Results

By type

          2021-11-07 02:48:46,596 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-07 02:48:50,282 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-07 02:48:52.989  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-07 02:49:05.594 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-07 02:49:06.689  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-07 02:49:07.298  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-07 02:49:17.502  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 33.009 seconds (JVM running for 39.637)
2021-11-07 02:51:10.381  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-07 02:51:10.391 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-07 02:51:10.511 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-07 02:51:10.514 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-07 02:51:10.680  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-07 02:51:10.683  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-07 02:51:10.684  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-07 02:51:10.687 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-07 02:51:10.688 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-07 02:51:10.692 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-07 02:51:10.699 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-07 02:51:10.702 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-07 02:51:10.889 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-07 02:51:10.896 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-07 02:51:10.897 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-07 02:51:10.900 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-07 02:51:12.283  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-07 02:51:12.287  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-07 02:51:12.288 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-07 02:51:12.291 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-07 02:51:12.306  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-07 02:51:12.307  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-07 02:51:12.308 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-07 02:51:12.379 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-07 02:51:12.381 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-07 02:51:12.395 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-07 02:51:12.396 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-07 02:51:12.396 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-07 02:51:12.402 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-07 02:51:12.402 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-07 02:51:12.403 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-07 02:51:12.479 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-07 02:51:12.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576746391933277314125853416576444015741787010762
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 07 02:45:02 UTC 2021
           Final Date: Fri Nov 07 02:45:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:ac:40:2e:7c:96:e9:fd:4c:08:7a:2b:2f:fd:de:7b:0e:bd:e2:c6]
            modulus: a90ed419befca29d738e970a876e7a87c55c79aad2585fe3f960fd05c2a5cb6b4b1ffc29364b7532f6613b16bd67310ace29559454fc456192ebf6eb93f80f678e2e0c1ac04bb7014cec312600dc97c1438bbc589a21f98001ab5a95808c8de3c2d53bd36d02bc22c8c1b1464473b0a5352f027aebe693a63a6c58da8271f9db84f2dbfc11a061fe52827e826748ad082196ab266d8b499d3420e75f5370b4fc9a1a07fe205e2e09c5b7e15aa03d07e1141d8e1a82ffbe61edaa796244a212a0c95d8d82be1d72e764b5c95245fe7db149815751c76f3fca7c39a93e0471bd58a4e1c8c00372afa47dab9bf7fecaadddfdef3735008cc4dee7d193cd5dd7178c75d081fdca0f342eef860afff3a46080d135e85ff17bbe22ea10884becc420c4dbe254e1221fb08116b29fdbc66b0dacb1354135e62fe088fe47f465be697a5ce85bff4bddc15babe73a510bbeeaf66594d2adf2cf9fa7db598c4b58d642731c69fc84ec32ad6c69fb3101bbadaef637f161ed2ac6718bc2a08f4234d0af6335
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44a9c789e3290047cb001e660dfbbb6594c979d9
                       cb8e63dd4e4ffead868f9bb6c5cc2a2db4481e69
                       fa1447e79f820a51659626a34f113b19abb8a3b4
                       9a9651f74c360d8467e33bd36f2013cba21e7dfe
                       292d0c7ac1918c6803d7e786c4e8bd140da228ac
                       4be51c607ed0109e4d7ba5a3e93e1fffd5a13f97
                       886b51803cee01cca7efe1c5fb98ff2329ae25d6
                       9790bc425b6a4aedf646aa457ed8a7e28c50500c
                       0d14e6b3a6d8960f237c0f215a1adce6b669ef6a
                       129341aee76b13b9dd7c59b091f66fcca3402cbb
                       4ff699d39349c7d8ff960047f19512bfe5ea23a5
                       a21cf1707f3faebbacda4045c2d6d2dd2a7357c7
                       e41ba5dc36f708cf9bee8aaae903108291e9c423
                       59685cfc938757db60ba27f663b0a3a51974a394
                       8c08b21c4a4eb1c841ff891be33e9a0eb501a65a
                       82ff22756324039d36c97bbb3e89424ca271d4d4
                       9263c1695106ff15bb3a3ff4cb1a3eb5a47190f8
                       e9800673b31e8e78ffac2b04d64341fefeb11a16
                       4627fce30232b36779c12b24de5a4f5608a23324
                       9694b17f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [68:7a:42:d7:2c:73:b3:e8:20:c4:11:45:15:e3:34:81:7d:3c:22:34]
            modulus: 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
    public exponent: 10001

