Results

By type

          2021-11-16 01:56:08,482 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-16 01:56:12,689 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-16 01:56:15.789  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-16 01:56:29.684 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-16 01:56:31.093  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-16 01:56:31.787  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-16 01:56:43.576  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 37.301 seconds (JVM running for 44.309)
2021-11-16 01:57:20.481  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-16 01:57:20.490 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-16 01:57:20.688 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-16 01:57:20.772 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-16 01:57:20.785  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-16 01:57:20.788  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-16 01:57:20.789  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-16 01:57:20.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-16 01:57:20.872 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-16 01:57:20.878 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-16 01:57:20.888 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-16 01:57:20.891 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-16 01:57:21.083 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-16 01:57:21.088 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-16 01:57:21.089 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-16 01:57:21.093 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-16 01:57:22.588  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-16 01:57:22.591  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-16 01:57:22.592 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-16 01:57:22.674 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-16 01:57:22.686  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-16 01:57:22.687  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-16 01:57:22.688 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-16 01:57:22.688 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-16 01:57:22.689 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-16 01:57:22.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-16 01:57:22.787 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-16 01:57:22.787 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-16 01:57:22.794 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-16 01:57:22.794 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-16 01:57:22.795 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-16 01:57:22.874 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-16 01:57:22.988 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 80540916644657177563684864645957329441738609644
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 16 01:51:02 UTC 2021
           Final Date: Sun Nov 16 01:51:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [50:83:59:3c:bc:62:18:fa:9e:55:6a:6d:da:06:03:39:f8:12:8a:18]
            modulus: ca417cea6db0c5f5d91745026a22211b700a3c05d23d6297812dac9658c91231b06485e47a85f6903ebff9cb37d8164d79d92cdeea62bd009230a277edb9c62f6c0779d7d401855a78ff93399ae1f50bd0702ae5325c2cbe130bb536f8f966a91a70deefc1370de76d60094f2d4c8480d67fb8b8dcc6015903e221fd63865caee80a80c9d0f80bd4367fd85ec5c11dcdc49b6dca314180ca304dab3e3deeb4c7bcf18427ed3aa8a00a33441ad0389b7247b0739fd2e26336a5bdff2f9baf0e10fbd6450502133e0f2abde4bfb340f29ace2d39d04fad3c348adbe2b214889a2a0a5f47f8f90ce94292eabc9f0d8e398dcdeb5e962bb0a6fe73d4c0a7f85d3741531e8f693a04d3f5c2d53833bd5cfa2b73c9c5b2ffe63f359f046e57f4b257bd105d3eb49990f9df6eb840c95f0650a1a646a7b5c497dec150e174c5071cced232ffd340ada71c6feddf35ee79b1c93f53e53fe15853cc04d5cbe26647b5fbb173be7c65dc8bf4acf25d9b5e71a16a44964f468a6de59fd8ef41d1786d0c691b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9312910d4946af352135d68ebbdc54caed16fe5e
                       30715ee04cdf9c85bce45f0a5fb161eac6a446ab
                       e8aaeb8d7733361202ea43eae93c4eebdfa53903
                       7b545df25e1a7a0f6c0b64156f490b8db4766fee
                       a561dcc3c6ac7001277cbe0c6309b3e69fbc5605
                       d718c5903a1e517eb366fed1de5e724ebf974c21
                       8fab2ddd299e78d86c8f9ee4b5aaaa5cf4e8ae64
                       684bb4aee407105c34063aa42693989b542da801
                       2f443670a79eaeee24e007de686fa5955b7036a2
                       b124af9e3b8c17bd18a1645c172e3f4ef6650d24
                       fcf209320005035ac907d1ecfb72061649c0265f
                       693b5d7ca24fd6fe028b3d418120e2e3fdd698f8
                       b9f8a06e14f4beca0763b514acb861513753e200
                       5ff75c8a87fbc4920aaa6b30a6006d39e06a3062
                       8951dc12b159e29d432f94389674636d35116bc9
                       c5ce9d2869e1f4a246a783c5a36a7690648829d0
                       0d9f1c1fe71591caa0015f3de02772e3da7712d8
                       93273fb68bbba6954051b4a2830a542ca024c9ca
                       987c594293353edead97bba4e024caac3eacc651
                       eca28293
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:64:a2:f6:8f:c8:30:7d:c6:60:e8:03:dd:26:a8:21:a0:30:2e:f0]
            modulus: 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
    public exponent: 10001

