By type
2021-05-11 10:54:33,456 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-11 10:54:34,292 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-11 10:54:34.968 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-05-11 10:54:37.675 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-11 10:54:37.959 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-05-11 10:54:38.129 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-11 10:54:40.226 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.423 seconds (JVM running for 9.022) 2021-05-11 10:55:58.629 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-11 10:55:58.641 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-11 10:55:58.686 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-11 10:55:58.690 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-11 10:55:58.706 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-11 10:55:58.711 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-11 10:55:58.716 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-11 10:55:58.717 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-11 10:55:58.717 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-11 10:55:58.725 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-11 10:55:58.729 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-11 10:55:58.768 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-11 10:55:58.775 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-11 10:55:58.775 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-11 10:55:58.792 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-11 10:55:59.535 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-11 10:55:59.540 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-11 10:55:59.541 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-11 10:55:59.549 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-11 10:55:59.551 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1537 2021-05-11 10:55:59.551 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-11 10:55:59.556 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-11 10:55:59.558 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-11 10:55:59.568 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-11 10:55:59.569 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-11 10:55:59.570 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-11 10:55:59.571 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-11 10:55:59.571 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-11 10:55:59.588 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-11 10:55:59.589 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-11 10:55:59.591 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-11 10:55:59.600 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-hv-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-01675b60db7ebc0a2,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-11 10:55:59.633 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 623078698532568403144722558161331528628311359657 IssuerDN: UID=c-01675b60db7ebc0a2,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 11 10:52:03 UTC 2021 Final Date: Sun May 11 10:52:03 UTC 2031 SubjectDN: UID=c-01675b60db7ebc0a2,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:a2:dd:1c:60:0d:67:fc:9c:14:8a:20:1f:df:9e:51:f8:a4:65:f7] modulus: b742cefc0ceeeadba528597e9335212ebc6c9d3b66e142fac4a9c95bb85bb735de5aeb2874d20f5cfe68910c1dd241a3bcc89f15ef4b80d416c8f6c28abf4c7aced5c4c8539d946b422bfeadad0c72e7e0b146c22c18f2ebd3b000b7fd43fe42ffbe8e7b64493ed1ae4369d1247d82ec13edeef44672ad6d9361aaf1cb29ac1e3ceaa2f7e3227205259315ea46e750407f91373a36ad03631e5b340ef3586626c08d332177da3cf83452cbaf47dd6bb51b9fd492d7c1c708d14932e884343012a5b485bf14887a75b9cedf123a0c5a0a52d4addb3eb2ee8384511994de4653ed6d639278a9c1674f848f86bb4d8b7da36a467da4e31a6630383f41a1d5beb9b1b97f9907bce2c420d272e651d31d1f8380816a2442992183fbf9c597b41a788e27cccb7160282d7ad7d7a23c8f811edda43fe909292a079d77ddd005cf11ff4fe796ef0610738f4d82635a48fd0951c652eb4a909bb72f304eafbe0503086e60860d8ba546873ff5175d9de2155e290404b9856fcd103a57cd1c4f42b10be01b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3c3fba6046ccb332b4ab5cc8a5d0dca4ba66519e d008a9b6c26dd0e0946a1218779fa15e679b37a7 1d1cfa65195ecf3fbdb9b53ac2821796f79912fd 0688810d317811d2f7bda0880b3e99def937081b 9443b7b3440e8eb790e7724f6c3c41caba8cee9b fbee9b3d50d8af7b1ff7274d5350dec62fe6600e 