By type
2021-05-13 10:50:32,285 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-13 10:50:32,947 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-13 10:50:33.475 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-05-13 10:50:35.671 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-13 10:50:35.872 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-05-13 10:50:35.993 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-13 10:50:37.939 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 6.133 seconds (JVM running for 7.476) 2021-05-13 10:51:33.481 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-13 10:51:33.489 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-13 10:51:33.526 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-13 10:51:33.529 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 10:51:33.542 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-13 10:51:33.545 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 10:51:33.548 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-13 10:51:33.549 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-13 10:51:33.549 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-13 10:51:33.555 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-13 10:51:33.558 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-13 10:51:33.590 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-13 10:51:33.594 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-13 10:51:33.594 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-13 10:51:33.609 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 10:51:34.191 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-13 10:51:34.193 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-13 10:51:34.194 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-13 10:51:34.198 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-13 10:51:34.200 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1914 2021-05-13 10:51:34.200 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-13 10:51:34.205 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 10:51:34.205 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-13 10:51:34.211 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-13 10:51:34.212 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-13 10:51:34.212 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 10:51:34.213 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-13 10:51:34.213 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-13 10:51:34.223 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 10:51:34.224 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-13 10:51:34.224 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-13 10:51:34.230 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-hv-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pqhsxt3vkao2yl9y,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 10:51:34.254 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 516958840944856218413703974867741505782128168599 IssuerDN: UID=c-0pqhsxt3vkao2yl9y,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 10:46:51 UTC 2021 Final Date: Tue May 13 10:46:50 UTC 2031 SubjectDN: UID=c-0pqhsxt3vkao2yl9y,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:9c:e5:97:59:20:97:16:29:b5:06:6a:85:18:7f:d8:ff:e0:ba:60] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6614d1e92ae2150cb3006de763bde5826e40e403 0405b99471e411826ee1cf650f67447c2c7a6510 93fc68f91c308ccc5a13ae933708f60804c8cea4 bb79286966a6d482e2ce35492205b5a7d7ed98de efa914f987b5b69f31a12172344efa029230cf4b 5c11a1a29ddceeb96893799b5722b8dd34c5dd1d 469691d6b67ea1b0f8a7e9c01f543bf72f4204e3 9431b98dc034d636819f5055daba49cc770c715f dded4750a46eda19bfdb9482c06718b754fd237a 50ff1af65000171a25f1d23da4d6dc8a50ea75aa 4d9a8a3a09ee62eadcb6406ad0c04141a2ab34f9 9691b0c6f0b2b8625828ae4972b26808db1f9882 835fd09899807c730713558cbe40f4b3092909a0 220fb14961b4f040cdd5549341784bdb81a3bb98 d6223edcf13289b7f70e3c5ee71c0be8854f0186 6772813408a23b83626f072ed978928b48e1b267 3ab51d68b7929dfbea3a3fe8da96c770804f061c 0242e756e81313b5f95d85fa0df06230a77f22ae 4bfe28d81655ff0be9263bef9be716c0d403167e 6eda8057 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d3:f4:14:91:99:c0:97:62:d9:be:a0:ef:2b:fd:08:3b:7a:53:6b:04] modulus: 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 public exponent: 10001 ] 2021-05-13 10:51:34.335 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-13 10:51:34.338 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-13 10:51:34.341 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-13 10:51:34.342 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 10:51:34.344 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-13 10:51:34.345 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 10:51:34.346 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-13 10:51:34.347 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-13 10:51:34.348 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-13 10:51:34.360 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-13 10:51:34.361 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-13 10:51:34.362 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-13 10:51:34.367 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 10:51:34.443 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-13 10:51:34.443 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-13 10:51:34.444 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-13 10:51:34.447 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-13 10:51:34.448 