Results

By type

          2021-12-10 02:36:43,262 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-12-10 02:36:47,356 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-12-10 02:36:50.244  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-12-10 02:37:02.343 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-12-10 02:37:03.342  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-12-10 02:37:03.864  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-12-10 02:37:13.660  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 32.305 seconds (JVM running for 38.246)
2021-12-10 02:38:12.655  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-12-10 02:38:12.664 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-12-10 02:38:12.842 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-12-10 02:38:12.846 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-12-10 02:38:12.943  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-12-10 02:38:12.946  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-12-10 02:38:12.948  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-12-10 02:38:12.950 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-12-10 02:38:12.950 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-10 02:38:12.954 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-12-10 02:38:13.053 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-12-10 02:38:13.057 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-12-10 02:38:13.245 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-12-10 02:38:13.250 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-10 02:38:13.250 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-10 02:38:13.253 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-10 02:38:14.650  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-12-10 02:38:14.654  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-12-10 02:38:14.655 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-12-10 02:38:14.657 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-10 02:38:14.745  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-12-10 02:38:14.746  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-12-10 02:38:14.747 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-10 02:38:14.748 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-10 02:38:14.748 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-10 02:38:14.758 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-10 02:38:14.759 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-10 02:38:14.759 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-10 02:38:14.844 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-10 02:38:14.845 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-10 02:38:14.845 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-10 02:38:14.847 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-12-10 02:38:14.951 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 545253812856669976650988101039527632364598112640
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 10 02:25:48 UTC 2021
           Final Date: Wed Dec 10 02:25:47 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:cc:89:a1:28:b8:6f:df:e4:e9:e3:01:c1:b1:a9:f6:79:5f:09:a2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46d7be057ef16a9fbe69572b24b2e5399fc96f56
                       1b53d852770ef8def17f32ee26c736dbc4820d0e
                       0de28552ef39642295eb9ae459800b74922c1052
                       e70830aa3faa8c1a7baedf6f4ab8f38250da9219
                       134ae8deea08db2be753f94471bba58519db87e6
                       5067ad1024bc861e58e07afbca59eaaad0a2f412
                       15407df87efb681f9a5f39bedcfe5f310b3772b3
                       1f10bafde10ff2eccc592c564fd508025a7918c4
                       cada50eb1865efe00b1919750f3fdfee8cc286ed
                       9d88e7c9e61c8d873ee63f8ff38ab712abcb7f22
                       281444cc8d03306870c123cb0fec8828d6f18a25
                       f8291a7c9259ebc811a2ec8913c91d2664ac9132
                       bc46e64166d0b67c4630a6ed2480e4e36e977366
                       9df79b4a78388ba066333be25e23453604242b56
                       1084f1995ddbd8b0754592f00aacaff09ac9d487
                       b9608b5e3a0731631dd3e26e989ad70ce2cc2709
                       818dd804dc67ccd3d36e5cf485460a65a78c2e20
                       8d8a87ced1bdda17bce6872573b3a240b7c0b8ae
                       962f0aba2f381e222e430b04a0a7563272562cf6
                       a9455874
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:c0:d0:b0:e1:6c:bd:0e:41:50:76:57:32:27:54:50:c0:44:60:28]
            modulus: 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
    public exponent: 10001

