Results

By type

          2022-10-30 03:00:21,163 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-10-30 03:00:22,061 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-10-30 03:00:23.042  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Oct 30, 2022 3:00:25 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Oct 30, 2022 3:00:25 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Oct 30, 2022 3:00:25 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Oct 30, 2022 3:00:25 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-10-30 03:00:26.092 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-10-30 03:00:26.442  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-10-30 03:00:26.627  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-10-30 03:00:27.416 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-10-30 03:00:27.425 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-10-30 03:00:27.426 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-10-30 03:00:27.431 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-10-30 03:00:27.480 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-10-30 03:00:27.486 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-10-30 03:00:27.669 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-10-30 03:00:28.361 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Oct 30, 2022 3:00:29 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-10-30 03:00:29.370  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.007 seconds (JVM running for 10.77)
Oct 30, 2022 3:00:49 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-10-30 03:01:05.185  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-30 03:01:05.196 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-30 03:01:05.238 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-10-30 03:01:05.242 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-30 03:01:05.260  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-10-30 03:01:05.263  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-30 03:01:05.264  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-30 03:01:05.265 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-30 03:01:05.266 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 03:01:05.270 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-30 03:01:05.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-30 03:01:05.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-30 03:01:05.317 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-30 03:01:05.322 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 03:01:05.322 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 03:01:05.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-30 03:01:06.287  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-30 03:01:06.290  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-30 03:01:06.290 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-30 03:01:06.292 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-30 03:01:06.301  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-30 03:01:06.302  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-30 03:01:06.303 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 03:01:06.304 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 03:01:06.304 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 03:01:06.315 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 03:01:06.316 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 03:01:06.316 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 03:01:06.322 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 03:01:06.322 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 03:01:06.323 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 03:01:06.324 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-30 03:01:06.354 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 422359546086222122646619966466616027177982885182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 30 02:57:34 UTC 2022
           Final Date: Fri Oct 29 02:57:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4a:c6:1a:fe:a2:ad:8d:ee:f1:5a:4b:67:0e:1d:86:f1:c6:96:28:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46a935182aae3d05ada6e22dbf7d4790862d1206
                       76380d514b512fd9360c6da5da86e357e1fd5095
                       83b87547f032302a077e6c1334cde7f5d2c34163
                       b2b056e9b91f4f1b5399e33b8af2ebbb45952048
                       dc1ce996d06707ed96efef2b135234b7af3054d0
                       e0ec9a642a435cb074a0cc0944e1ab97fa59bc6b
                       1ab19c3ff7877cf36c91020faf6ade8d15746cdb
                       39c90e38a720437844337642188c43faa94d2e07
                       0f6789f76f758b39b2de0ef266c4ada6e972de7b
                       9e270f763145f4188b1d31b2de9e7ceeb70b285c
                       ac3a696281b7cfd91db90d35fea915bdb7d6bd31
                       fad5b876833ade71e8426823592444902fc6bfba
                       8769d6104caef8f4f6d4ed5a100f88567fe309f8
                       bbf3011d32e0d3ccc81a0d1523404b43b558f920
                       0c47a3c37ce78f9868c15f033847d3bdbf920c93
                       cc35ecfbc606d6f9b9b71c26b8c81c7f377b066e
                       011ee95c9eddb83a91c9fe69afd9495b3bda2624
                       3e57537528f530074dbfdfb893d093cd49fa4daf
                       d643e1c04bb700242352722476ab861e898c0999
                       c5e4edf7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [99:31:51:68:41:fc:09:6e:83:2f:94:6e:cd:c7:2f:6a:82:5d:67:e0]
