Results

By type

          2021-12-09 02:35:58,448 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-12-09 02:36:02,243 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-12-09 02:36:04.845  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-12-09 02:36:17.346 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-12-09 02:36:18.364  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-12-09 02:36:18.959  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-12-09 02:36:29.541  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 33.017 seconds (JVM running for 39.435)
2021-12-09 02:37:16.044  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-12-09 02:37:16.052 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-12-09 02:37:16.243 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-12-09 02:37:16.247 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-12-09 02:37:16.343  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-12-09 02:37:16.346  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-12-09 02:37:16.347  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-12-09 02:37:16.350 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-12-09 02:37:16.350 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-09 02:37:16.446 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-12-09 02:37:16.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-12-09 02:37:16.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-12-09 02:37:16.748 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-12-09 02:37:16.753 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-09 02:37:16.754 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-09 02:37:16.757 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-09 02:37:18.074  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-12-09 02:37:18.077  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-12-09 02:37:18.078 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-12-09 02:37:18.143 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-09 02:37:18.151  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-12-09 02:37:18.153  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-12-09 02:37:18.153 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-09 02:37:18.154 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-09 02:37:18.154 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-09 02:37:18.248 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-09 02:37:18.249 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-09 02:37:18.249 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-09 02:37:18.255 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-09 02:37:18.255 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-09 02:37:18.256 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-09 02:37:18.257 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-12-09 02:37:18.357 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 231795110891657106544813399188782667957473167822
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 09 02:32:27 UTC 2021
           Final Date: Tue Dec 09 02:32:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [41:0e:ee:e3:ee:bb:c9:18:41:91:39:6e:8b:5a:2c:2b:7d:19:f8:10]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44ca92b56f38eec8a2fc28041974038cf1c95f87
                       383e9fbfb265c2aa3add6d950d39a8ec5710fa33
                       4bfda738192df0cefb1fb36978baec255d800977
                       473b7bd1087e53c4f4074d997823fbf8d44b8976
                       5ed6eb0bbbaad5fbaa975e7bc2611f87c4a3f983
                       b45f724c0c2097868498627505c4a5e4d2137c67
                       ac938dce30588a464a469f2b05b305706e5a78cd
                       ac321778685468bf2b2ca1f41d3bbe8c0e9f066a
                       4bc41626416da5b018efa1569555762b33f59eae
                       43acedd0572cd186ec1c90c5f1de95781fc9a573
                       b98ce70d0bfc18fd98f58a11bbbfe4ce9d6e78a9
                       7e054ba885cc388bd4af0386b845a5029693bb25
                       cf80aecda2e9d79f095a1ed1bc00fb5df52ec274
                       4f18a6e11e2f7bc6ad9119354f5184f7ec5b612c
                       cce5fddadf1dd3626942c2c1923ab01b334ceb40
                       1cc84ccffece857064daf20fe88aec66bc9ff87b
                       361e794f06fba5fc1be16ba052f8d4868f4bd8cd
                       f705dee51f926cd38ccbd12940b10e1ec38159a0
                       ff3198239c0c269ab1cf10917f8d568c0af93828
                       01d268fb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:ff:2d:84:7c:94:b2:43:9f:a2:57:b8:25:3d:63:ca:6b:70:42:68]
            modulus: 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
    public exponent: 10001