] 
2021-12-10 04:01:23.204  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-12-10 04:01:23.206 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-12-10 04:01:23.208 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-12-10 04:01:23.209 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-12-10 04:01:23.209  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-12-10 04:01:23.210  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-12-10 04:01:23.239  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-12-10 04:01:23.240 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-12-10 04:01:23.240 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-12-10 04:01:23.240 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-12-10 04:01:23.246 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-12-10 04:01:23.247 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-10 04:01:23.247 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-10 04:01:23.248 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-10 04:01:23.447  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-12-10 04:01:23.447  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-12-10 04:01:23.448 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-12-10 04:01:23.448 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-10 04:01:23.450  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-12-10 04:01:23.451  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-12-10 04:01:23.451 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-10 04:01:23.452 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-10 04:01:23.452 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-10 04:01:23.453 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-10 04:01:23.454 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-10 04:01:23.454 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-10 04:01:23.455 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-10 04:01:23.456 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-10 04:01:23.456 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-10 04:01:23.457 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-12-10 04:01:23.461 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 545253812856669976650988101039527632364598112640
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 10 02:25:48 UTC 2021
           Final Date: Wed Dec 10 02:25:47 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:cc:89:a1:28:b8:6f:df:e4:e9:e3:01:c1:b1:a9:f6:79:5f:09:a2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46d7be057ef16a9fbe69572b24b2e5399fc96f56
                       1b53d852770ef8def17f32ee26c736dbc4820d0e
                       0de28552ef39642295eb9ae459800b74922c1052
                       e70830aa3faa8c1a7baedf6f4ab8f38250da9219
                       134ae8deea08db2be753f94471bba58519db87e6
                       5067ad1024bc861e58e07afbca59eaaad0a2f412
                       15407df87efb681f9a5f39bedcfe5f310b3772b3
                       1f10bafde10ff2eccc592c564fd508025a7918c4
                       cada50eb1865efe00b1919750f3fdfee8cc286ed
                       9d88e7c9e61c8d873ee63f8ff38ab712abcb7f22
                       281444cc8d03306870c123cb0fec8828d6f18a25
                       f8291a7c9259ebc811a2ec8913c91d2664ac9132
                       bc46e64166d0b67c4630a6ed2480e4e36e977366
                       9df79b4a78388ba066333be25e23453604242b56
                       1084f1995ddbd8b0754592f00aacaff09ac9d487
                       b9608b5e3a0731631dd3e26e989ad70ce2cc2709
                       818dd804dc67ccd3d36e5cf485460a65a78c2e20
                       8d8a87ced1bdda17bce6872573b3a240b7c0b8ae
                       962f0aba2f381e222e430b04a0a7563272562cf6
                       a9455874
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f8:f2:a5:95:54:79:bb:b3:3b:94:1f:c9:a6:0b:56:7a:9a:86:e7:58]
            modulus: cb8f3678cf7f7efaba9e2e20d14718bdd5af062b81ead1ab73d903ff3e56b63583b9c590bb308395b2cffeb0071b92487f439181492f16a69dfdf02e8a6d7606079040ac0df25c125cae73927ad40d227b7fd8707f25d5f61a521c7589311c01c9e9232ce3bc65d39ff974f69068880999bb9f4b7bc224ef86678437fa1205fcc2bd062fbbb002283249aafae67114d48b3e004e3bd81778fbd781e7825130053752484eb36ca818f430fa4acc5d1e612e2f2446f02a5284b0b7dcb0812a5085d6239bf7969b0c5b91fd287f94d451879cce9f14a1ba8ebe5d2222dbbaa9759d33c78de0eadb1932c7926049d171679b77fa6786084b930cdf9183b1b8c8c25d
    public exponent: 10001

] 
2021-12-10 04:03:36.672  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-12-10 04:03:36.673 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-12-10 04:03:36.674 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-12-10 04:03:36.675 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-12-10 04:03:36.676  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-12-10 04:03:36.676  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-12-10 04:03:36.677  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-12-10 04:03:36.677 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-12-10 04:03:36.677 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-12-10 04:03:36.678 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-12-10 04:03:36.687 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-12-10 04:03:36.687 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-10 04:03:36.687 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-10 04:03:36.688 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-10 04:03:36.831  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-12-10 04:03:36.839  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-12-10 04:03:36.839 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-12-10 04:03:36.840 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-10 04:03:36.842  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-12-10 04:03:36.843  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-12-10 04:03:36.843 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-10 04:03:36.844 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-10 04:03:36.844 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-10 04:03:36.845 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-10 04:03:36.846 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-10 04:03:36.846 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-10 04:03:36.847 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-10 04:03:36.848 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-10 04:03:36.848 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-10 04:03:36.850 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-12-10 04:03:36.854 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 545253812856669976650988101039527632364598112640
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 10 02:25:48 UTC 2021
           Final Date: Wed Dec 10 02:25:47 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:cc:89:a1:28:b8:6f:df:e4:e9:e3:01:c1:b1:a9:f6:79:5f:09:a2]
            modulus: bdb91486eef4546a350ea7bcea4bb36ecef244c2c062911671fd1c74694514e941cce4668640bedda224b6f54d0c2887b1c6c5261c307d6e1221172e523481f0140e749e19a498b6a3a9f6c4fea4747c42855d8fa9e1942925b8420b38b74179f22a8d2b8db629532d60d47990f4b8c0ae9f0fbd19906dc9a8d6c5a0ec7a5e429fcde4063b6c2bd72dec1985cec0574734434176566399b7f279a7927cf64c7f064d84ab2edd1457d1b470b587963660dd139a2d26fec8452ff7ca44ca8e886f2463667cb78200c1f396067f7303593b997a990e3a42f8c525c9b4d85487d6b96c8ade846dd1c037cdc3235bd85bdf98b928bdedc46ea93cb19d63bc36083f39c1f2ae700f1c33566ce0ac49699d16759a2560f0f4b6378ed56814bb7dc3fcbe78737ac8da5705d9412a630808faa1b1d64e213c1e0ba526f897455469ed3e0e1cfada1669d27f0c24127dbc9f72178903d8222d40033a351f3f8ced77dcdc30d02e37f66dcce4112798e0ec35fecba3d1c8924d909b2e520508b5350b7c6f69
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46d7be057ef16a9fbe69572b24b2e5399fc96f56
                       1b53d852770ef8def17f32ee26c736dbc4820d0e
                       0de28552ef39642295eb9ae459800b74922c1052
                       e70830aa3faa8c1a7baedf6f4ab8f38250da9219
                       134ae8deea08db2be753f94471bba58519db87e6
                       5067ad1024bc861e58e07afbca59eaaad0a2f412
                       15407df87efb681f9a5f39bedcfe5f310b3772b3
                       1f10bafde10ff2eccc592c564fd508025a7918c4
                       cada50eb1865efe00b1919750f3fdfee8cc286ed
                       9d88e7c9e61c8d873ee63f8ff38ab712abcb7f22
                       281444cc8d03306870c123cb0fec8828d6f18a25
                       f8291a7c9259ebc811a2ec8913c91d2664ac9132
                       bc46e64166d0b67c4630a6ed2480e4e36e977366
                       9df79b4a78388ba066333be25e23453604242b56
                       1084f1995ddbd8b0754592f00aacaff09ac9d487
                       b9608b5e3a0731631dd3e26e989ad70ce2cc2709
                       818dd804dc67ccd3d36e5cf485460a65a78c2e20
                       8d8a87ced1bdda17bce6872573b3a240b7c0b8ae
                       962f0aba2f381e222e430b04a0a7563272562cf6
                       a9455874
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [80:72:e1:ae:ff:5d:a1:3a:81:e8:cd:92:87:4f:a2:c5:53:36:2b:b1]
            modulus: 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
    public exponent: 10001