            modulus: 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
    public exponent: 10001

] 
2022-10-30 04:12:45.086  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-30 04:12:45.089 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-30 04:12:45.092 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-30 04:12:45.093 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-30 04:12:45.094  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-30 04:12:45.095  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-30 04:12:45.095  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-30 04:12:45.096 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-30 04:12:45.096 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-30 04:12:45.097 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-30 04:12:45.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-30 04:12:45.112 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 04:12:45.112 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 04:12:45.113 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-30 04:12:45.333  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-30 04:12:45.334  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-30 04:12:45.335 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-30 04:12:45.335 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-30 04:12:45.338  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-30 04:12:45.339  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-30 04:12:45.340 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:12:45.340 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:12:45.340 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:12:45.342 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:12:45.342 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:12:45.342 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:12:45.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:12:45.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:12:45.345 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:12:45.347 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-30 04:12:45.355 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 422359546086222122646619966466616027177982885182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 30 02:57:34 UTC 2022
           Final Date: Fri Oct 29 02:57:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4a:c6:1a:fe:a2:ad:8d:ee:f1:5a:4b:67:0e:1d:86:f1:c6:96:28:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46a935182aae3d05ada6e22dbf7d4790862d1206
                       76380d514b512fd9360c6da5da86e357e1fd5095
                       83b87547f032302a077e6c1334cde7f5d2c34163
                       b2b056e9b91f4f1b5399e33b8af2ebbb45952048
                       dc1ce996d06707ed96efef2b135234b7af3054d0
                       e0ec9a642a435cb074a0cc0944e1ab97fa59bc6b
                       1ab19c3ff7877cf36c91020faf6ade8d15746cdb
                       39c90e38a720437844337642188c43faa94d2e07
                       0f6789f76f758b39b2de0ef266c4ada6e972de7b
                       9e270f763145f4188b1d31b2de9e7ceeb70b285c
                       ac3a696281b7cfd91db90d35fea915bdb7d6bd31
                       fad5b876833ade71e8426823592444902fc6bfba
                       8769d6104caef8f4f6d4ed5a100f88567fe309f8
                       bbf3011d32e0d3ccc81a0d1523404b43b558f920
                       0c47a3c37ce78f9868c15f033847d3bdbf920c93
                       cc35ecfbc606d6f9b9b71c26b8c81c7f377b066e
                       011ee95c9eddb83a91c9fe69afd9495b3bda2624
                       3e57537528f530074dbfdfb893d093cd49fa4daf
                       d643e1c04bb700242352722476ab861e898c0999
                       c5e4edf7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a6:ee:c7:ba:ea:5a:63:70:a0:20:21:52:e1:e2:2a:1c:fb:71:13:a5]
            modulus: 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
    public exponent: 10001

] 
2022-10-30 04:14:26.777  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-30 04:14:26.779 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-30 04:14:26.780 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-10-30 04:14:26.781 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-30 04:14:26.781  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-10-30 04:14:26.784  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-30 04:14:26.784  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-30 04:14:26.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-30 04:14:26.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-30 04:14:26.789 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-30 04:14:26.812 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-30 04:14:26.813 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 04:14:26.813 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 04:14:26.813 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-30 04:14:26.974  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-30 04:14:26.975  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-30 04:14:26.975 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-30 04:14:26.975 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-30 04:14:26.979  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-30 04:14:26.979  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-30 04:14:26.980 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:14:26.980 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:14:26.980 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:14:26.982 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:14:26.982 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:14:26.982 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:14:26.983 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:14:26.984 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:14:26.984 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:14:26.985 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-30 04:14:26.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 422359546086222122646619966466616027177982885182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 30 02:57:34 UTC 2022