] 
2021-11-07 05:05:59.781  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-07 05:05:59.783 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-07 05:05:59.785 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-07 05:05:59.786 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-07 05:05:59.787  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-07 05:05:59.788  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-07 05:05:59.788  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-07 05:05:59.789 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-07 05:05:59.789 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-07 05:05:59.790 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-07 05:05:59.796 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-07 05:05:59.881 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-07 05:05:59.881 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-07 05:05:59.882 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-07 05:06:00.212  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-07 05:06:00.213  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-07 05:06:00.214 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-07 05:06:00.214 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-07 05:06:00.216  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-07 05:06:00.217  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-07 05:06:00.217 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-07 05:06:00.217 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-07 05:06:00.218 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-07 05:06:00.219 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-07 05:06:00.219 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-07 05:06:00.219 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-07 05:06:00.220 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-07 05:06:00.279 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-07 05:06:00.280 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-07 05:06:00.281 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-07 05:06:00.286 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576746391933277314125853416576444015741787010762
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 07 02:45:02 UTC 2021
           Final Date: Fri Nov 07 02:45:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:ac:40:2e:7c:96:e9:fd:4c:08:7a:2b:2f:fd:de:7b:0e:bd:e2:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44a9c789e3290047cb001e660dfbbb6594c979d9
                       cb8e63dd4e4ffead868f9bb6c5cc2a2db4481e69
                       fa1447e79f820a51659626a34f113b19abb8a3b4
                       9a9651f74c360d8467e33bd36f2013cba21e7dfe
                       292d0c7ac1918c6803d7e786c4e8bd140da228ac
                       4be51c607ed0109e4d7ba5a3e93e1fffd5a13f97
                       886b51803cee01cca7efe1c5fb98ff2329ae25d6
                       9790bc425b6a4aedf646aa457ed8a7e28c50500c
                       0d14e6b3a6d8960f237c0f215a1adce6b669ef6a
                       129341aee76b13b9dd7c59b091f66fcca3402cbb
                       4ff699d39349c7d8ff960047f19512bfe5ea23a5
                       a21cf1707f3faebbacda4045c2d6d2dd2a7357c7
                       e41ba5dc36f708cf9bee8aaae903108291e9c423
                       59685cfc938757db60ba27f663b0a3a51974a394
                       8c08b21c4a4eb1c841ff891be33e9a0eb501a65a
                       82ff22756324039d36c97bbb3e89424ca271d4d4
                       9263c1695106ff15bb3a3ff4cb1a3eb5a47190f8
                       e9800673b31e8e78ffac2b04d64341fefeb11a16
                       4627fce30232b36779c12b24de5a4f5608a23324
                       9694b17f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3b:4d:41:6c:16:b5:60:0a:ba:69:bc:6d:d4:96:20:88:d3:49:18:83]
            modulus: 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
    public exponent: 10001

