By type
2021-05-12 10:56:06,716 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-12 10:56:07,518 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-12 10:56:08.166 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-05-12 10:56:10.652 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-12 10:56:10.874 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-05-12 10:56:11.042 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-12 10:56:13.085 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 6.838 seconds (JVM running for 8.39) 2021-05-12 10:57:08.664 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-12 10:57:08.673 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-12 10:57:08.713 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-12 10:57:08.720 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-12 10:57:08.733 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-12 10:57:08.737 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-12 10:57:08.742 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-12 10:57:08.743 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 10:57:08.743 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-12 10:57:08.751 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-12 10:57:08.755 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-12 10:57:08.794 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-12 10:57:08.799 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 10:57:08.800 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 10:57:08.817 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-12 10:57:09.343 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-12 10:57:09.347 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-12 10:57:09.348 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-12 10:57:09.356 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-12 10:57:09.358 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1461 2021-05-12 10:57:09.365 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-12 10:57:09.371 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-12 10:57:09.373 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-12 10:57:09.382 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-12 10:57:09.383 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-12 10:57:09.384 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 10:57:09.385 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 10:57:09.386 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 10:57:09.403 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 10:57:09.403 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 10:57:09.404 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 10:57:09.411 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-hv-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0eyesp7k8e5i7qlqv,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-12 10:57:09.439 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 134682889657370833317747051107676340187639917779 IssuerDN: UID=c-0eyesp7k8e5i7qlqv,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 12 10:53:22 UTC 2021 Final Date: Mon May 12 10:53:21 UTC 2031 SubjectDN: UID=c-0eyesp7k8e5i7qlqv,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:03:d2:86:86:14:f8:6d:7d:9f:db:f8:8e:90:a6:30:d0:be:56:ed] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a41039b98830b80ba4871c1ec355f5893020f7b d0e149f0861a933af4db6046192d55517836f2e9 42ac5b5c5145668aebc63af27b9e96950bcd273d 3783d79188c5cf0c876aff52be1bbdc4e6bc0eef e3cdf6db047f2102af56e2ec6b819976bfe9c207 3414293d5f850233543e03ea04e033ddc8f97fa4 6630d6efe5eac3166532bfc89a6259c5e88df4af 5a69d5b580f282af0fc5f349ac13ee067a5a64db 4d7ac5bfa7c593b356fa730717522cfe68be5b73 26943033723aecd513033b5dafca631861f8bd2d 193adbc393b328ab63cc1f49d00e16eef7a0cba4 bdf584bc98b1e667234fc0cc9e7c3d3174a44e0d b7d932f8baf92419944f0f47b5b04b1c7943cef8 e033780acfddf0a5eb07b921928c3ecaaa1a4c71 89a41b8933a86bff3089766559604b557867433d 4154c8e373c097126e50d5abfe8fa50f83b60b93 2134fb34f9e9468521439c4e87a3db710ba2b38e 77462d96bf58dbd81aec01ca97bfadb62adab642 ca5891ece34955bd7e3322576d92a081372ac99d 111478dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6f:b4:c7:af:71:e6:b8:92:d9:69:c5:1a:ee:e8:82:93:ab:e8:c6:37] modulus: cf50fab409b3eb793c252fb65b6b93a9b797b492cd8091e69e7f0beac76eb6cb800557481f51fa0f2bc0139ce68524a621401d0cd4b3b91974789dea03c00643d4518ac19696c5d592e83dd59d759076a6c5e09bea8a4629fe32d3845ba99e37da210e39faba3bfa86264cabb13b5ec3c44a0d5b8e7b0796b516513a58baf28f63199a4aa9f82bfce4c1bf6cdcb90921fdb6889e3bf36a9a3e186c2e93292850485e02edbe7f4757627de26372eaac0802a2ffee862d341b453c8aeaaec7c795ee2b68ed556209d1180df9ceff39d7c87672b1dcc3b77bc6f79a30fa07fade5ac14c20f2be459f161db5c745f1271f9796e64148b9cd7035c9363ff3daa14d57 public exponent: 10001 ] 2021-05-12 10:57:09.549 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-12 10:57:09.551 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-12 10:57:09.553 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-12 10:57:09.555 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-12 10:57:09.555 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-12 10:57:09.557 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-12 10:57:09.557 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-12 10:57:09.558 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-12 10:57:09.559 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-12 10:57:09.581 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-12 10:57:09.582 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 10:57:09.583 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 10:57:09.588 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-12 10:57:09.677 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-12 10:57:09.678 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-12 10:57:09.678 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-12 10:57:09.683 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-12 10:57:09.684 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1461 2021-05-12 10:57:09.685 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-12 10:57:09.690 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-12 10:57:09.690 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-12 10:57:09.691 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-12 10:57:09.692 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-12 10:57:09.693 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 10:57:09.693 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 10:57:09.694 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 10:57:09.695 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 10:57:09.696 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 10:57:09.696 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 10:57:09.698 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0eyesp7k8e5i7qlqv,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-12 10:57:09.704 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 134682889657370833317747051107676340187639917779 IssuerDN: UID=c-0eyesp7k8e5i7qlqv,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 12 10:53:22 UTC 2021 Final Date: Mon May 12 10:53:21 UTC 2031 SubjectDN: UID=c-0eyesp7k8e5i7qlqv,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:03:d2:86:86:14:f8:6d:7d:9f:db:f8:8e:90:a6:30:d0:be:56:ed] modulus: b1098167e7586890963489f9709c706b3986e617c84ca2f129bf8ae5849fc5ed9b200672f6feda59bd1906205da0e32f7c457dc2390ccfa8b634f9a20e8d1e0777c3725283f232a120df78fc1d077c7f65c2ab015698802c5c6d4aa28b3b5a06d0c6e98d16f6aa0d164d92210ec9bba2c3777039044be0198d4f11ccf5b36c8a97b8f9f54c002913b2bf67a2c2c03c2dc2dc3d0f5e01dd344b345f1d76ce723d0ba85243676e3fd82a2e6aa5149095f630483735cce85ad6f6dc8c52344690a9fbdba4c02f4c7c360c46ed72aabdb88c43d619b06e01e4ad48939740c4df5b0c647ed6d7733b44a4659b1ffbe9fa7cc1640dd8e4ff88444da9b10adb3540ca9059543fd8be760a6085c32476d5fa128aa07842e004748dafc9fdad76fcff3123a9b4de27185f766e5837757780c7c89807244610285cfeeff39e03e4420b3b238acf08d2977944fa9f865a45f4c1332dbe0a03460d183f015116a5d29b679312386ca875c11e069295468040dfcb1921e96b280ab744d5d82bbc1ee4b9d6adf3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a41039b98830b80ba4871c1ec355f5893020f7b d0e149f0861a933af4db6046192d55517836f2e9 42ac5b5c5145668aebc63af27b9e96950bcd273d 3783d79188c5cf0c876aff52be1bbdc4e6bc0eef e3cdf6db047f2102af56e2ec6b819976bfe9c207 3414293d5f850233543e03ea04e033ddc8f97fa4 6630d6efe5eac3166532bfc89a6259c5e88df4af 5a69d5b580f282af0fc5f349ac13ee067a5a64db 4d7ac5bfa7c593b356fa730717522cfe68be5b73 26943033723aecd513033b5dafca631861f8bd2d 193adbc393b328ab63cc1f49d00e16eef7a0cba4 bdf584bc98b1e667234fc0cc9e7c3d3174a44e0d b7d932f8baf92419944f0f47b5b04b1c7943cef8 e033780acfddf0a5eb07b921928c3ecaaa1a4c71 89a41b8933a86bff3089766559604b557867433d 4154c8e373c097126e50d5abfe8fa50f83b60b93 2134fb34f9e9468521439c4e87a3db710ba2b38e 77462d96bf58dbd81aec01ca97bfadb62adab642 ca5891ece34955bd7e3322576d92a081372ac99d 111478dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:c2:67:2d:9b:85:d5:48:f4:b6:9c:c3:c7:69:0a:0b:ad:1b:0e:1c] modulus: 