By type
2021-05-12 22:47:51,967 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-12 22:47:52,942 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-12 22:47:53.709 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-05-12 22:47:56.749 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-12 22:47:57.063 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-05-12 22:47:57.240 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-12 22:47:59.948 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.438 seconds (JVM running for 10.056) 2021-05-12 22:49:10.241 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-12 22:49:10.251 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-12 22:49:10.287 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-12 22:49:10.292 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-12 22:49:10.305 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-12 22:49:10.308 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-12 22:49:10.313 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-12 22:49:10.313 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 22:49:10.314 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-12 22:49:10.326 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-12 22:49:10.330 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-12 22:49:10.374 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-12 22:49:10.381 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 22:49:10.382 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 22:49:10.400 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-12 22:49:10.958 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-12 22:49:10.962 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-12 22:49:10.962 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-12 22:49:10.967 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-12 22:49:10.969 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1995 2021-05-12 22:49:10.969 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-12 22:49:10.974 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-12 22:49:10.975 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-12 22:49:10.982 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-12 22:49:10.983 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-12 22:49:10.984 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 22:49:10.984 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 22:49:10.985 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 22:49:10.997 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 22:49:10.998 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 22:49:10.999 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 22:49:11.008 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02nu0u0qipft9z40j,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-12 22:49:11.054 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 658272680442289453479282869766171554388994142101 IssuerDN: UID=c-02nu0u0qipft9z40j,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 12 22:45:16 UTC 2021 Final Date: Mon May 12 22:45:15 UTC 2031 SubjectDN: UID=c-02nu0u0qipft9z40j,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [85:97:9a:ad:92:39:5c:43:b7:bc:b7:dd:12:80:d9:b1:21:ca:03:38] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e0bdbd51c6b52c7182ae5a65f74d8f772d2e16ec e9f87bd834ba2178a358eb1e692040c70ac1204c 4ff60261f311a14671b460fe10fcf795dc843103 802b449644cc3c3b4046b0657b04edb50ce90f74 5fe1e6679915197039260db752846cb738c657bb 4fab8002d52af97eb0f5854a6737be4ec630f583 bcd8c14a1a4cb89432217c065889ff94da96c512 534c2224dd77e144fb1b10856bfeac3ff83cf3c1 fc42690402ace73833661c9cf53c66190be3d7d5 2b8300b69bf8218c3b1b8ed838b0da5ec3dad88e 98f2ef96bd02d6ef35b93462a5eb5d2dc7577f3a ab7b435920ca080bb1ddfee4b5295390d412663a b0d57f1d9bca055a42bc8d4efb0f1219742835b3 a3863e8953e8e8e80da54fef504e8d7d2892445e 4001c18b8fe5752bf51e7369b01dcbcd840e2e80 91d2175f13dbd1d88b08a5d71bfd9b840430c99f b3317504fb16044509205f169a93d1ec0f93e826 40864c9d7648e63ac7c05edc7290704120aba8f2 4e7a87f116e032c711b6e2afe6bfd5a3ea0c1dfb 6cb27669 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4a:5f:4a:b7:9a:0d:99:cb:92:71:a7:16:f1:0e:1d:24:60:b6:3f:e3] modulus: db2b8fb134d61fe66431000669ccda1dcb2d5c218b04f50d258db1da4de613ae0ebd7f0f5f017392f022a4f7f171e9dc6cf8863f11f9a0d6fa16bbdcde4a0c7320644dfe43d11715a42da75abcc012c599d49fbcd81b6150946720fb3ea18ca2c7a6a8e89ab197cb0fcde37c71c3941e14c41bbb3192e12a8d12fa1dd13d709f8d86c6254c63257d9bd7053d0a554debf60b14901bd6c5b4db4acaae34c7ba188cb706db4b80f26315c3019fed0be7f83a08b106ff794f17b6f38de55f1741593fb73c80abc2306441a967b3d6fc54a1f5c48397c6fc847a3c490f76d101f29c43eef006597c398e5925bf476edc9dfd4a592f71e78e59c297ffffd130f149a5 public exponent: 10001 ] 2021-05-12 22:49:11.176 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-12 22:49:11.180 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-12 22:49:11.181 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-12 22:49:11.185 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-12 22:49:11.190 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-12 22:49:11.192 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-12 22:49:11.193 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-12 22:49:11.194 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-12 22:49:11.195 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-12 22:49:11.208 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-12 22:49:11.209 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 22:49:11.210 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 22:49:11.224 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-12 22:49:11.292 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-12 22:49:11.293 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-12 22:49:11.293 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-12 22:49:11.311 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-12 22:49:11.317 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1995 