1b66af226d39fd6d5b4ce03b2d302a3ab4c3f796 07ae44135a8dcdbd2789ee53279a4d3c41b7ba43 1fea44c857706ad352065fa6cf23140364c85cc6 672b426cb0593eb71a4a76684c0a518cb82a41e0 0ef8f1e1f3d62baa34447eee5894fc9bec68330f f4fd762334bbba10c6223b94cb73ffa0fd74dfa7 fec4fd6ae207dfa0ac994394fb8e1b521a43aad1 934b3bd3e656024822486b1f5bd9bd2007101536 fe930ac3aa34cbf7a221e501ba6f8680452fe160 6aa8291d92a18558d6e00f162a73339860175b6a 21948028485fc200cfc756ac3013a2ab4488a4d6 553f0bbbf4e9e0f987446e62a532e0a3f54ec6aa 7537d35ebd85da60acd10163bee5e659a8b516ca 53719321 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:f6:6c:91:43:f6:e3:06:b4:82:b1:65:c6:4a:f8:d5:57:9f:13:6d] modulus: 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 public exponent: 10001 ] 2021-05-11 10:55:59.784 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-11 10:55:59.785 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-11 10:55:59.787 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-11 10:55:59.793 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-11 10:55:59.794 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-11 10:55:59.796 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-11 10:55:59.797 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-11 10:55:59.797 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-11 10:55:59.798 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-11 10:55:59.807 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-11 10:55:59.811 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-11 10:55:59.812 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-11 10:55:59.817 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-11 10:56:00.213 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-11 10:56:00.214 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-11 10:56:00.215 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-11 10:56:00.228 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-11 10:56:00.236 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1537 2021-05-11 10:56:00.237 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-11 10:56:00.240 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-11 10:56:00.241 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-11 10:56:00.241 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-11 10:56:00.242 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-11 10:56:00.242 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-11 10:56:00.243 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-11 10:56:00.243 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-11 10:56:00.245 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-11 10:56:00.245 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-11 10:56:00.246 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-11 10:56:00.247 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-01675b60db7ebc0a2,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-11 10:56:00.254 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 623078698532568403144722558161331528628311359657 IssuerDN: UID=c-01675b60db7ebc0a2,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 11 10:52:03 UTC 2021 Final Date: Sun May 11 10:52:03 UTC 2031 SubjectDN: UID=c-01675b60db7ebc0a2,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:a2:dd:1c:60:0d:67:fc:9c:14:8a:20:1f:df:9e:51:f8:a4:65:f7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3c3fba6046ccb332b4ab5cc8a5d0dca4ba66519e d008a9b6c26dd0e0946a1218779fa15e679b37a7 1d1cfa65195ecf3fbdb9b53ac2821796f79912fd 0688810d317811d2f7bda0880b3e99def937081b 9443b7b3440e8eb790e7724f6c3c41caba8cee9b fbee9b3d50d8af7b1ff7274d5350dec62fe6600e 1b66af226d39fd6d5b4ce03b2d302a3ab4c3f796 07ae44135a8dcdbd2789ee53279a4d3c41b7ba43 1fea44c857706ad352065fa6cf23140364c85cc6 672b426cb0593eb71a4a76684c0a518cb82a41e0 0ef8f1e1f3d62baa34447eee5894fc9bec68330f f4fd762334bbba10c6223b94cb73ffa0fd74dfa7 fec4fd6ae207dfa0ac994394fb8e1b521a43aad1 934b3bd3e656024822486b1f5bd9bd2007101536 fe930ac3aa34cbf7a221e501ba6f8680452fe160 6aa8291d92a18558d6e00f162a73339860175b6a 21948028485fc200cfc756ac3013a2ab4488a4d6 553f0bbbf4e9e0f987446e62a532e0a3f54ec6aa 7537d35ebd85da60acd10163bee5e659a8b516ca 53719321 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1f:2d:c9:f9:d3:b2:96:1e:20:79:90:cc:86:c3:eb:be:2c:24:e4:fa] modulus: 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 public exponent: 10001 ] 2021-05-11 