] 
2021-11-16 03:28:09.378  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-16 03:28:09.380 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-16 03:28:09.382 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-16 03:28:09.383 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-16 03:28:09.384  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-16 03:28:09.385  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-16 03:28:09.385  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-16 03:28:09.385 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-16 03:28:09.386 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-16 03:28:09.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-16 03:28:09.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-16 03:28:09.475 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-16 03:28:09.476 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-16 03:28:09.477 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-16 03:28:09.872  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-16 03:28:09.873  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-16 03:28:09.873 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-16 03:28:09.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-16 03:28:09.877  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-16 03:28:09.877  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-16 03:28:09.878 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-16 03:28:09.878 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-16 03:28:09.879 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-16 03:28:09.880 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-16 03:28:09.881 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-16 03:28:09.881 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-16 03:28:09.882 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-16 03:28:09.883 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-16 03:28:09.883 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-16 03:28:09.884 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-16 03:28:09.971 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 80540916644657177563684864645957329441738609644
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 16 01:51:02 UTC 2021
           Final Date: Sun Nov 16 01:51:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [50:83:59:3c:bc:62:18:fa:9e:55:6a:6d:da:06:03:39:f8:12:8a:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9312910d4946af352135d68ebbdc54caed16fe5e
                       30715ee04cdf9c85bce45f0a5fb161eac6a446ab
                       e8aaeb8d7733361202ea43eae93c4eebdfa53903
                       7b545df25e1a7a0f6c0b64156f490b8db4766fee
                       a561dcc3c6ac7001277cbe0c6309b3e69fbc5605
                       d718c5903a1e517eb366fed1de5e724ebf974c21
                       8fab2ddd299e78d86c8f9ee4b5aaaa5cf4e8ae64
                       684bb4aee407105c34063aa42693989b542da801
                       2f443670a79eaeee24e007de686fa5955b7036a2
                       b124af9e3b8c17bd18a1645c172e3f4ef6650d24
                       fcf209320005035ac907d1ecfb72061649c0265f
                       693b5d7ca24fd6fe028b3d418120e2e3fdd698f8
                       b9f8a06e14f4beca0763b514acb861513753e200
                       5ff75c8a87fbc4920aaa6b30a6006d39e06a3062
                       8951dc12b159e29d432f94389674636d35116bc9
                       c5ce9d2869e1f4a246a783c5a36a7690648829d0
                       0d9f1c1fe71591caa0015f3de02772e3da7712d8
                       93273fb68bbba6954051b4a2830a542ca024c9ca
                       987c594293353edead97bba4e024caac3eacc651
                       eca28293
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:b3:69:5d:27:f9:99:5f:9a:ef:ec:36:99:7a:5e:46:92:90:d6:b4]
            modulus: e154172676d9c541c1dde6225dee32c574bb6a25af65ee7be5f60d9cdfe34f02eac4a7b7cf4b65bfe087f882b17b42e30eabcf576e8a9c26324bb7df7a63e7377692e44bd08e349da521d1f0af1f729abfed1d727914b616b36337702fdd276447d0bcf2b6b08d02189f6d6c12c4f95c49c2c15c00ec98949776a98b4061926f46845b45b3830a2e68b615533f2efc8603f7c6ace16eee0796c3d3da1d73e861a2165d5ec1989b7aebbbd888d4e5c24228befaa0337f7b20e7b04bdf0ae695049ecab049e2b92c5f9f618e32c7fc6251da064db19389da6b8ee45b3338c7a0124749cca983fc9b9b0c220909ad87519d619055107e59379514f26d13c4b0bd63
    public exponent: 10001