2021-05-12 22:49:11.318 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-12 22:49:11.322 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-12 22:49:11.323 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-12 22:49:11.324 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-12 22:49:11.324 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-12 22:49:11.325 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 22:49:11.326 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 22:49:11.326 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 22:49:11.332 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 22:49:11.333 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 22:49:11.333 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 22:49:11.336 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-hv-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02nu0u0qipft9z40j,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-12 22:49:11.346 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 658272680442289453479282869766171554388994142101 IssuerDN: UID=c-02nu0u0qipft9z40j,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 12 22:45:16 UTC 2021 Final Date: Mon May 12 22:45:15 UTC 2031 SubjectDN: UID=c-02nu0u0qipft9z40j,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [85:97:9a:ad:92:39:5c:43:b7:bc:b7:dd:12:80:d9:b1:21:ca:03:38] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e0bdbd51c6b52c7182ae5a65f74d8f772d2e16ec e9f87bd834ba2178a358eb1e692040c70ac1204c 4ff60261f311a14671b460fe10fcf795dc843103 802b449644cc3c3b4046b0657b04edb50ce90f74 5fe1e6679915197039260db752846cb738c657bb 4fab8002d52af97eb0f5854a6737be4ec630f583 bcd8c14a1a4cb89432217c065889ff94da96c512 534c2224dd77e144fb1b10856bfeac3ff83cf3c1 fc42690402ace73833661c9cf53c66190be3d7d5 2b8300b69bf8218c3b1b8ed838b0da5ec3dad88e 98f2ef96bd02d6ef35b93462a5eb5d2dc7577f3a ab7b435920ca080bb1ddfee4b5295390d412663a b0d57f1d9bca055a42bc8d4efb0f1219742835b3 a3863e8953e8e8e80da54fef504e8d7d2892445e 4001c18b8fe5752bf51e7369b01dcbcd840e2e80 91d2175f13dbd1d88b08a5d71bfd9b840430c99f b3317504fb16044509205f169a93d1ec0f93e826 40864c9d7648e63ac7c05edc7290704120aba8f2 4e7a87f116e032c711b6e2afe6bfd5a3ea0c1dfb 6cb27669 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5f:b1:ea:ff:74:d8:30:3d:6c:dd:6d:8a:94:74:be:96:52:75:ee:8b] modulus: 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 public exponent: 10001 ] 2021-05-12 22:49:11.452 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-12 22:49:11.454 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-12 22:49:11.455 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-12 22:49:11.456 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-12 22:49:11.458 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-12 22:49:11.459 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-12 22:49:11.459 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-12 22:49:11.460 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-12 22:49:11.460 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-12 22:49:11.480 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-12 22:49:11.481 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 22:49:11.482 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 22:49:11.485 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-12 22:49:11.561 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-12 22:49:11.562 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-12 22:49:11.563 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-12 22:49:11.564 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-12 22:49:11.565 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1995 2021-05-12 22:49:11.565 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-12 22:49:11.567 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-12 22:49:11.568 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-12 22:49:11.568 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-12 22:49:11.569 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-12 22:49:11.569 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 22:49:11.569 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 22:49:11.570 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 22:49:11.571 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 22:49:11.571 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 22:49:11.571 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 22:49:11.572 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02nu0u0qipft9z40j,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-12 22:49:11.575 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 658272680442289453479282869766171554388994142101 IssuerDN: UID=c-02nu0u0qipft9z40j,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 12 22:45:16 UTC 2021 Final Date: Mon May 12 22:45:15 UTC 2031 SubjectDN: UID=c-02nu0u0qipft9z40j,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [85:97:9a:ad:92:39:5c:43:b7:bc:b7:dd:12:80:d9:b1:21:ca:03:38] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e0bdbd51c6b52c7182ae5a65f74d8f772d2e16ec e9f87bd834ba2178a358eb1e692040c70ac1204c 4ff60261f311a14671b460fe10fcf795dc843103 802b449644cc3c3b4046b0657b04edb50ce90f74 5fe1e6679915197039260db752846cb738c657bb 4fab8002d52af97eb0f5854a6737be4ec630f583 bcd8c14a1a4cb89432217c065889ff94da96c512 534c2224dd77e144fb1b10856bfeac3ff83cf3c1 fc42690402ace73833661c9cf53c66190be3d7d5 2b8300b69bf8218c3b1b8ed838b0da5ec3dad88e 98f2ef96bd02d6ef35b93462a5eb5d2dc7577f3a ab7b435920ca080bb1ddfee4b5295390d412663a b0d57f1d9bca055a42bc8d4efb0f1219742835b3 a3863e8953e8e8e80da54fef504e8d7d2892445e 4001c18b8fe5752bf51e7369b01dcbcd840e2e80 91d2175f13dbd1d88b08a5d71bfd9b840430c99f b3317504fb16044509205f169a93d1ec0f93e826 40864c9d7648e63ac7c05edc7290704120aba8f2 4e7a87f116e032c711b6e2afe6bfd5a3ea0c1dfb 6cb27669 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [09:db:1d:49:2a:0e:59:64:7d:1a:ea:d2:3e:a0:cd:39:99:73:b4:b5] modulus: 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 public exponent: 10001 ]