           Final Date: Fri Oct 29 02:57:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4a:c6:1a:fe:a2:ad:8d:ee:f1:5a:4b:67:0e:1d:86:f1:c6:96:28:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46a935182aae3d05ada6e22dbf7d4790862d1206
                       76380d514b512fd9360c6da5da86e357e1fd5095
                       83b87547f032302a077e6c1334cde7f5d2c34163
                       b2b056e9b91f4f1b5399e33b8af2ebbb45952048
                       dc1ce996d06707ed96efef2b135234b7af3054d0
                       e0ec9a642a435cb074a0cc0944e1ab97fa59bc6b
                       1ab19c3ff7877cf36c91020faf6ade8d15746cdb
                       39c90e38a720437844337642188c43faa94d2e07
                       0f6789f76f758b39b2de0ef266c4ada6e972de7b
                       9e270f763145f4188b1d31b2de9e7ceeb70b285c
                       ac3a696281b7cfd91db90d35fea915bdb7d6bd31
                       fad5b876833ade71e8426823592444902fc6bfba
                       8769d6104caef8f4f6d4ed5a100f88567fe309f8
                       bbf3011d32e0d3ccc81a0d1523404b43b558f920
                       0c47a3c37ce78f9868c15f033847d3bdbf920c93
                       cc35ecfbc606d6f9b9b71c26b8c81c7f377b066e
                       011ee95c9eddb83a91c9fe69afd9495b3bda2624
                       3e57537528f530074dbfdfb893d093cd49fa4daf
                       d643e1c04bb700242352722476ab861e898c0999
                       c5e4edf7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:05:4a:76:eb:70:78:b4:66:fe:da:74:ee:96:45:0f:59:0c:1e:59]
            modulus: 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
    public exponent: 10001

] 
2022-10-30 04:15:36.657  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-30 04:15:36.659 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-30 04:15:36.660 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-10-30 04:15:36.661 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-30 04:15:36.661  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-10-30 04:15:36.663  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-30 04:15:36.663  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-30 04:15:36.663 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-30 04:15:36.664 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-30 04:15:36.664 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-30 04:15:36.669 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-30 04:15:36.670 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 04:15:36.671 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 04:15:36.671 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-30 04:15:36.818  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-30 04:15:36.819  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-30 04:15:36.820 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-30 04:15:36.820 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-30 04:15:36.822  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-30 04:15:36.823  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-30 04:15:36.823 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:15:36.824 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:15:36.824 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:15:36.825 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:15:36.826 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:15:36.826 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:15:36.827 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:15:36.828 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:15:36.828 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:15:36.829 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-30 04:15:36.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 422359546086222122646619966466616027177982885182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 30 02:57:34 UTC 2022
           Final Date: Fri Oct 29 02:57:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4a:c6:1a:fe:a2:ad:8d:ee:f1:5a:4b:67:0e:1d:86:f1:c6:96:28:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46a935182aae3d05ada6e22dbf7d4790862d1206
                       76380d514b512fd9360c6da5da86e357e1fd5095
                       83b87547f032302a077e6c1334cde7f5d2c34163
                       b2b056e9b91f4f1b5399e33b8af2ebbb45952048
                       dc1ce996d06707ed96efef2b135234b7af3054d0
                       e0ec9a642a435cb074a0cc0944e1ab97fa59bc6b
                       1ab19c3ff7877cf36c91020faf6ade8d15746cdb
                       39c90e38a720437844337642188c43faa94d2e07
                       0f6789f76f758b39b2de0ef266c4ada6e972de7b
                       9e270f763145f4188b1d31b2de9e7ceeb70b285c
                       ac3a696281b7cfd91db90d35fea915bdb7d6bd31
                       fad5b876833ade71e8426823592444902fc6bfba
                       8769d6104caef8f4f6d4ed5a100f88567fe309f8