] 
2021-11-07 05:08:52.225  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-07 05:08:52.227 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-07 05:08:52.228 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-07 05:08:52.229 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-07 05:08:52.231  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-07 05:08:52.232  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-07 05:08:52.232  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-07 05:08:52.232 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-07 05:08:52.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-07 05:08:52.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-07 05:08:52.287 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-07 05:08:52.287 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-07 05:08:52.288 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-07 05:08:52.288 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-07 05:08:52.468  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-07 05:08:52.480  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-07 05:08:52.480 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-07 05:08:52.480 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-07 05:08:52.486  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-07 05:08:52.487  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-07 05:08:52.487 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-07 05:08:52.488 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-07 05:08:52.488 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-07 05:08:52.489 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-07 05:08:52.489 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-07 05:08:52.490 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-07 05:08:52.490 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-07 05:08:52.491 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-07 05:08:52.491 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-07 05:08:52.492 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-07 05:08:52.495 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576746391933277314125853416576444015741787010762
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 07 02:45:02 UTC 2021
           Final Date: Fri Nov 07 02:45:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:ac:40:2e:7c:96:e9:fd:4c:08:7a:2b:2f:fd:de:7b:0e:bd:e2:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44a9c789e3290047cb001e660dfbbb6594c979d9
                       cb8e63dd4e4ffead868f9bb6c5cc2a2db4481e69
                       fa1447e79f820a51659626a34f113b19abb8a3b4
                       9a9651f74c360d8467e33bd36f2013cba21e7dfe
                       292d0c7ac1918c6803d7e786c4e8bd140da228ac
                       4be51c607ed0109e4d7ba5a3e93e1fffd5a13f97
                       886b51803cee01cca7efe1c5fb98ff2329ae25d6
                       9790bc425b6a4aedf646aa457ed8a7e28c50500c
                       0d14e6b3a6d8960f237c0f215a1adce6b669ef6a
                       129341aee76b13b9dd7c59b091f66fcca3402cbb
                       4ff699d39349c7d8ff960047f19512bfe5ea23a5
                       a21cf1707f3faebbacda4045c2d6d2dd2a7357c7
                       e41ba5dc36f708cf9bee8aaae903108291e9c423
                       59685cfc938757db60ba27f663b0a3a51974a394
                       8c08b21c4a4eb1c841ff891be33e9a0eb501a65a
                       82ff22756324039d36c97bbb3e89424ca271d4d4
                       9263c1695106ff15bb3a3ff4cb1a3eb5a47190f8
                       e9800673b31e8e78ffac2b04d64341fefeb11a16
                       4627fce30232b36779c12b24de5a4f5608a23324
                       9694b17f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [de:e8:5e:2d:a6:37:ed:ce:a5:73:d9:b4:2d:3b:9c:2a:aa:21:7c:39]
            modulus: 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
    public exponent: 10001

] 
2021-11-07 05:11:01.692  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-07 05:11:01.694 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-07 05:11:01.695 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-07 05:11:01.696 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-07 05:11:01.697  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-07 05:11:01.698  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-07 05:11:01.698  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-07 05:11:01.699 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-07 05:11:01.699 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-07 05:11:01.700 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-07 05:11:01.707 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-07 05:11:01.707 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-07 05:11:01.708 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-07 05:11:01.779 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-07 05:11:01.864  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-07 05:11:01.880  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-07 05:11:01.880 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-07 05:11:01.880 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-07 05:11:01.882  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-07 05:11:01.882  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-07 05:11:01.883 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-07 05:11:01.883 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-07 05:11:01.883 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-07 05:11:01.884 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-07 05:11:01.884 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-07 05:11:01.884 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-07 05:11:01.885 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-07 05:11:01.885 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-07 05:11:01.885 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-07 05:11:01.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-07 05:11:01.889 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 576746391933277314125853416576444015741787010762
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 07 02:45:02 UTC 2021
           Final Date: Fri Nov 07 02:45:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:ac:40:2e:7c:96:e9:fd:4c:08:7a:2b:2f:fd:de:7b:0e:bd:e2:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44a9c789e3290047cb001e660dfbbb6594c979d9
                       cb8e63dd4e4ffead868f9bb6c5cc2a2db4481e69
                       fa1447e79f820a51659626a34f113b19abb8a3b4
                       9a9651f74c360d8467e33bd36f2013cba21e7dfe
                       292d0c7ac1918c6803d7e786c4e8bd140da228ac
                       4be51c607ed0109e4d7ba5a3e93e1fffd5a13f97
                       886b51803cee01cca7efe1c5fb98ff2329ae25d6
                       9790bc425b6a4aedf646aa457ed8a7e28c50500c
                       0d14e6b3a6d8960f237c0f215a1adce6b669ef6a
                       129341aee76b13b9dd7c59b091f66fcca3402cbb
                       4ff699d39349c7d8ff960047f19512bfe5ea23a5
                       a21cf1707f3faebbacda4045c2d6d2dd2a7357c7
                       e41ba5dc36f708cf9bee8aaae903108291e9c423
                       59685cfc938757db60ba27f663b0a3a51974a394
                       8c08b21c4a4eb1c841ff891be33e9a0eb501a65a
                       82ff22756324039d36c97bbb3e89424ca271d4d4
                       9263c1695106ff15bb3a3ff4cb1a3eb5a47190f8
                       e9800673b31e8e78ffac2b04d64341fefeb11a16
                       4627fce30232b36779c12b24de5a4f5608a23324
                       9694b17f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ca:0e:3c:5c:eb:9b:31:e6:fd:0a:7b:07:57:8e:34:2a:16:47:10:25]
            modulus: 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
    public exponent: 10001

]