Results

By type

          2023-02-22 09:55:43,943 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-02-22 09:55:45,639 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-02-22 09:55:46.446  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Feb 22, 2023 9:55:48 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Feb 22, 2023 9:55:48 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Feb 22, 2023 9:55:48 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Feb 22, 2023 9:55:48 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-02-22 09:55:49.219 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-02-22 09:55:49.549  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-02-22 09:55:49.735  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-02-22 09:55:50.530 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-02-22 09:55:50.533 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2023-02-22 09:55:50.534 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-02-22 09:55:50.538 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-02-22 09:55:50.579 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2023-02-22 09:55:50.582 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2023-02-22 09:55:50.745 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-02-22 09:55:51.387 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Feb 22, 2023 9:55:52 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-02-22 09:55:52.369  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.487 seconds (JVM running for 17.947)
Feb 22, 2023 9:56:10 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-02-22 12:00:27.747  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-22 12:00:27.763 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-22 12:00:27.823 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-22 12:00:27.828 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-22 12:00:27.851  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-22 12:00:27.854  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-22 12:00:27.855  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-22 12:00:27.856 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-22 12:00:27.856 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-22 12:00:27.861 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-22 12:00:27.871 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-22 12:00:27.875 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-22 12:00:28.160 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-22 12:00:28.167 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-22 12:00:28.167 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-22 12:00:28.170 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-22 12:00:28.676  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-22 12:00:28.678  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-22 12:00:28.679 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-22 12:00:28.680 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-22 12:00:28.689  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-22 12:00:28.690  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-22 12:00:28.690 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-22 12:00:28.691 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-22 12:00:28.691 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-22 12:00:28.712 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-22 12:00:28.713 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-22 12:00:28.714 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-22 12:00:28.722 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-22 12:00:28.723 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-22 12:00:28.723 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-22 12:00:28.725 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-22 12:00:28.762 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 332385523009171395260755279184636601653608304216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 22 09:37:10 UTC 2023
           Final Date: Mon Feb 21 09:37:09 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:07:d8:ca:20:b2:1f:ef:e0:7e:45:84:b6:8d:10:2f:d0:c0:66:36],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 19e46bf3dcab096ac3d5e0bfdaefe6a867a5d88d
                       cfb3a58bffe4fdb9b4fc4cdaad1f804206194ff0
                       80107a20d9eda1be8f509840602cccb906a50c60
                       d968492414fdbc82c80a94e224799483e47423ee
                       c76cea7455c33880b78b6205bf448da584c6e0f9
                       067592455b8fc405649b85d491e8dbb53aa41cb8
                       d01b357ad4dccd367f5396af5febc474355e5ac3
                       e639d957f7cf4d0d357e6d9ad4af1570a2efde6a
                       5b195281fa6294e066c4ba09cb8fa57d45ed9ade
                       c4e7489d18e0fa8a60e2d04328bc35c41a38e0cf
                       97fd53e8fcbb2dd9b43a325fccd03c6896b1d0d4
                       04182b230c3676969366a48d01776efcb269667e
                       85b6edb19a8db30186277b15e646991896561139
                       873db7ab3bf6cca51dc6874e06ffcc4144034cb0
                       3b50ff6b4c68e11b75fd75cec7b2308974bfcb13
                       1aec2862af53ce213391b3d77fbd96fea3fe6815
                       dfcda2c2025156a317a27e03ff8bd9c79443c371
                       9148b64baba08dfccd5b50d0b056e22886fbf569
                       39cf31ac88bd5bda370052e467eda95d5a882ff4