                       bbf3011d32e0d3ccc81a0d1523404b43b558f920
                       0c47a3c37ce78f9868c15f033847d3bdbf920c93
                       cc35ecfbc606d6f9b9b71c26b8c81c7f377b066e
                       011ee95c9eddb83a91c9fe69afd9495b3bda2624
                       3e57537528f530074dbfdfb893d093cd49fa4daf
                       d643e1c04bb700242352722476ab861e898c0999
                       c5e4edf7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [78:1c:53:6d:fd:7d:44:da:1a:7a:99:4a:a5:b8:26:00:f9:27:a4:13]
            modulus: a47b602bcfc0c1042636cde12cb94f501098c60b8b3ffdb7f855c01aa9a16d14bf0135a7cce7688272d06d9641eb864699d5c6aaf44c48fbf73d96eb810fdd2e90c882bdb33526f642bdac9270fe4c2cf2b343a5a1888d0679707d471aebef439181e28b899673a64092453ba69a5d8e60d09d627e11540cc0e4d727a0e2343ed99a161b4d900d1b60d130ac421c66ca2ffc17ee16643d4bb3b30f70a076d22345813c0cbf9d07c214ac29d0ba81d2d97be30dbd7953edb7b45c5fe145847361a48b7818b85319e958cfbae855e570a4bae18d6c527be72c2afff0541ff9e7f237a9673912fa4aedaaad05f781694fa15e3bb4bfe9a0c94b6bb8c1aec300a831
    public exponent: 10001

] 
2022-10-30 04:17:52.217  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-30 04:17:52.218 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-30 04:17:52.219 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-30 04:17:52.220 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-30 04:17:52.220  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-30 04:17:52.221  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-30 04:17:52.223  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-30 04:17:52.223 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-30 04:17:52.224 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-30 04:17:52.224 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-30 04:17:52.229 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-30 04:17:52.230 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 04:17:52.230 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 04:17:52.231 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-30 04:17:52.373  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-30 04:17:52.374  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-30 04:17:52.375 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-30 04:17:52.375 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-30 04:17:52.378  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-30 04:17:52.379  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-30 04:17:52.380 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:17:52.381 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:17:52.382 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:17:52.383 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:17:52.383 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:17:52.384 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:17:52.386 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:17:52.386 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:17:52.387 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:17:52.388 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-30 04:17:52.393 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 422359546086222122646619966466616027177982885182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 30 02:57:34 UTC 2022
           Final Date: Fri Oct 29 02:57:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4a:c6:1a:fe:a2:ad:8d:ee:f1:5a:4b:67:0e:1d:86:f1:c6:96:28:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46a935182aae3d05ada6e22dbf7d4790862d1206
                       76380d514b512fd9360c6da5da86e357e1fd5095
                       83b87547f032302a077e6c1334cde7f5d2c34163
                       b2b056e9b91f4f1b5399e33b8af2ebbb45952048
                       dc1ce996d06707ed96efef2b135234b7af3054d0
                       e0ec9a642a435cb074a0cc0944e1ab97fa59bc6b
                       1ab19c3ff7877cf36c91020faf6ade8d15746cdb
                       39c90e38a720437844337642188c43faa94d2e07
                       0f6789f76f758b39b2de0ef266c4ada6e972de7b
                       9e270f763145f4188b1d31b2de9e7ceeb70b285c
                       ac3a696281b7cfd91db90d35fea915bdb7d6bd31
                       fad5b876833ade71e8426823592444902fc6bfba
                       8769d6104caef8f4f6d4ed5a100f88567fe309f8
                       bbf3011d32e0d3ccc81a0d1523404b43b558f920
                       0c47a3c37ce78f9868c15f033847d3bdbf920c93
                       cc35ecfbc606d6f9b9b71c26b8c81c7f377b066e
                       011ee95c9eddb83a91c9fe69afd9495b3bda2624
                       3e57537528f530074dbfdfb893d093cd49fa4daf
                       d643e1c04bb700242352722476ab861e898c0999
                       c5e4edf7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e4:d4:01:67:b5:e5:e2:5e:2f:ef:8b:f3:66:d8:3c:45:ee:58:a5:14]
            modulus: b87cda7e9a9b2a8bc90e43a865642e9af0a80d83b28e86635fb79fc367ec362b1d7c2293a7a2169eb3a78186f1f8fa27a58ff314ae141a36511f78e16de6a15b3b8f77a2b96060c1ff9c5fe7de9dec9c913469cd79e43819eb643515ca9b5610d6e789f4aa94ec38caa7192dcc94663b8f5f2c71b17ec6f59da121b91e76323ff2b2dd40f22f09297dc3c3784dbd1f66ef9d7d88f69d5693ff176701bf38bab564c549731ac597d941b5a1835b29055fe84716eadbe843fa26af8482f6f323c72fee53669cff941318cee9f8d3489fd93d7444bada906dc3154a5be72afb34e4822fe5b35bcfad9b1e08bd4d79e6a14bffabc5574d11505cc0f4104f81121dd5
    public exponent: 10001

] 
