Results

By type

          2021-12-13 02:36:06,444 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-12-13 02:36:10,641 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-12-13 02:36:13.748  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-12-13 02:36:27.847 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-12-13 02:36:29.153  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-12-13 02:36:29.848  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-12-13 02:36:41.454  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 37.42 seconds (JVM running for 45.253)
2021-12-13 02:41:55.352  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-12-13 02:41:55.445 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-12-13 02:41:55.635 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-12-13 02:41:55.640 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-12-13 02:41:55.733  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-12-13 02:41:55.736  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-12-13 02:41:55.737  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-12-13 02:41:55.739 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-12-13 02:41:55.740 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-13 02:41:55.743 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-12-13 02:41:55.749 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-12-13 02:41:55.752 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-12-13 02:41:55.942 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-12-13 02:41:55.948 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-13 02:41:55.949 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-13 02:41:55.955 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-13 02:41:57.446  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-12-13 02:41:57.531  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-12-13 02:41:57.533 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-12-13 02:41:57.536 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-13 02:41:57.636  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-12-13 02:41:57.637  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-12-13 02:41:57.638 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-13 02:41:57.639 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-13 02:41:57.639 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-13 02:41:57.650 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-13 02:41:57.650 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-13 02:41:57.651 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-13 02:41:57.736 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-13 02:41:57.737 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-13 02:41:57.738 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-13 02:41:57.740 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-12-13 02:41:57.846 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 476251246085806738391547257855987873016879378633
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Dec 13 02:32:14 UTC 2021
           Final Date: Sat Dec 13 02:32:13 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [93:33:8f:74:29:57:f4:15:38:93:97:47:50:67:1d:b3:8b:0e:cb:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2466a2140543c9abcb3e2f2c06a882767d8d89bd
                       fb4069ae94fc2f65d0eccfd81814ec15483a058d
                       c139cbf0e3dd7a95d0d64e3244ca48ba84a29891
                       9b8b073fa14671c9e9d5070f33357e64590f95fe
                       fad92d915544c8801f17dbd7ecdec1d4ca30319c
                       2321561c9541625b0420ec83a8e071500e65127d
                       72581382ba7af58a8d54b4d493a1a93e18ea0d06
                       0a04cfbdb33c08d7efa168c767c073724a6a3d85
                       29590b302595b0723fac9add96514db4272d96d6
                       d7fabeb9fdab00a03cf707c3cc5ebcac7cd45b72
                       c7cb91d29bfd67373af5de5714a17d25d0f21873
                       51416f8fb38d884a6b5101d8ec72066ff80366a5
                       377a50640e84f15aa1e2a17cd22c64eef2a7dcce
                       ff5e1a7781c042f7fd8a7e48e81c022dec4c8926
                       5602d9cde45915888bf5321835cdbf9edf18e682
                       92a186c1dd572045183cdca769f787c1256635ff
                       97ff6416232e6735b1eb8cffeb1e014df880ea3f
                       563504fcd1f3ad577fff2de35b27a9fc3d1c7c4a
                       4fa50a229568e0060216aa3203717723cff3278b
                       855fcb23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [42:6a:a4:2d:92:52:ac:fe:85:ba:40:1d:57:f6:db:a2:3c:21:6f:3c]
            modulus: b2340a9dce940b6958b5d28bed8d13b9543f9eb971f6335be445afd555267841424275c14baaaf53135e2c8842e596add210da7c98c1b4e303b608d1af67aefaf9b5b079eaa65d124c1e0fba224ea98b84125fb39ec8c3c019d12e833da0ca5792c80526f1f584274060743d13e9fa021e6294bc1838f581c441435c65629a132e43754684d561f985d8bb0faf363550b3a381bff4d531bf917d5ad2f060ba2ce15e2f002c79260bd0f7141788f257596be788652fd3007c6c79a9507b276c06089ad5ca293d14222ba46132b32805ace3c8750df3041231d2540f5f86d6c83910b48e330195da8a268ffdcd003f0d112a92d12c596c29095c42c5dd25523215
    public exponent: 10001