                       4aab36ff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:cd:5a:ca:c6:9d:96:76:d3:e1:16:c3:0c:a6:9b:e6:99:04:a0:96],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-22 12:02:14.390  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-22 12:02:14.391 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-22 12:02:14.393 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-02-22 12:02:14.394 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-22 12:02:14.395  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-02-22 12:02:14.395  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-22 12:02:14.396  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-22 12:02:14.396 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-22 12:02:14.397 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-22 12:02:14.398 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-22 12:02:14.403 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-22 12:02:14.404 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-22 12:02:14.404 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-22 12:02:14.404 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-22 12:02:14.676  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-22 12:02:14.677  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-22 12:02:14.677 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-22 12:02:14.678 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-22 12:02:14.681  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-22 12:02:14.681  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-22 12:02:14.682 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-22 12:02:14.682 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-22 12:02:14.683 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-22 12:02:14.684 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-22 12:02:14.684 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-22 12:02:14.685 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-22 12:02:14.685 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-22 12:02:14.686 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-22 12:02:14.686 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-22 12:02:14.687 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-22 12:02:14.691 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 332385523009171395260755279184636601653608304216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 22 09:37:10 UTC 2023
           Final Date: Mon Feb 21 09:37:09 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:07:d8:ca:20:b2:1f:ef:e0:7e:45:84:b6:8d:10:2f:d0:c0:66:36],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 19e46bf3dcab096ac3d5e0bfdaefe6a867a5d88d
                       cfb3a58bffe4fdb9b4fc4cdaad1f804206194ff0
                       80107a20d9eda1be8f509840602cccb906a50c60
                       d968492414fdbc82c80a94e224799483e47423ee
                       c76cea7455c33880b78b6205bf448da584c6e0f9
                       067592455b8fc405649b85d491e8dbb53aa41cb8
                       d01b357ad4dccd367f5396af5febc474355e5ac3
                       e639d957f7cf4d0d357e6d9ad4af1570a2efde6a
                       5b195281fa6294e066c4ba09cb8fa57d45ed9ade
                       c4e7489d18e0fa8a60e2d04328bc35c41a38e0cf
                       97fd53e8fcbb2dd9b43a325fccd03c6896b1d0d4
                       04182b230c3676969366a48d01776efcb269667e
                       85b6edb19a8db30186277b15e646991896561139
                       873db7ab3bf6cca51dc6874e06ffcc4144034cb0
                       3b50ff6b4c68e11b75fd75cec7b2308974bfcb13
                       1aec2862af53ce213391b3d77fbd96fea3fe6815
                       dfcda2c2025156a317a27e03ff8bd9c79443c371
                       9148b64baba08dfccd5b50d0b056e22886fbf569
                       39cf31ac88bd5bda370052e467eda95d5a882ff4
                       4aab36ff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0b:f7:fc:05:9e:ad:9d:47:df:e2:86:2e:8a:19:ac:52:5a:40:ec:e5],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-22 12:04:02.278  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-22 12:04:02.281 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-22 12:04:02.282 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-02-22 12:04:02.283 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-22 12:04:02.284  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-02-22 12:04:02.285  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-22 12:04:02.285  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-22 12:04:02.286 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-22 12:04:02.286 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-22 12:04:02.287 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-22 12:04:02.292 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-22 12:04:02.293 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-22 12:04:02.293 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-22 12:04:02.294 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-22 12:04:02.516  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-22 12:04:02.517  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-22 12:04:02.518 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-22 12:04:02.518 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-22 12:04:02.522  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-22 12:04:02.522  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-22 12:04:02.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-22 12:04:02.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-22 12:04:02.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-22 12:04:02.524 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-22 12:04:02.524 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-22 12:04:02.525 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-22 12:04:02.525 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-22 12:04:02.526 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-22 12:04:02.526 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-22 12:04:02.527 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-22 12:04:02.531 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 332385523009171395260755279184636601653608304216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 22 09:37:10 UTC 2023