2022-10-30 04:27:45.617  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-30 04:27:45.622 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-30 04:27:45.625 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-10-30 04:27:45.626 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-30 04:27:45.626  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-10-30 04:27:45.627  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-30 04:27:45.628  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-30 04:27:45.628 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-30 04:27:45.629 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-30 04:27:45.629 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-30 04:27:45.636 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-30 04:27:45.637 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 04:27:45.637 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 04:27:45.637 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-30 04:27:45.784  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-30 04:27:45.784  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-30 04:27:45.785 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-30 04:27:45.785 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-30 04:27:45.787  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-30 04:27:45.787  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-30 04:27:45.788 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:27:45.788 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:27:45.788 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:27:45.789 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:27:45.789 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:27:45.790 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:27:45.791 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:27:45.791 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:27:45.791 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:27:45.792 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-30 04:27:45.798 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 422359546086222122646619966466616027177982885182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 30 02:57:34 UTC 2022
           Final Date: Fri Oct 29 02:57:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4a:c6:1a:fe:a2:ad:8d:ee:f1:5a:4b:67:0e:1d:86:f1:c6:96:28:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46a935182aae3d05ada6e22dbf7d4790862d1206
                       76380d514b512fd9360c6da5da86e357e1fd5095
                       83b87547f032302a077e6c1334cde7f5d2c34163
                       b2b056e9b91f4f1b5399e33b8af2ebbb45952048
                       dc1ce996d06707ed96efef2b135234b7af3054d0
                       e0ec9a642a435cb074a0cc0944e1ab97fa59bc6b
                       1ab19c3ff7877cf36c91020faf6ade8d15746cdb
                       39c90e38a720437844337642188c43faa94d2e07
                       0f6789f76f758b39b2de0ef266c4ada6e972de7b
                       9e270f763145f4188b1d31b2de9e7ceeb70b285c
                       ac3a696281b7cfd91db90d35fea915bdb7d6bd31
                       fad5b876833ade71e8426823592444902fc6bfba
                       8769d6104caef8f4f6d4ed5a100f88567fe309f8
                       bbf3011d32e0d3ccc81a0d1523404b43b558f920
                       0c47a3c37ce78f9868c15f033847d3bdbf920c93
                       cc35ecfbc606d6f9b9b71c26b8c81c7f377b066e
                       011ee95c9eddb83a91c9fe69afd9495b3bda2624
                       3e57537528f530074dbfdfb893d093cd49fa4daf
                       d643e1c04bb700242352722476ab861e898c0999
                       c5e4edf7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:a4:97:85:c7:2e:64:b8:c2:94:aa:94:6b:4c:3e:00:6f:c0:5a:ec]
            modulus: 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
    public exponent: 10001

] 
2022-10-30 04:32:16.220  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-30 04:32:16.222 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-30 04:32:16.228 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-30 04:32:16.229 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-30 04:32:16.233  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-30 04:32:16.233  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-30 04:32:16.245  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-30 04:32:16.246 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-30 04:32:16.246 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-30 04:32:16.247 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-30 04:32:16.260 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-30 04:32:16.264 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 04:32:16.265 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 04:32:16.265 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-30 04:32:16.406  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-30 04:32:16.407  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-30 04:32:16.407 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-30 04:32:16.408 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-30 04:32:16.409  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-30 04:32:16.413  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-30 04:32:16.414 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:32:16.414 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:32:16.415 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:32:16.416 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:32:16.416 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:32:16.416 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:32:16.417 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:32:16.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:32:16.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:32:16.419 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-30 04:32:16.422 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 422359546086222122646619966466616027177982885182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 30 02:57:34 UTC 2022
