 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:23:42.178 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 23:23:42.180 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 3218719463060024673605947257523774989138728131 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 18:19:34 UTC 2022 Final Date: Wed May 19 18:19:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [71:66:79:e6:d6:6e:41:b3:5d:38:d5:47:b2:da:21:09:e0:34:1a:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4cf008e50684babae09b1d76d3e0132dc26b3d92 7acaaccefbd77f6f2716cbffd27d861fb56c10b2 49ee997178482fc5bf90f45605f49e8199c3c9ba b4d42f341ba1abe2f52c6edda4fa6e67b1883c30 5a99aed75a300fc4d209b477691cb712f99a5b75 42e8798ef843acde040858cf530f348a6c3e32c1 9f43baed1f536897b78f1933b94c6709a1640cd1 5cba12e57492e736bc208136cedc04c115afbbcf 29ca94ab11c30b0f07c1f58acc0014e2b93694b3 896a7fabca9e187cceb9b9e5b858db26efd2ae84 c1020407847f1fcdfafecb2bb08d6a6600b4a02c e0b38aa7cbafc19f2634b01e39d00f471b12aa2a 45267b712f15ed6462a58337fe46da4e5270e4b7 b795fc39d0a3be92cf244bfdff982417ed339318 2b0c886049afd0b4bca93e1b5d937b10000fdc06 a2c3dbe916aeb5ec981109d022b6f78c37d16d01 2ba0f019dfa164224245c95926fba1eed2a16d04 d119f356a225b95e6a1cb9ebefe63ab495e0877d f67888810998f94dc9ab2ffe09752106a8050116 108c55d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [52:15:f3:93:90:72:af:fc:f5:44:a2:71:f2:c2:77:48:1e:7d:e0:36] modulus: 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 public exponent: 10001 ] 2022-05-20 23:30:45.988 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 23:30:45.990 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 23:30:45.992 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 23:30:45.993 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 23:30:45.993 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-20 23:30:45.993 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 23:30:45.994 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 23:30:45.994 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 23:30:45.994 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 23:30:45.995 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 23:30:46.001 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 23:30:46.002 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 23:30:46.002 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 23:30:46.003 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 23:30:46.093 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 23:30:46.094 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 23:30:46.095 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 23:30:46.095 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 23:30:46.097 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 23:30:46.097 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 23:30:46.097 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:30:46.098 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:30:46.098 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:30:46.099 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:30:46.099 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:30:46.099 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:30:46.100 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:30:46.100 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:30:46.100 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:30:46.101 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 23:30:46.104 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 3218719463060024673605947257523774989138728131 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 18:19:34 UTC 2022 Final Date: Wed May 19 18:19:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [71:66:79:e6:d6:6e:41:b3:5d:38:d5:47:b2:da:21:09:e0:34:1a:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4cf008e50684babae09b1d76d3e0132dc26b3d92 7acaaccefbd77f6f2716cbffd27d861fb56c10b2 49ee997178482fc5bf90f45605f49e8199c3c9ba b4d42f341ba1abe2f52c6edda4fa6e67b1883c30 5a99aed75a300fc4d209b477691cb712f99a5b75 42e8798ef843acde040858cf530f348a6c3e32c1 9f43baed1f536897b78f1933b94c6709a1640cd1 5cba12e57492e736bc208136cedc04c115afbbcf 29ca94ab11c30b0f07c1f58acc0014e2b93694b3 896a7fabca9e187cceb9b9e5b858db26efd2ae84 c1020407847f1fcdfafecb2bb08d6a6600b4a02c e0b38aa7cbafc19f2634b01e39d00f471b12aa2a 45267b712f15ed6462a58337fe46da4e5270e4b7 b795fc39d0a3be92cf244bfdff982417ed339318 2b0c886049afd0b4bca93e1b5d937b10000fdc06 a2c3dbe916aeb5ec981109d022b6f78c37d16d01 2ba0f019dfa164224245c95926fba1eed2a16d04 d119f356a225b95e6a1cb9ebefe63ab495e0877d f67888810998f94dc9ab2ffe09752106a8050116 108c55d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [34:4e:aa:8a:1b:9f:05:d1:e9:74:7f:c0:bd:f0:a6:4f:80:0b:5f:c3] modulus: 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 public exponent: 10001 ] 2022-05-20 23:34:58.108 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-20 23:34:58.110 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-20 23:34:58.112 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-20 23:34:58.113 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-20 23:34:58.113 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-20 23:34:58.114 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-20 23:34:58.114 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-20 23:34:58.115 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-20 23:34:58.115 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-20 23:34:58.116 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-20 23:34:58.119 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-20 23:34:58.120 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 23:34:58.120 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-20 23:34:58.120 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 23:34:58.198 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-20 23:34:58.199 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-20 23:34:58.199 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-20 23:34:58.200 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-20 23:34:58.202 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-20 23:34:58.203 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-20 23:34:58.204 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:34:58.204 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:34:58.205 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:34:58.206 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:34:58.206 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:34:58.206 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:34:58.207 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-20 23:34:58.207 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-20 23:34:58.208 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-20 23:34:58.208 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-20 23:34:58.282 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 3218719463060024673605947257523774989138728131 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 20 18:19:34 UTC 2022 Final Date: Wed May 19 18:19:33 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [71:66:79:e6:d6:6e:41:b3:5d:38:d5:47:b2:da:21:09:e0:34:1a:8e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4cf008e50684babae09b1d76d3e0132dc26b3d92 7acaaccefbd77f6f2716cbffd27d861fb56c10b2 49ee997178482fc5bf90f45605f49e8199c3c9ba b4d42f341ba1abe2f52c6edda4fa6e67b1883c30 5a99aed75a300fc4d209b477691cb712f99a5b75 42e8798ef843acde040858cf530f348a6c3e32c1 9f43baed1f536897b78f1933b94c6709a1640cd1 5cba12e57492e736bc208136cedc04c115afbbcf 29ca94ab11c30b0f07c1f58acc0014e2b93694b3 896a7fabca9e187cceb9b9e5b858db26efd2ae84 c1020407847f1fcdfafecb2bb08d6a6600b4a02c e0b38aa7cbafc19f2634b01e39d00f471b12aa2a 45267b712f15ed6462a58337fe46da4e5270e4b7 b795fc39d0a3be92cf244bfdff982417ed339318 2b0c886049afd0b4bca93e1b5d937b10000fdc06 a2c3dbe916aeb5ec981109d022b6f78c37d16d01 2ba0f019dfa164224245c95926fba1eed2a16d04 d119f356a225b95e6a1cb9ebefe63ab495e0877d f67888810998f94dc9ab2ffe09752106a8050116 108c55d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:f2:37:ea:7d:52:4f:77:d5:1f:15:82:a7:ce:05:22:29:f7:6f:85] modulus: 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 public exponent: 10001 ]