] 
2021-12-13 04:10:22.469  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-12-13 04:10:22.471 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-12-13 04:10:22.531 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-12-13 04:10:22.534 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-12-13 04:10:22.535  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-12-13 04:10:22.537  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-12-13 04:10:22.538  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-12-13 04:10:22.539 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-12-13 04:10:22.539 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-12-13 04:10:22.540 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-12-13 04:10:22.631 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-12-13 04:10:22.633 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-13 04:10:22.633 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-13 04:10:22.634 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-13 04:10:22.789  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-12-13 04:10:22.790  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-12-13 04:10:22.790 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-12-13 04:10:22.791 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-13 04:10:22.795  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-12-13 04:10:22.795  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-12-13 04:10:22.796 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-13 04:10:22.796 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-13 04:10:22.796 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-13 04:10:22.830 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-13 04:10:22.831 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-13 04:10:22.831 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-13 04:10:22.835 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-13 04:10:22.835 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-13 04:10:22.836 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-13 04:10:22.838 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-12-13 04:10:22.931 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 476251246085806738391547257855987873016879378633
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Dec 13 02:32:14 UTC 2021
           Final Date: Sat Dec 13 02:32:13 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [93:33:8f:74:29:57:f4:15:38:93:97:47:50:67:1d:b3:8b:0e:cb:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2466a2140543c9abcb3e2f2c06a882767d8d89bd
                       fb4069ae94fc2f65d0eccfd81814ec15483a058d
                       c139cbf0e3dd7a95d0d64e3244ca48ba84a29891
                       9b8b073fa14671c9e9d5070f33357e64590f95fe
                       fad92d915544c8801f17dbd7ecdec1d4ca30319c
                       2321561c9541625b0420ec83a8e071500e65127d
                       72581382ba7af58a8d54b4d493a1a93e18ea0d06
                       0a04cfbdb33c08d7efa168c767c073724a6a3d85
                       29590b302595b0723fac9add96514db4272d96d6
                       d7fabeb9fdab00a03cf707c3cc5ebcac7cd45b72
                       c7cb91d29bfd67373af5de5714a17d25d0f21873
                       51416f8fb38d884a6b5101d8ec72066ff80366a5
                       377a50640e84f15aa1e2a17cd22c64eef2a7dcce
                       ff5e1a7781c042f7fd8a7e48e81c022dec4c8926
                       5602d9cde45915888bf5321835cdbf9edf18e682
                       92a186c1dd572045183cdca769f787c1256635ff
                       97ff6416232e6735b1eb8cffeb1e014df880ea3f
                       563504fcd1f3ad577fff2de35b27a9fc3d1c7c4a
                       4fa50a229568e0060216aa3203717723cff3278b
                       855fcb23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:cb:40:f9:f1:5a:cb:25:ee:09:44:ff:3e:83:3e:35:f2:ef:48:47]
            modulus: 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
    public exponent: 10001

] 
2021-12-13 04:13:16.452  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-12-13 04:13:16.453 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-12-13 04:13:16.454 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-12-13 04:13:16.455 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-12-13 04:13:16.456  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-12-13 04:13:16.456  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-12-13 04:13:16.457  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-12-13 04:13:16.457 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-12-13 04:13:16.458 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-12-13 04:13:16.458 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-12-13 04:13:16.462 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-12-13 04:13:16.463 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-13 04:13:16.463 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-13 04:13:16.464 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-13 04:13:16.630  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-12-13 04:13:16.631  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-12-13 04:13:16.631 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-12-13 04:13:16.631 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-13 04:13:16.634  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-12-13 04:13:16.635  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-12-13 04:13:16.635 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-13 04:13:16.635 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-13 04:13:16.636 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-13 04:13:16.636 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-13 04:13:16.637 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-13 04:13:16.637 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-13 04:13:16.637 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-13 04:13:16.638 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-13 04:13:16.638 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-13 04:13:16.639 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-12-13 04:13:16.643 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 476251246085806738391547257855987873016879378633
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Dec 13 02:32:14 UTC 2021
           Final Date: Sat Dec 13 02:32:13 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [93:33:8f:74:29:57:f4:15:38:93:97:47:50:67:1d:b3:8b:0e:cb:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2466a2140543c9abcb3e2f2c06a882767d8d89bd
                       fb4069ae94fc2f65d0eccfd81814ec15483a058d
                       c139cbf0e3dd7a95d0d64e3244ca48ba84a29891
                       9b8b073fa14671c9e9d5070f33357e64590f95fe
                       fad92d915544c8801f17dbd7ecdec1d4ca30319c
                       2321561c9541625b0420ec83a8e071500e65127d
                       72581382ba7af58a8d54b4d493a1a93e18ea0d06
                       0a04cfbdb33c08d7efa168c767c073724a6a3d85
                       29590b302595b0723fac9add96514db4272d96d6
                       d7fabeb9fdab00a03cf707c3cc5ebcac7cd45b72
                       c7cb91d29bfd67373af5de5714a17d25d0f21873
                       51416f8fb38d884a6b5101d8ec72066ff80366a5
                       377a50640e84f15aa1e2a17cd22c64eef2a7dcce
                       ff5e1a7781c042f7fd8a7e48e81c022dec4c8926
                       5602d9cde45915888bf5321835cdbf9edf18e682
                       92a186c1dd572045183cdca769f787c1256635ff
                       97ff6416232e6735b1eb8cffeb1e014df880ea3f
                       563504fcd1f3ad577fff2de35b27a9fc3d1c7c4a
                       4fa50a229568e0060216aa3203717723cff3278b
                       855fcb23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3d:27:2d:df:c2:11:4c:4e:46:39:2b:34:47:2f:36:f1:b0:89:53:04]
            modulus: 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
    public exponent: 10001