           Final Date: Fri Oct 29 02:57:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4a:c6:1a:fe:a2:ad:8d:ee:f1:5a:4b:67:0e:1d:86:f1:c6:96:28:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46a935182aae3d05ada6e22dbf7d4790862d1206
                       76380d514b512fd9360c6da5da86e357e1fd5095
                       83b87547f032302a077e6c1334cde7f5d2c34163
                       b2b056e9b91f4f1b5399e33b8af2ebbb45952048
                       dc1ce996d06707ed96efef2b135234b7af3054d0
                       e0ec9a642a435cb074a0cc0944e1ab97fa59bc6b
                       1ab19c3ff7877cf36c91020faf6ade8d15746cdb
                       39c90e38a720437844337642188c43faa94d2e07
                       0f6789f76f758b39b2de0ef266c4ada6e972de7b
                       9e270f763145f4188b1d31b2de9e7ceeb70b285c
                       ac3a696281b7cfd91db90d35fea915bdb7d6bd31
                       fad5b876833ade71e8426823592444902fc6bfba
                       8769d6104caef8f4f6d4ed5a100f88567fe309f8
                       bbf3011d32e0d3ccc81a0d1523404b43b558f920
                       0c47a3c37ce78f9868c15f033847d3bdbf920c93
                       cc35ecfbc606d6f9b9b71c26b8c81c7f377b066e
                       011ee95c9eddb83a91c9fe69afd9495b3bda2624
                       3e57537528f530074dbfdfb893d093cd49fa4daf
                       d643e1c04bb700242352722476ab861e898c0999
                       c5e4edf7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2a:8c:6b:f2:34:b9:05:2e:82:64:5f:a3:a6:46:15:c4:55:0a:90:de]
            modulus: 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
    public exponent: 10001

] 
2022-10-30 04:32:33.123  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-30 04:32:33.125 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-30 04:32:33.127 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-30 04:32:33.128 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-30 04:32:33.129  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-30 04:32:33.130  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-30 04:32:33.131  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-30 04:32:33.131 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-30 04:32:33.132 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-30 04:32:33.132 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-30 04:32:33.137 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-30 04:32:33.138 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 04:32:33.138 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 04:32:33.138 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-30 04:32:33.304  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-30 04:32:33.305  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-30 04:32:33.305 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-30 04:32:33.305 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-30 04:32:33.307  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-30 04:32:33.307  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-30 04:32:33.307 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:32:33.308 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:32:33.308 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:32:33.309 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:32:33.310 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:32:33.310 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:32:33.311 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:32:33.311 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:32:33.311 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:32:33.312 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-30 04:32:33.316 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 422359546086222122646619966466616027177982885182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 30 02:57:34 UTC 2022
           Final Date: Fri Oct 29 02:57:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4a:c6:1a:fe:a2:ad:8d:ee:f1:5a:4b:67:0e:1d:86:f1:c6:96:28:43]
            modulus: acb488933bbdb77d1f00588ee9be39df1f30b2f3b0ab048322ff48b1a009ada5537280e12c9ef3c4c25a7f947927ceff567f51d56cc7c7f6acedda6b4b0e47247dec1753fa2a9ce9ce64bcb75c4c8501fa19796142a757c4bf23e47d12247c5fced5d2f47e623411a5831b6e784810913223f655cb230a895e5aade0ad7824babd04d12b05d790380e0a3aa0f9f1222505e6e2b67d83ce6c0b3c6acc2a8c42feff96778e02b17311ed5eeb03dc6f8208f0073825ed5d64a823a6412407335754aa9350ee2a84d069ee444290a3fbaa2b7d9c12b8dfde0d2178bbd58787ca7dc83799231bf8f1910abff8853f05bb9a7292b724a6a65971934dd5f3aa84b4f96063e79a2860bd557f54dc1b718e4b2d76dfb865ab93422fb1c22bcbd7d30639ea2cf883e87105c1446ce1e22a0886058e762fd12f676801f1318f0157ecca1d7cb0e73f36aee57e4c1d9bf56710e47d1c42c8ffafb27d4d90838023b62ebdec05b77b6ce7c1334bed2fed90b0b733fb0154bc6dc4e8101b72dea88dea136d0241
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46a935182aae3d05ada6e22dbf7d4790862d1206
                       76380d514b512fd9360c6da5da86e357e1fd5095
                       83b87547f032302a077e6c1334cde7f5d2c34163
                       b2b056e9b91f4f1b5399e33b8af2ebbb45952048
