Results

By type

          2022-07-21 05:44:26,393 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-07-21 05:44:28,940 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-07-21 05:44:30.698  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jul 21, 2022 5:44:35 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jul 21, 2022 5:44:35 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jul 21, 2022 5:44:35 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jul 21, 2022 5:44:35 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-07-21 05:44:36.469 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-07-21 05:44:37.029  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-07-21 05:44:37.384  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-07-21 05:44:39.020 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-07-21 05:44:39.025 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-07-21 05:44:39.028 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-07-21 05:44:39.047 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-07-21 05:44:39.124 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-07-21 05:44:39.135 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-07-21 05:44:39.423 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-07-21 05:44:41.067 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jul 21, 2022 5:44:43 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-07-21 05:44:43.923  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 19.693 seconds (JVM running for 24.77)
Jul 21, 2022 5:44:56 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-07-21 06:38:57.328  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-21 06:38:57.353 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-21 06:38:57.449 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-21 06:38:57.475 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-21 06:38:57.555  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-21 06:38:57.561  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-21 06:38:57.564  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-21 06:38:57.567 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-21 06:38:57.568 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-21 06:38:57.586 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-21 06:38:57.602 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-21 06:38:57.620 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-21 06:38:57.728 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-21 06:38:57.747 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-21 06:38:57.749 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-21 06:38:57.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-21 06:38:58.852  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-21 06:38:58.859  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-21 06:38:58.860 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-21 06:38:58.862 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-21 06:38:58.878  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-21 06:38:58.883  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-21 06:38:58.885 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-21 06:38:58.886 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-21 06:38:58.886 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-21 06:38:58.911 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-21 06:38:58.912 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-21 06:38:58.913 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-21 06:38:58.926 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-21 06:38:58.927 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-21 06:38:58.928 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-21 06:38:58.932 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-21 06:38:58.994 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 579908091849282152125104828268249456689908714450
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jul 21 05:17:43 UTC 2022
           Final Date: Tue Jul 20 05:17:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:3f:11:7b:95:48:68:b6:34:00:7f:9f:64:c4:49:18:89:a8:2e:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5820b90709202939c3463b59b35ad5a013bfe48e
                       d58fc57fbc6fc98a4251832039f3091fa6998bf9
                       2f0dc2ce7a6cd11d9996355ec9deb9a1806abe1a
                       76c77c2c623952bb2f03f8e774635c7fd101e614
                       31498197772f237526fce757239f02fee6b7f3d1
                       2e293bd2dfcf5a3b05c411440554fa62963a9a45
                       01f73c465c40b6fe028996b3ae8409347d7f9bcf
                       80356962234775c71ae94175024abbd29f7c3a5b
                       88319e5cd33781e542fde416fdba07d881d7e2f5
                       d2e112df543a0cb95cadf3688177d0b058b547f5
                       60c627df0a4209cd590153bb7439ae909b2c1bab
                       986b948cbe5c7adfcdb5569be6399ed5a2a54f89
                       10cebd58822b958e1e5797494db08a0405819ef2
                       15aa3b29925ed0157ce53a8e15c9d6cbd11026af
                       9e32e2467b3ad1bbe756a6a6f39936dc2f078675
                       c5f0ddc104c570105d5734469e38dbbf9ceb4b10
                       8332f7b33000004e7ebb8f8ceb625e2143e5f01e
                       9b102d29a5ff6516e508c0d0d1be4721fc4b308a
                       6096de861100a2bce1018d812cd284e33d90f2a8
                       b1700d85
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:5c:61:d1:56:09:fa:e7:8f:29:cc:f5:68:8d:54:42:31:c0:3b:e3]
            modulus: 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
    public exponent: 10001