10:56:00.394 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-11 10:56:00.395 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-11 10:56:00.396 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-11 10:56:00.397 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-11 10:56:00.397 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-11 10:56:00.398 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-11 10:56:00.399 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-11 10:56:00.399 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-11 10:56:00.400 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-11 10:56:00.411 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-11 10:56:00.412 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-11 10:56:00.413 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-11 10:56:00.417 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-11 10:56:00.567 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-11 10:56:00.568 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-11 10:56:00.569 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-11 10:56:00.570 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-11 10:56:00.571 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1537 2021-05-11 10:56:00.572 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-11 10:56:00.574 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-11 10:56:00.575 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-11 10:56:00.575 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-11 10:56:00.576 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-11 10:56:00.577 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-11 10:56:00.577 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-11 10:56:00.578 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-11 10:56:00.579 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-11 10:56:00.579 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-11 10:56:00.580 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-11 10:56:00.581 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-01675b60db7ebc0a2,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-11 10:56:00.586 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 623078698532568403144722558161331528628311359657 IssuerDN: UID=c-01675b60db7ebc0a2,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 11 10:52:03 UTC 2021 Final Date: Sun May 11 10:52:03 UTC 2031 SubjectDN: UID=c-01675b60db7ebc0a2,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [68:a2:dd:1c:60:0d:67:fc:9c:14:8a:20:1f:df:9e:51:f8:a4:65:f7] modulus: b742cefc0ceeeadba528597e9335212ebc6c9d3b66e142fac4a9c95bb85bb735de5aeb2874d20f5cfe68910c1dd241a3bcc89f15ef4b80d416c8f6c28abf4c7aced5c4c8539d946b422bfeadad0c72e7e0b146c22c18f2ebd3b000b7fd43fe42ffbe8e7b64493ed1ae4369d1247d82ec13edeef44672ad6d9361aaf1cb29ac1e3ceaa2f7e3227205259315ea46e750407f91373a36ad03631e5b340ef3586626c08d332177da3cf83452cbaf47dd6bb51b9fd492d7c1c708d14932e884343012a5b485bf14887a75b9cedf123a0c5a0a52d4addb3eb2ee8384511994de4653ed6d639278a9c1674f848f86bb4d8b7da36a467da4e31a6630383f41a1d5beb9b1b97f9907bce2c420d272e651d31d1f8380816a2442992183fbf9c597b41a788e27cccb7160282d7ad7d7a23c8f811edda43fe909292a079d77ddd005cf11ff4fe796ef0610738f4d82635a48fd0951c652eb4a909bb72f304eafbe0503086e60860d8ba546873ff5175d9de2155e290404b9856fcd103a57cd1c4f42b10be01b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3c3fba6046ccb332b4ab5cc8a5d0dca4ba66519e d008a9b6c26dd0e0946a1218779fa15e679b37a7 1d1cfa65195ecf3fbdb9b53ac2821796f79912fd 0688810d317811d2f7bda0880b3e99def937081b 9443b7b3440e8eb790e7724f6c3c41caba8cee9b fbee9b3d50d8af7b1ff7274d5350dec62fe6600e 1b66af226d39fd6d5b4ce03b2d302a3ab4c3f796 07ae44135a8dcdbd2789ee53279a4d3c41b7ba43 1fea44c857706ad352065fa6cf23140364c85cc6 672b426cb0593eb71a4a76684c0a518cb82a41e0 0ef8f1e1f3d62baa34447eee5894fc9bec68330f f4fd762334bbba10c6223b94cb73ffa0fd74dfa7 fec4fd6ae207dfa0ac994394fb8e1b521a43aad1 934b3bd3e656024822486b1f5bd9bd2007101536 fe930ac3aa34cbf7a221e501ba6f8680452fe160 6aa8291d92a18558d6e00f162a73339860175b6a 21948028485fc200cfc756ac3013a2ab4488a4d6 553f0bbbf4e9e0f987446e62a532e0a3f54ec6aa 7537d35ebd85da60acd10163bee5e659a8b516ca 53719321 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [86:01:06:cd:1c:99:b7:ad:9c:4a:01:bd:dc:0c:1d:69:74:38:c9:8e] modulus: 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 public exponent: 10001 ]