                       dc1ce996d06707ed96efef2b135234b7af3054d0
                       e0ec9a642a435cb074a0cc0944e1ab97fa59bc6b
                       1ab19c3ff7877cf36c91020faf6ade8d15746cdb
                       39c90e38a720437844337642188c43faa94d2e07
                       0f6789f76f758b39b2de0ef266c4ada6e972de7b
                       9e270f763145f4188b1d31b2de9e7ceeb70b285c
                       ac3a696281b7cfd91db90d35fea915bdb7d6bd31
                       fad5b876833ade71e8426823592444902fc6bfba
                       8769d6104caef8f4f6d4ed5a100f88567fe309f8
                       bbf3011d32e0d3ccc81a0d1523404b43b558f920
                       0c47a3c37ce78f9868c15f033847d3bdbf920c93
                       cc35ecfbc606d6f9b9b71c26b8c81c7f377b066e
                       011ee95c9eddb83a91c9fe69afd9495b3bda2624
                       3e57537528f530074dbfdfb893d093cd49fa4daf
                       d643e1c04bb700242352722476ab861e898c0999
                       c5e4edf7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [02:54:a2:9c:f1:c1:74:66:8b:ca:96:5f:a4:76:91:f8:f2:71:1e:80]
            modulus: 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
    public exponent: 10001

] 
2022-10-30 04:32:34.495  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-30 04:32:34.496 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-30 04:32:34.498 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-30 04:32:34.498 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-30 04:32:34.499  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-30 04:32:34.499  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-30 04:32:34.499  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-30 04:32:34.500 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-30 04:32:34.500 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-30 04:32:34.500 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-30 04:32:34.505 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-30 04:32:34.506 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 04:32:34.506 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-30 04:32:34.507 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-30 04:32:34.597  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-30 04:32:34.597  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-30 04:32:34.598 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-30 04:32:34.600 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-30 04:32:34.601  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-30 04:32:34.603  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-30 04:32:34.604 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:32:34.604 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:32:34.604 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:32:34.606 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:32:34.607 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:32:34.607 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:32:34.607 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-30 04:32:34.608 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-30 04:32:34.608 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-30 04:32:34.612 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-30 04:32:34.617 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 422359546086222122646619966466616027177982885182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 30 02:57:34 UTC 2022
           Final Date: Fri Oct 29 02:57:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4a:c6:1a:fe:a2:ad:8d:ee:f1:5a:4b:67:0e:1d:86:f1:c6:96:28:43]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46a935182aae3d05ada6e22dbf7d4790862d1206
                       76380d514b512fd9360c6da5da86e357e1fd5095
                       83b87547f032302a077e6c1334cde7f5d2c34163
                       b2b056e9b91f4f1b5399e33b8af2ebbb45952048
                       dc1ce996d06707ed96efef2b135234b7af3054d0
                       e0ec9a642a435cb074a0cc0944e1ab97fa59bc6b
                       1ab19c3ff7877cf36c91020faf6ade8d15746cdb
                       39c90e38a720437844337642188c43faa94d2e07
                       0f6789f76f758b39b2de0ef266c4ada6e972de7b
                       9e270f763145f4188b1d31b2de9e7ceeb70b285c
                       ac3a696281b7cfd91db90d35fea915bdb7d6bd31
                       fad5b876833ade71e8426823592444902fc6bfba
                       8769d6104caef8f4f6d4ed5a100f88567fe309f8
                       bbf3011d32e0d3ccc81a0d1523404b43b558f920
                       0c47a3c37ce78f9868c15f033847d3bdbf920c93
                       cc35ecfbc606d6f9b9b71c26b8c81c7f377b066e
                       011ee95c9eddb83a91c9fe69afd9495b3bda2624
                       3e57537528f530074dbfdfb893d093cd49fa4daf
                       d643e1c04bb700242352722476ab861e898c0999
                       c5e4edf7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [02:54:a2:9c:f1:c1:74:66:8b:ca:96:5f:a4:76:91:f8:f2:71:1e:80]
            modulus: 9b34a2b6e708538bee95769e4b85fb80ed6d31133dfdb38d1ba7033e7019822ebf3a7e143c8b32ecd4f69876af88975e56e87e5b3720bbc9734ce1fa747136c21151763a7a63de546c3bcfa2d5e1d85c8e0b6a5acea303dccc32ab903ae9120498e27827970edab64c0b28ddb8503d6c6cd215cb8f0ec9d66ae117f6f0f04d894e518c7f2d25e276a310e866be0087f37b4b4047ba8b7a1ed500bbb5c994db8e854728d9f190fe6b9abf9276d06a7e21d8213e3776c72d5d1428d73cf2b92b4504fece060ee8522aafc1584d22f8939513731e6084ce97428674c97eb384df2ceb62d5a6a495893d6085f1978f8355b22c177d743f6f68aaa66c81bc7c1ce947
    public exponent: 10001

]