] 
2022-07-21 06:40:47.558  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-21 06:40:47.560 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-21 06:40:47.563 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-21 06:40:47.564 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-21 06:40:47.565  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-21 06:40:47.567  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-21 06:40:47.568  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-21 06:40:47.569 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-21 06:40:47.569 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-21 06:40:47.570 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-21 06:40:47.594 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-21 06:40:47.597 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-21 06:40:47.599 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-21 06:40:47.606 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-21 06:40:47.858  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-21 06:40:47.859  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-21 06:40:47.860 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-21 06:40:47.860 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-21 06:40:47.879  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-21 06:40:47.880  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-21 06:40:47.885 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-21 06:40:47.889 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-21 06:40:47.890 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-21 06:40:47.893 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-21 06:40:47.894 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-21 06:40:47.895 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-21 06:40:47.898 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-21 06:40:47.898 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-21 06:40:47.899 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-21 06:40:47.912 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-21 06:40:47.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 579908091849282152125104828268249456689908714450
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jul 21 05:17:43 UTC 2022
           Final Date: Tue Jul 20 05:17:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:3f:11:7b:95:48:68:b6:34:00:7f:9f:64:c4:49:18:89:a8:2e:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5820b90709202939c3463b59b35ad5a013bfe48e
                       d58fc57fbc6fc98a4251832039f3091fa6998bf9
                       2f0dc2ce7a6cd11d9996355ec9deb9a1806abe1a
                       76c77c2c623952bb2f03f8e774635c7fd101e614
                       31498197772f237526fce757239f02fee6b7f3d1
                       2e293bd2dfcf5a3b05c411440554fa62963a9a45
                       01f73c465c40b6fe028996b3ae8409347d7f9bcf
                       80356962234775c71ae94175024abbd29f7c3a5b
                       88319e5cd33781e542fde416fdba07d881d7e2f5
                       d2e112df543a0cb95cadf3688177d0b058b547f5
                       60c627df0a4209cd590153bb7439ae909b2c1bab
                       986b948cbe5c7adfcdb5569be6399ed5a2a54f89
                       10cebd58822b958e1e5797494db08a0405819ef2
                       15aa3b29925ed0157ce53a8e15c9d6cbd11026af
                       9e32e2467b3ad1bbe756a6a6f39936dc2f078675
                       c5f0ddc104c570105d5734469e38dbbf9ceb4b10
                       8332f7b33000004e7ebb8f8ceb625e2143e5f01e
                       9b102d29a5ff6516e508c0d0d1be4721fc4b308a
                       6096de861100a2bce1018d812cd284e33d90f2a8
                       b1700d85
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [61:78:2e:8a:e2:e1:4d:59:da:87:d2:3c:18:25:27:e2:2e:e4:87:81]
            modulus: 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
    public exponent: 10001

] 
2022-07-21 06:42:02.431  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-21 06:42:02.434 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-21 06:42:02.441 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-21 06:42:02.444 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-21 06:42:02.446  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-21 06:42:02.451  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-21 06:42:02.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-21 06:42:02.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-21 06:42:02.480 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-21 06:42:02.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-21 06:42:02.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-21 06:42:02.557 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-21 06:42:02.558 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-21 06:42:02.558 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-21 06:42:02.728  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-21 06:42:02.729  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-21 06:42:02.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-21 06:42:02.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-21 06:42:02.734  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-21 06:42:02.736  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-21 06:42:02.756 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-21 06:42:02.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-21 06:42:02.763 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-21 06:42:02.766 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-21 06:42:02.767 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-21 06:42:02.768 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-21 06:42:02.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-21 06:42:02.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-21 06:42:02.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-21 06:42:02.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-21 06:42:02.784 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 579908091849282152125104828268249456689908714450
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jul 21 05:17:43 UTC 2022
           Final Date: Tue Jul 20 05:17:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:3f:11:7b:95:48:68:b6:34:00:7f:9f:64:c4:49:18:89:a8:2e:44]
            modulus: b70203a05e53d55bf2c80ed9e3dc0fd2c864257c134d327895b9402e7baeeb0f2356073a82c1855a075268272fe093dae377464818e6923fc5f91f58f4512e3b9f3bfae73c0a22e301baa5d47be7bde9f69911c6b75be9ee20aaa48abdb915c0d23eb3a1fb12346bfeda0679dec0ee96564469727a4659119a9d417edc169c5931b8e8c2ff0b64ba6eae2631649274a68c59576d1c6120b86e3c64d87463b862fca0f991fb6011970bebffaeabb0278baecaf3a2c1f1cb9756f60e7be0e3ca8211ffc63fbec7ce2f90640ad0fd18a3e9bd35fcbc37330618a8889d282f5ef9241e9dda39dba050e721dbd11a46604bbec0ef912ae3d5dde63e1a704437ccd9600e6a774d8d52dc6e732638f834cf3e485e0a02aa9490834979b0b3d56cc56d98c1f1a9880f7777d94190df03e43371aac0fd0b44ed3955b884a66edcf98a7c8de72845dc2e8daf0130b9d21d4457c83ba8afdb11d896b5dd993311c9959192bfce88a2a63520821b7d446779d516ce950b836875a74b5c2ade68683c1799c3f3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5820b90709202939c3463b59b35ad5a013bfe48e
                       d58fc57fbc6fc98a4251832039f3091fa6998bf9
                       2f0dc2ce7a6cd11d9996355ec9deb9a1806abe1a
                       76c77c2c623952bb2f03f8e774635c7fd101e614
                       31498197772f237526fce757239f02fee6b7f3d1
                       2e293bd2dfcf5a3b05c411440554fa62963a9a45
                       01f73c465c40b6fe028996b3ae8409347d7f9bcf
                       80356962234775c71ae94175024abbd29f7c3a5b
                       88319e5cd33781e542fde416fdba07d881d7e2f5
                       d2e112df543a0cb95cadf3688177d0b058b547f5
                       60c627df0a4209cd590153bb7439ae909b2c1bab
                       986b948cbe5c7adfcdb5569be6399ed5a2a54f89
                       10cebd58822b958e1e5797494db08a0405819ef2
                       15aa3b29925ed0157ce53a8e15c9d6cbd11026af
                       9e32e2467b3ad1bbe756a6a6f39936dc2f078675
                       c5f0ddc104c570105d5734469e38dbbf9ceb4b10
                       8332f7b33000004e7ebb8f8ceb625e2143e5f01e
                       9b102d29a5ff6516e508c0d0d1be4721fc4b308a
                       6096de861100a2bce1018d812cd284e33d90f2a8
                       b1700d85
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f5:c1:3f:48:87:d5:72:8a:ae:27:15:dd:42:39:2a:48:00:27:d0:5b]
            modulus: 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
    public exponent: 10001