           Final Date: Mon Feb 21 09:37:09 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:07:d8:ca:20:b2:1f:ef:e0:7e:45:84:b6:8d:10:2f:d0:c0:66:36],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 19e46bf3dcab096ac3d5e0bfdaefe6a867a5d88d
                       cfb3a58bffe4fdb9b4fc4cdaad1f804206194ff0
                       80107a20d9eda1be8f509840602cccb906a50c60
                       d968492414fdbc82c80a94e224799483e47423ee
                       c76cea7455c33880b78b6205bf448da584c6e0f9
                       067592455b8fc405649b85d491e8dbb53aa41cb8
                       d01b357ad4dccd367f5396af5febc474355e5ac3
                       e639d957f7cf4d0d357e6d9ad4af1570a2efde6a
                       5b195281fa6294e066c4ba09cb8fa57d45ed9ade
                       c4e7489d18e0fa8a60e2d04328bc35c41a38e0cf
                       97fd53e8fcbb2dd9b43a325fccd03c6896b1d0d4
                       04182b230c3676969366a48d01776efcb269667e
                       85b6edb19a8db30186277b15e646991896561139
                       873db7ab3bf6cca51dc6874e06ffcc4144034cb0
                       3b50ff6b4c68e11b75fd75cec7b2308974bfcb13
                       1aec2862af53ce213391b3d77fbd96fea3fe6815
                       dfcda2c2025156a317a27e03ff8bd9c79443c371
                       9148b64baba08dfccd5b50d0b056e22886fbf569
                       39cf31ac88bd5bda370052e467eda95d5a882ff4
                       4aab36ff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [42:bd:f8:9a:36:41:aa:4a:94:b2:14:de:c4:e6:1c:c1:fa:d9:5d:49],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-22 12:06:35.742  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-22 12:06:35.746 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-22 12:06:35.750 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-22 12:06:35.751 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-22 12:06:35.752  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-22 12:06:35.754  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-22 12:06:35.755  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-22 12:06:35.756 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-22 12:06:35.756 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-22 12:06:35.758 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-22 12:06:35.762 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-22 12:06:35.763 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-22 12:06:35.763 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-22 12:06:35.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-22 12:06:35.909  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-22 12:06:35.910  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-22 12:06:35.911 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-22 12:06:35.911 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-22 12:06:35.913  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-22 12:06:35.913  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-22 12:06:35.914 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-22 12:06:35.914 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-22 12:06:35.915 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-22 12:06:35.916 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-22 12:06:35.916 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-22 12:06:35.917 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-22 12:06:35.918 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-22 12:06:35.918 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-22 12:06:35.918 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-22 12:06:35.919 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-22 12:06:35.924 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 332385523009171395260755279184636601653608304216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 22 09:37:10 UTC 2023
           Final Date: Mon Feb 21 09:37:09 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:07:d8:ca:20:b2:1f:ef:e0:7e:45:84:b6:8d:10:2f:d0:c0:66:36],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 19e46bf3dcab096ac3d5e0bfdaefe6a867a5d88d
                       cfb3a58bffe4fdb9b4fc4cdaad1f804206194ff0
                       80107a20d9eda1be8f509840602cccb906a50c60
                       d968492414fdbc82c80a94e224799483e47423ee
                       c76cea7455c33880b78b6205bf448da584c6e0f9
                       067592455b8fc405649b85d491e8dbb53aa41cb8
                       d01b357ad4dccd367f5396af5febc474355e5ac3
                       e639d957f7cf4d0d357e6d9ad4af1570a2efde6a
                       5b195281fa6294e066c4ba09cb8fa57d45ed9ade
                       c4e7489d18e0fa8a60e2d04328bc35c41a38e0cf
                       97fd53e8fcbb2dd9b43a325fccd03c6896b1d0d4
                       04182b230c3676969366a48d01776efcb269667e
                       85b6edb19a8db30186277b15e646991896561139
                       873db7ab3bf6cca51dc6874e06ffcc4144034cb0
                       3b50ff6b4c68e11b75fd75cec7b2308974bfcb13
                       1aec2862af53ce213391b3d77fbd96fea3fe6815
                       dfcda2c2025156a317a27e03ff8bd9c79443c371
                       9148b64baba08dfccd5b50d0b056e22886fbf569
                       39cf31ac88bd5bda370052e467eda95d5a882ff4
                       4aab36ff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [81:d2:63:6b:0d:d6:d0:b2:3a:38:1e:24:bb:96:cd:94:c3:05:17:99],[56:66:d1:a4]
        modulus: b719daf1d8625e78ca1718da86e22fedc7cf523388615aff1cc159d8841a5f637ce80f8e4d732685139a99c497b4f86690e674153e097ba66513840489f9bb6d638b16a2afe32317b064d2a01d8dced7475f059f01907a6f7b18b855054c735041da452d894c0fde96dae0b53d33c981b3bd8862cd39aff68e421811c734b61e3f9040b8dc60d53d4f4c8efa09d56b4a12508e9aef4b9c76110236fbc70da2eaab57f8765f37695e0fae8195c71af770e65339bf52ca87168dab9cfd80b78cf6fd65ac9b4eb4e679ef13e97d7123a57632262977414b9cdba6b8d2c9218a02a74d8ee93c45834e3e48d790e78302d1cffd0b72143e4c7ad41fee31bf28a24495
public exponent: 10001

]