] 
2021-12-13 04:15:46.554  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-12-13 04:15:46.556 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-12-13 04:15:46.558 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-12-13 04:15:46.559 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-12-13 04:15:46.559  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-12-13 04:15:46.560  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-12-13 04:15:46.561  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-12-13 04:15:46.561 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-12-13 04:15:46.562 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-12-13 04:15:46.563 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-12-13 04:15:46.567 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-12-13 04:15:46.568 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-13 04:15:46.569 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-12-13 04:15:46.569 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-13 04:15:46.730  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-12-13 04:15:46.731  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-12-13 04:15:46.732 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-12-13 04:15:46.732 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-12-13 04:15:46.733  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-12-13 04:15:46.734  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-12-13 04:15:46.734 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-13 04:15:46.735 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-13 04:15:46.735 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-13 04:15:46.736 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-13 04:15:46.736 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-13 04:15:46.737 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-13 04:15:46.738 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-12-13 04:15:46.738 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-12-13 04:15:46.738 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-12-13 04:15:46.739 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-12-13 04:15:46.742 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 476251246085806738391547257855987873016879378633
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Dec 13 02:32:14 UTC 2021
           Final Date: Sat Dec 13 02:32:13 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [93:33:8f:74:29:57:f4:15:38:93:97:47:50:67:1d:b3:8b:0e:cb:cc]
            modulus: 841870849e875d218e7454b906a1a3ab9d2709fd9870b955180fc460a695cab3ee31eb2e92d7ead2bf60a062accf1eb174d4fd7fd6e37208f81c56019207753f614cabc4aff639d6d6f04561f888992db3daba8d632c5391fb90f1cc9aa2875110f38c94462c2fff7144d1cad4c22c6d3a7f3745d6777622aa232bf58829343be169bb4b581b29a9807989a5c0368a64a6a64ea8b0abf2d0d4bd0b01c8d6a66fce4483de2cba6a657edf2723bd0366e7c58c5af5e16f69d30ae416975a8698123c431658dd3fa84393bf5db357f4bbb9c167933423f31b3d26dd021aafdd6f5c98174d2c4c0cf5dd25f633d7a68a4f3aa50bed0e92c109d1ef804068e75d42338c2565d5501bdb5cc5c0e452c88942d9b178ae26cccc86fb9da3db724ddac9dbce37f6b4ae40b728ee936996606ab901aac4147aacdb7693a2955e871c9d233f5c6e2c58e59b9d4f429affc37e00b263dc9f3f45460a05e946ee6674a16d045fbd0975591d106c82fee90bb64180d3ce4b9e693e9b8b8370d9646adf3a764827
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2466a2140543c9abcb3e2f2c06a882767d8d89bd
                       fb4069ae94fc2f65d0eccfd81814ec15483a058d
                       c139cbf0e3dd7a95d0d64e3244ca48ba84a29891
                       9b8b073fa14671c9e9d5070f33357e64590f95fe
                       fad92d915544c8801f17dbd7ecdec1d4ca30319c
                       2321561c9541625b0420ec83a8e071500e65127d
                       72581382ba7af58a8d54b4d493a1a93e18ea0d06
                       0a04cfbdb33c08d7efa168c767c073724a6a3d85
                       29590b302595b0723fac9add96514db4272d96d6
                       d7fabeb9fdab00a03cf707c3cc5ebcac7cd45b72
                       c7cb91d29bfd67373af5de5714a17d25d0f21873
                       51416f8fb38d884a6b5101d8ec72066ff80366a5
                       377a50640e84f15aa1e2a17cd22c64eef2a7dcce
                       ff5e1a7781c042f7fd8a7e48e81c022dec4c8926
                       5602d9cde45915888bf5321835cdbf9edf18e682
                       92a186c1dd572045183cdca769f787c1256635ff
                       97ff6416232e6735b1eb8cffeb1e014df880ea3f
                       563504fcd1f3ad577fff2de35b27a9fc3d1c7c4a
                       4fa50a229568e0060216aa3203717723cff3278b
                       855fcb23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:da:f2:d8:37:36:b0:0d:35:bf:25:9a:82:1f:5c:b8:30:89:9c:27]
            modulus: d97b7d6f2223d6b5b2eb1a707bfb5904a38fe94285f2ace1dbc7ae2017d1ad828f7483627f04d3d80432c83b66ec380c96a22987093024de8c0a2c7166c80696f49f6c988e0c312eb6fb7ba0e16305890f3e14132d2548bfb02fe82c357e6efa2f5470cf82dc6dd2e6217ab41fa6fcf76e006f351763656fbcc47eb3f8764d4418a43a0c553584261c65148b53c21eae0934f9d5b831cb2ba0764feaf528b7a499b7fd3809c51a8221aa6e24475bf9879d045c8ea91199b67f00c559f62ab1b28eaf5e96801ad914b44a9970f5fe3e336da838aa6af9ac25898185d5ae906a174cec131b6bc174ffb2e71211f66a88b5c00a579cbd94ee20fd76f1adc0e4cb19
    public exponent: 10001

]