] 
2022-07-21 06:44:11.575  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-21 06:44:11.578 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-21 06:44:11.580 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-21 06:44:11.586 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-21 06:44:11.587  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-21 06:44:11.588  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-21 06:44:11.589  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-21 06:44:11.617 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-21 06:44:11.622 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-21 06:44:11.623 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-21 06:44:11.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-21 06:44:11.635 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-21 06:44:11.636 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-21 06:44:11.636 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-21 06:44:11.785  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-21 06:44:11.786  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-21 06:44:11.787 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-21 06:44:11.791 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-21 06:44:11.796  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-21 06:44:11.797  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-21 06:44:11.798 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-21 06:44:11.799 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-21 06:44:11.800 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-21 06:44:11.808 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-21 06:44:11.809 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-21 06:44:11.810 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-21 06:44:11.812 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-21 06:44:11.813 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-21 06:44:11.813 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-21 06:44:11.817 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-21 06:44:11.824 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 579908091849282152125104828268249456689908714450
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jul 21 05:17:43 UTC 2022
           Final Date: Tue Jul 20 05:17:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:3f:11:7b:95:48:68:b6:34:00:7f:9f:64:c4:49:18:89:a8:2e:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5820b90709202939c3463b59b35ad5a013bfe48e
                       d58fc57fbc6fc98a4251832039f3091fa6998bf9
                       2f0dc2ce7a6cd11d9996355ec9deb9a1806abe1a
                       76c77c2c623952bb2f03f8e774635c7fd101e614
                       31498197772f237526fce757239f02fee6b7f3d1
                       2e293bd2dfcf5a3b05c411440554fa62963a9a45
                       01f73c465c40b6fe028996b3ae8409347d7f9bcf
                       80356962234775c71ae94175024abbd29f7c3a5b
                       88319e5cd33781e542fde416fdba07d881d7e2f5
                       d2e112df543a0cb95cadf3688177d0b058b547f5
                       60c627df0a4209cd590153bb7439ae909b2c1bab
                       986b948cbe5c7adfcdb5569be6399ed5a2a54f89
                       10cebd58822b958e1e5797494db08a0405819ef2
                       15aa3b29925ed0157ce53a8e15c9d6cbd11026af
                       9e32e2467b3ad1bbe756a6a6f39936dc2f078675
                       c5f0ddc104c570105d5734469e38dbbf9ceb4b10
                       8332f7b33000004e7ebb8f8ceb625e2143e5f01e
                       9b102d29a5ff6516e508c0d0d1be4721fc4b308a
                       6096de861100a2bce1018d812cd284e33d90f2a8
                       b1700d85
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [78:24:71:b4:8e:31:4c:d2:1b:bc:33:83:0a:3e:6d:5b:18:5a:83:57]
            modulus: d1a8d5876f4c49548de8c0e942e653e58048a2ea1b33be501ccc10cc774dd3e8f58e8c6f3d0d81da46ebd41d402ef4d14edaec60d2a9187d4f14bd05af9dac4417ab6cb3634e6d3b8018d164eeb484f0a7b152975d6ceb7a14072d304f5d2edf74b265ef291d011348c2ab4dd1ce192f849c5ed9c853868d3c9dbfbe8a07a8c6b8cf08e223f2b0de631843b22a18bbe0f153735a59fca0dcf971f744b9e84a443f649cc83234ac0f1906bc4d37db43c44d84796705d334e6d1496da9c5c37f3db0764a6739274dafb94b5c59cb0927d81f598b775ffcbd3b545de5de4519289167f642ef99188643d29e27497fe7ee4d9146545577cf31f3899caf3631a70489
    public exponent: 10001

]