] 
2021-12-10 04:06:09.844  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-12-10 04:06:09.845 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-12-10 04:06:09.847 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-12-10 04:06:09.847 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-12-10 04:06:09.848  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-12-10 04:06:09.848  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-12-10 04:06:09.849  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-12-10 04:06:09.849 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-12-10 04:06:09.850 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-12-10 04:06:09.850 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-12-10 04:06:09.854 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-12-10 04:06:09.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-10 04:06:09.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-10 04:06:09.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-10 04:06:10.007  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-12-10 04:06:10.008  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-12-10 04:06:10.008 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-12-10 04:06:10.009 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-10 04:06:10.011  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-12-10 04:06:10.011  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-12-10 04:06:10.011 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-10 04:06:10.012 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-10 04:06:10.012 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-10 04:06:10.013 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-10 04:06:10.013 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-10 04:06:10.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-10 04:06:10.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-10 04:06:10.015 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-10 04:06:10.015 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-10 04:06:10.016 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-12-10 04:06:10.019 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 545253812856669976650988101039527632364598112640
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 10 02:25:48 UTC 2021
           Final Date: Wed Dec 10 02:25:47 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:cc:89:a1:28:b8:6f:df:e4:e9:e3:01:c1:b1:a9:f6:79:5f:09:a2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46d7be057ef16a9fbe69572b24b2e5399fc96f56
                       1b53d852770ef8def17f32ee26c736dbc4820d0e
                       0de28552ef39642295eb9ae459800b74922c1052
                       e70830aa3faa8c1a7baedf6f4ab8f38250da9219
                       134ae8deea08db2be753f94471bba58519db87e6
                       5067ad1024bc861e58e07afbca59eaaad0a2f412
                       15407df87efb681f9a5f39bedcfe5f310b3772b3
                       1f10bafde10ff2eccc592c564fd508025a7918c4
                       cada50eb1865efe00b1919750f3fdfee8cc286ed
                       9d88e7c9e61c8d873ee63f8ff38ab712abcb7f22
                       281444cc8d03306870c123cb0fec8828d6f18a25
                       f8291a7c9259ebc811a2ec8913c91d2664ac9132
                       bc46e64166d0b67c4630a6ed2480e4e36e977366
                       9df79b4a78388ba066333be25e23453604242b56
                       1084f1995ddbd8b0754592f00aacaff09ac9d487
                       b9608b5e3a0731631dd3e26e989ad70ce2cc2709
                       818dd804dc67ccd3d36e5cf485460a65a78c2e20
                       8d8a87ced1bdda17bce6872573b3a240b7c0b8ae
                       962f0aba2f381e222e430b04a0a7563272562cf6
                       a9455874
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0e:a5:1a:04:64:3d:e4:66:4e:40:58:37:7d:ff:09:20:b4:c2:68:ff]
            modulus: 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
    public exponent: 10001

]