] 
2021-12-09 03:55:52.632  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-12-09 03:55:52.634 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-12-09 03:55:52.636 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-12-09 03:55:52.637 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-12-09 03:55:52.639  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-12-09 03:55:52.640  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-12-09 03:55:52.641  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-12-09 03:55:52.644 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-12-09 03:55:52.644 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-12-09 03:55:52.645 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-12-09 03:55:52.653 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-12-09 03:55:52.654 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-09 03:55:52.654 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-09 03:55:52.655 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-09 03:55:52.887  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-12-09 03:55:52.888  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-12-09 03:55:52.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-12-09 03:55:52.889 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-09 03:55:52.891  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-12-09 03:55:52.892  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-12-09 03:55:52.892 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-09 03:55:52.893 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-09 03:55:52.893 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-09 03:55:52.894 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-09 03:55:52.894 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-09 03:55:52.895 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-09 03:55:52.895 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-09 03:55:52.896 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-09 03:55:52.896 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-09 03:55:52.897 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-12-09 03:55:52.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 231795110891657106544813399188782667957473167822
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 09 02:32:27 UTC 2021
           Final Date: Tue Dec 09 02:32:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [41:0e:ee:e3:ee:bb:c9:18:41:91:39:6e:8b:5a:2c:2b:7d:19:f8:10]
            modulus: dbf7a1d0c4aee63b2ebb3c4aaefcd69ff86da42edb115126d2444993bb1bdad24554aa1b04e480abeeef4d98751f9ce8006227c0c835023372bd982ec5c85df25d27d7992c292b378de0663b5650601e0807409c053e55913dc8f19a58651786465bd0fa91f4cbe40f040eb099403226b52483e5b3edbfa767cf262f1c19e55d0acc94395e3581c9c5c99f2901332cca9345e66e02ebefcc970143d56317c1deb5ced8babfa5f42244a7231deaf68d7064cfd505ab00aa84774e322c0a1e17925b9c52780e2972e8d916cf2bbf2d93741d4ba07265db9ab6303bb7c637f8273afb58737f5610c980df5e2fcfffa26a9a99be9f320f6aed74b7b1ed61558c69efb5efb64ea923935e7389367e753e2737fcd09818f3b4bff792923bc25f29d20a70f1bb1d2787eda2ec596f66aa36a335f4416105abb1aae9907416990f248941665ece6805ee1390ec4bdc3679302f1208049eff3c54126c3318958ef534b925b1e45c3baca8bd84300deb1d8c268e54426d93fb0b531cc88537b68e7307bb95
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44ca92b56f38eec8a2fc28041974038cf1c95f87
                       383e9fbfb265c2aa3add6d950d39a8ec5710fa33
                       4bfda738192df0cefb1fb36978baec255d800977
                       473b7bd1087e53c4f4074d997823fbf8d44b8976
                       5ed6eb0bbbaad5fbaa975e7bc2611f87c4a3f983
                       b45f724c0c2097868498627505c4a5e4d2137c67
                       ac938dce30588a464a469f2b05b305706e5a78cd
                       ac321778685468bf2b2ca1f41d3bbe8c0e9f066a
                       4bc41626416da5b018efa1569555762b33f59eae
                       43acedd0572cd186ec1c90c5f1de95781fc9a573
                       b98ce70d0bfc18fd98f58a11bbbfe4ce9d6e78a9
                       7e054ba885cc388bd4af0386b845a5029693bb25
                       cf80aecda2e9d79f095a1ed1bc00fb5df52ec274
                       4f18a6e11e2f7bc6ad9119354f5184f7ec5b612c
                       cce5fddadf1dd3626942c2c1923ab01b334ceb40
                       1cc84ccffece857064daf20fe88aec66bc9ff87b
                       361e794f06fba5fc1be16ba052f8d4868f4bd8cd
                       f705dee51f926cd38ccbd12940b10e1ec38159a0
                       ff3198239c0c269ab1cf10917f8d568c0af93828
                       01d268fb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e4:cd:15:47:f4:6b:5a:40:77:70:85:cd:75:05:a7:ae:c3:45:db:18]
            modulus: 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
    public exponent: 10001

] 
2021-12-09 03:59:06.982  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-12-09 03:59:06.983 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-12-09 03:59:06.984 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-12-09 03:59:06.985 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-12-09 03:59:06.985  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-12-09 03:59:06.986  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-12-09 03:59:06.986  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-12-09 03:59:06.987 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-12-09 03:59:06.987 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-12-09 03:59:06.987 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-12-09 03:59:06.995 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-12-09 03:59:06.995 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-09 03:59:06.996 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-09 03:59:06.996 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-09 03:59:07.129  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-12-09 03:59:07.129  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-12-09 03:59:07.130 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-12-09 03:59:07.130 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-09 03:59:07.145  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-12-09 03:59:07.146  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-12-09 03:59:07.146 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-09 03:59:07.147 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-09 03:59:07.147 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-09 03:59:07.148 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-09 03:59:07.148 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-09 03:59:07.149 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-09 03:59:07.149 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-09 03:59:07.150 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-09 03:59:07.150 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-09 03:59:07.151 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-12-09 03:59:07.154 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 231795110891657106544813399188782667957473167822
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 09 02:32:27 UTC 2021
           Final Date: Tue Dec 09 02:32:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [41:0e:ee:e3:ee:bb:c9:18:41:91:39:6e:8b:5a:2c:2b:7d:19:f8:10]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44ca92b56f38eec8a2fc28041974038cf1c95f87
                       383e9fbfb265c2aa3add6d950d39a8ec5710fa33
                       4bfda738192df0cefb1fb36978baec255d800977
                       473b7bd1087e53c4f4074d997823fbf8d44b8976
                       5ed6eb0bbbaad5fbaa975e7bc2611f87c4a3f983
                       b45f724c0c2097868498627505c4a5e4d2137c67
                       ac938dce30588a464a469f2b05b305706e5a78cd
                       ac321778685468bf2b2ca1f41d3bbe8c0e9f066a
                       4bc41626416da5b018efa1569555762b33f59eae
                       43acedd0572cd186ec1c90c5f1de95781fc9a573
                       b98ce70d0bfc18fd98f58a11bbbfe4ce9d6e78a9
                       7e054ba885cc388bd4af0386b845a5029693bb25
                       cf80aecda2e9d79f095a1ed1bc00fb5df52ec274
                       4f18a6e11e2f7bc6ad9119354f5184f7ec5b612c
                       cce5fddadf1dd3626942c2c1923ab01b334ceb40
                       1cc84ccffece857064daf20fe88aec66bc9ff87b
                       361e794f06fba5fc1be16ba052f8d4868f4bd8cd
                       f705dee51f926cd38ccbd12940b10e1ec38159a0
                       ff3198239c0c269ab1cf10917f8d568c0af93828
                       01d268fb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:ef:86:ec:cf:85:b6:b3:4c:b1:dc:c2:11:13:0a:f9:41:32:98:ba]
            modulus: bbee6798ecbc8a7b125ccba04abf5e2cbfe5b277092dad49f1449f8688b4ffe501900bbfe8646cc70acda9158e485b28d16b334d8dc027866e84311145da4c084f96dda27737749b2c983f8c971a34f8e1abcb82b663e3061c3895713568e088b82468fba8e4c8f0fab69530eaa51c6fb3b65689c23da92efe920c42b16930e9049d0745a056964d549ba62ed5fc3660267d3ca813073cfca09b8abc309b63f81cd540d7a10b0f3de211c137e65b3bbf4f6789dac4391bb8480c25492660f9a90c29406ea4a4b731fa78b6bb72cb161d60800f08a957529279d04b1c3a7a01516e7808ea91b69a1c6823c5dce97678208af191d38a5fd5a1561a66275f8dc7d5
    public exponent: 10001