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 public exponent: 10001 ] 2021-05-12 10:57:09.800 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-12 10:57:09.801 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-12 10:57:09.803 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-12 10:57:09.804 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-12 10:57:09.805 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-12 10:57:09.806 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-12 10:57:09.807 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-12 10:57:09.807 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-12 10:57:09.808 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-12 10:57:09.817 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-12 10:57:09.817 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 10:57:09.818 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 10:57:09.821 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-12 10:57:09.888 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-12 10:57:09.889 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-12 10:57:09.889 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-12 10:57:09.891 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-12 10:57:09.892 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1461 2021-05-12 10:57:09.892 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-12 10:57:09.894 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-12 10:57:09.894 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-12 10:57:09.894 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-12 10:57:09.895 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-12 10:57:09.895 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 10:57:09.895 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 10:57:09.896 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 10:57:09.896 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 10:57:09.897 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 10:57:09.897 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 10:57:09.898 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0eyesp7k8e5i7qlqv,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-12 10:57:09.901 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 134682889657370833317747051107676340187639917779 IssuerDN: UID=c-0eyesp7k8e5i7qlqv,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 12 10:53:22 UTC 2021 Final Date: Mon May 12 10:53:21 UTC 2031 SubjectDN: UID=c-0eyesp7k8e5i7qlqv,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [19:03:d2:86:86:14:f8:6d:7d:9f:db:f8:8e:90:a6:30:d0:be:56:ed] modulus: b1098167e7586890963489f9709c706b3986e617c84ca2f129bf8ae5849fc5ed9b200672f6feda59bd1906205da0e32f7c457dc2390ccfa8b634f9a20e8d1e0777c3725283f232a120df78fc1d077c7f65c2ab015698802c5c6d4aa28b3b5a06d0c6e98d16f6aa0d164d92210ec9bba2c3777039044be0198d4f11ccf5b36c8a97b8f9f54c002913b2bf67a2c2c03c2dc2dc3d0f5e01dd344b345f1d76ce723d0ba85243676e3fd82a2e6aa5149095f630483735cce85ad6f6dc8c52344690a9fbdba4c02f4c7c360c46ed72aabdb88c43d619b06e01e4ad48939740c4df5b0c647ed6d7733b44a4659b1ffbe9fa7cc1640dd8e4ff88444da9b10adb3540ca9059543fd8be760a6085c32476d5fa128aa07842e004748dafc9fdad76fcff3123a9b4de27185f766e5837757780c7c89807244610285cfeeff39e03e4420b3b238acf08d2977944fa9f865a45f4c1332dbe0a03460d183f015116a5d29b679312386ca875c11e069295468040dfcb1921e96b280ab744d5d82bbc1ee4b9d6adf3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a41039b98830b80ba4871c1ec355f5893020f7b d0e149f0861a933af4db6046192d55517836f2e9 42ac5b5c5145668aebc63af27b9e96950bcd273d 3783d79188c5cf0c876aff52be1bbdc4e6bc0eef e3cdf6db047f2102af56e2ec6b819976bfe9c207 3414293d5f850233543e03ea04e033ddc8f97fa4 6630d6efe5eac3166532bfc89a6259c5e88df4af 5a69d5b580f282af0fc5f349ac13ee067a5a64db 4d7ac5bfa7c593b356fa730717522cfe68be5b73 26943033723aecd513033b5dafca631861f8bd2d 193adbc393b328ab63cc1f49d00e16eef7a0cba4 bdf584bc98b1e667234fc0cc9e7c3d3174a44e0d b7d932f8baf92419944f0f47b5b04b1c7943cef8 e033780acfddf0a5eb07b921928c3ecaaa1a4c71 89a41b8933a86bff3089766559604b557867433d 4154c8e373c097126e50d5abfe8fa50f83b60b93 2134fb34f9e9468521439c4e87a3db710ba2b38e 77462d96bf58dbd81aec01ca97bfadb62adab642 ca5891ece34955bd7e3322576d92a081372ac99d 111478dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:8a:bb:c2:48:8e:6a:61:1d:54:56:a7:90:5e:68:8f:53:d2:98:ca] modulus: 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 public exponent: 10001 ]