] 
2021-11-16 03:30:40.237  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-16 03:30:40.238 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-16 03:30:40.239 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-16 03:30:40.240 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-16 03:30:40.242  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-16 03:30:40.242  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-16 03:30:40.243  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-16 03:30:40.243 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-16 03:30:40.243 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-16 03:30:40.244 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-16 03:30:40.274 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-16 03:30:40.275 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-16 03:30:40.276 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-16 03:30:40.276 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-16 03:30:40.389  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-16 03:30:40.390  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-16 03:30:40.391 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-16 03:30:40.391 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-16 03:30:40.394  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-16 03:30:40.395  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-16 03:30:40.395 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-16 03:30:40.396 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-16 03:30:40.396 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-16 03:30:40.397 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-16 03:30:40.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-16 03:30:40.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-16 03:30:40.472 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-16 03:30:40.472 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-16 03:30:40.473 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-16 03:30:40.473 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-16 03:30:40.476 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 80540916644657177563684864645957329441738609644
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 16 01:51:02 UTC 2021
           Final Date: Sun Nov 16 01:51:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [50:83:59:3c:bc:62:18:fa:9e:55:6a:6d:da:06:03:39:f8:12:8a:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9312910d4946af352135d68ebbdc54caed16fe5e
                       30715ee04cdf9c85bce45f0a5fb161eac6a446ab
                       e8aaeb8d7733361202ea43eae93c4eebdfa53903
                       7b545df25e1a7a0f6c0b64156f490b8db4766fee
                       a561dcc3c6ac7001277cbe0c6309b3e69fbc5605
                       d718c5903a1e517eb366fed1de5e724ebf974c21
                       8fab2ddd299e78d86c8f9ee4b5aaaa5cf4e8ae64
                       684bb4aee407105c34063aa42693989b542da801
                       2f443670a79eaeee24e007de686fa5955b7036a2
                       b124af9e3b8c17bd18a1645c172e3f4ef6650d24
                       fcf209320005035ac907d1ecfb72061649c0265f
                       693b5d7ca24fd6fe028b3d418120e2e3fdd698f8
                       b9f8a06e14f4beca0763b514acb861513753e200
                       5ff75c8a87fbc4920aaa6b30a6006d39e06a3062
                       8951dc12b159e29d432f94389674636d35116bc9
                       c5ce9d2869e1f4a246a783c5a36a7690648829d0
                       0d9f1c1fe71591caa0015f3de02772e3da7712d8
                       93273fb68bbba6954051b4a2830a542ca024c9ca
                       987c594293353edead97bba4e024caac3eacc651
                       eca28293
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b8:bb:11:2f:85:49:54:b7:1c:d3:68:6d:84:26:59:ee:a8:88:20:e7]
            modulus: cc4ea50b605461a5aa4911ff18ed0e9af333dd81df969bf6d6fd142b8c0ec3746d1b6bd6358218e96b1e8548a46280b1db25268c951c0a86c5d4a385a40dd3170e0983dafdbda01a9837f3e27beae4b208b7597c644a79079dd722b1e65d393d353a527f73bd8d32d29ab0f0fd3ce1d86e826a290079a50fd95257e2325ca88fa5d91ccc5fc9539ce013da2322a2a44eeb4e391adc16c827fec4b33cc28a5e2eaa3d989256029aebad5e8b20a7196e57c37cbe4d0921f0ff28032213f0ebef4e6ae85b60b130822ee2cff401e3beb93be4c657514537716908683384e6e2d52ae22be7cebb01b7f579d6f0a7c23d84e5b7538636364ab596bea96a21e876b965
    public exponent: 10001

] 
2021-11-16 03:32:32.062  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-16 03:32:32.064 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-16 03:32:32.065 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-16 03:32:32.066 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-16 03:32:32.067  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-16 03:32:32.067  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-16 03:32:32.067  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-16 03:32:32.068 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-16 03:32:32.068 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-16 03:32:32.068 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-16 03:32:32.072 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-16 03:32:32.073 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-16 03:32:32.073 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-16 03:32:32.073 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-16 03:32:32.191  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-16 03:32:32.192  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-16 03:32:32.193 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-16 03:32:32.193 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-16 03:32:32.196  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-16 03:32:32.196  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-16 03:32:32.197 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-16 03:32:32.202 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-16 03:32:32.202 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-16 03:32:32.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-16 03:32:32.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-16 03:32:32.204 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-16 03:32:32.205 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-16 03:32:32.205 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-16 03:32:32.206 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-16 03:32:32.207 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-16 03:32:32.213 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 80540916644657177563684864645957329441738609644
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 16 01:51:02 UTC 2021
           Final Date: Sun Nov 16 01:51:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [50:83:59:3c:bc:62:18:fa:9e:55:6a:6d:da:06:03:39:f8:12:8a:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9312910d4946af352135d68ebbdc54caed16fe5e
                       30715ee04cdf9c85bce45f0a5fb161eac6a446ab
                       e8aaeb8d7733361202ea43eae93c4eebdfa53903
                       7b545df25e1a7a0f6c0b64156f490b8db4766fee
                       a561dcc3c6ac7001277cbe0c6309b3e69fbc5605
                       d718c5903a1e517eb366fed1de5e724ebf974c21
                       8fab2ddd299e78d86c8f9ee4b5aaaa5cf4e8ae64
                       684bb4aee407105c34063aa42693989b542da801
                       2f443670a79eaeee24e007de686fa5955b7036a2
                       b124af9e3b8c17bd18a1645c172e3f4ef6650d24
                       fcf209320005035ac907d1ecfb72061649c0265f
                       693b5d7ca24fd6fe028b3d418120e2e3fdd698f8
                       b9f8a06e14f4beca0763b514acb861513753e200
                       5ff75c8a87fbc4920aaa6b30a6006d39e06a3062
                       8951dc12b159e29d432f94389674636d35116bc9
                       c5ce9d2869e1f4a246a783c5a36a7690648829d0
                       0d9f1c1fe71591caa0015f3de02772e3da7712d8
                       93273fb68bbba6954051b4a2830a542ca024c9ca
                       987c594293353edead97bba4e024caac3eacc651
                       eca28293
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [29:33:0d:6a:cb:72:5b:8f:1a:d7:9e:bf:32:bb:c1:d4:e3:cf:6d:b7]
            modulus: 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
    public exponent: 10001

]