] 
2021-12-09 04:01:19.146  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-12-09 04:01:19.147 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-12-09 04:01:19.148 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-12-09 04:01:19.149 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-12-09 04:01:19.149  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-12-09 04:01:19.150  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-12-09 04:01:19.151  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-12-09 04:01:19.151 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-12-09 04:01:19.151 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-12-09 04:01:19.152 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-12-09 04:01:19.156 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-12-09 04:01:19.156 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-09 04:01:19.157 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-09 04:01:19.157 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-09 04:01:19.342  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-12-09 04:01:19.343  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-12-09 04:01:19.343 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-12-09 04:01:19.343 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-09 04:01:19.345  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-12-09 04:01:19.345  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-12-09 04:01:19.345 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-09 04:01:19.346 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-09 04:01:19.346 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-09 04:01:19.347 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-09 04:01:19.347 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-09 04:01:19.347 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-09 04:01:19.348 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-09 04:01:19.348 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-09 04:01:19.349 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-09 04:01:19.350 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-12-09 04:01:19.352 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 231795110891657106544813399188782667957473167822
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 09 02:32:27 UTC 2021
           Final Date: Tue Dec 09 02:32:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [41:0e:ee:e3:ee:bb:c9:18:41:91:39:6e:8b:5a:2c:2b:7d:19:f8:10]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44ca92b56f38eec8a2fc28041974038cf1c95f87
                       383e9fbfb265c2aa3add6d950d39a8ec5710fa33
                       4bfda738192df0cefb1fb36978baec255d800977
                       473b7bd1087e53c4f4074d997823fbf8d44b8976
                       5ed6eb0bbbaad5fbaa975e7bc2611f87c4a3f983
                       b45f724c0c2097868498627505c4a5e4d2137c67
                       ac938dce30588a464a469f2b05b305706e5a78cd
                       ac321778685468bf2b2ca1f41d3bbe8c0e9f066a
                       4bc41626416da5b018efa1569555762b33f59eae
                       43acedd0572cd186ec1c90c5f1de95781fc9a573
                       b98ce70d0bfc18fd98f58a11bbbfe4ce9d6e78a9
                       7e054ba885cc388bd4af0386b845a5029693bb25
                       cf80aecda2e9d79f095a1ed1bc00fb5df52ec274
                       4f18a6e11e2f7bc6ad9119354f5184f7ec5b612c
                       cce5fddadf1dd3626942c2c1923ab01b334ceb40
                       1cc84ccffece857064daf20fe88aec66bc9ff87b
                       361e794f06fba5fc1be16ba052f8d4868f4bd8cd
                       f705dee51f926cd38ccbd12940b10e1ec38159a0
                       ff3198239c0c269ab1cf10917f8d568c0af93828
                       01d268fb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ab:06:65:a8:0d:a0:ac:06:3a:ea:78:ea:eb:19:23:87:9a:73:09:fc]
            modulus: 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
    public exponent: 10001

]