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1914 2021-05-13 10:51:34.449 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-13 10:51:34.452 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 10:51:34.452 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-13 10:51:34.453 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-13 10:51:34.453 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-13 10:51:34.454 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 10:51:34.454 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-13 10:51:34.455 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-13 10:51:34.456 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 10:51:34.456 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-13 10:51:34.457 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-13 10:51:34.458 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pqhsxt3vkao2yl9y,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 10:51:34.462 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 516958840944856218413703974867741505782128168599 IssuerDN: UID=c-0pqhsxt3vkao2yl9y,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 10:46:51 UTC 2021 Final Date: Tue May 13 10:46:50 UTC 2031 SubjectDN: UID=c-0pqhsxt3vkao2yl9y,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:9c:e5:97:59:20:97:16:29:b5:06:6a:85:18:7f:d8:ff:e0:ba:60] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6614d1e92ae2150cb3006de763bde5826e40e403 0405b99471e411826ee1cf650f67447c2c7a6510 93fc68f91c308ccc5a13ae933708f60804c8cea4 bb79286966a6d482e2ce35492205b5a7d7ed98de efa914f987b5b69f31a12172344efa029230cf4b 5c11a1a29ddceeb96893799b5722b8dd34c5dd1d 469691d6b67ea1b0f8a7e9c01f543bf72f4204e3 9431b98dc034d636819f5055daba49cc770c715f dded4750a46eda19bfdb9482c06718b754fd237a 50ff1af65000171a25f1d23da4d6dc8a50ea75aa 4d9a8a3a09ee62eadcb6406ad0c04141a2ab34f9 9691b0c6f0b2b8625828ae4972b26808db1f9882 835fd09899807c730713558cbe40f4b3092909a0 220fb14961b4f040cdd5549341784bdb81a3bb98 d6223edcf13289b7f70e3c5ee71c0be8854f0186 6772813408a23b83626f072ed978928b48e1b267 3ab51d68b7929dfbea3a3fe8da96c770804f061c 0242e756e81313b5f95d85fa0df06230a77f22ae 4bfe28d81655ff0be9263bef9be716c0d403167e 6eda8057 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [10:1d:ea:0d:8c:43:9a:b4:9b:19:1c:6f:f1:7b:9b:e1:b8:a2:e5:27] modulus: 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 public exponent: 10001 ] 2021-05-13 10:51:34.553 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-13 10:51:34.554 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-13 10:51:34.556 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-13 10:51:34.557 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 10:51:34.557 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-13 10:51:34.558 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 10:51:34.559 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-13 10:51:34.559 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-13 10:51:34.560 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-13 10:51:34.570 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-13 10:51:34.571 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-13 10:51:34.572 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-13 10:51:34.577 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 10:51:34.681 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-13 10:51:34.682 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-13 10:51:34.683 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-13 10:51:34.686 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-13 10:51:34.687 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1914 2021-05-13 10:51:34.688 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-13 10:51:34.694 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 10:51:34.695 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-13 10:51:34.696 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-13 10:51:34.696 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-13 10:51:34.697 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 10:51:34.697 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-13 10:51:34.698 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-13 10:51:34.699 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 10:51:34.699 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-13 10:51:34.700 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-13 10:51:34.701 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pqhsxt3vkao2yl9y,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 10:51:34.706 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 516958840944856218413703974867741505782128168599 IssuerDN: UID=c-0pqhsxt3vkao2yl9y,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 10:46:51 UTC 2021 Final Date: Tue May 13 10:46:50 UTC 2031 SubjectDN: UID=c-0pqhsxt3vkao2yl9y,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:9c:e5:97:59:20:97:16:29:b5:06:6a:85:18:7f:d8:ff:e0:ba:60] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6614d1e92ae2150cb3006de763bde5826e40e403 0405b99471e411826ee1cf650f67447c2c7a6510 93fc68f91c308ccc5a13ae933708f60804c8cea4 bb79286966a6d482e2ce35492205b5a7d7ed98de efa914f987b5b69f31a12172344efa029230cf4b 5c11a1a29ddceeb96893799b5722b8dd34c5dd1d 469691d6b67ea1b0f8a7e9c01f543bf72f4204e3 9431b98dc034d636819f5055daba49cc770c715f dded4750a46eda19bfdb9482c06718b754fd237a 50ff1af65000171a25f1d23da4d6dc8a50ea75aa 4d9a8a3a09ee62eadcb6406ad0c04141a2ab34f9 9691b0c6f0b2b8625828ae4972b26808db1f9882 835fd09899807c730713558cbe40f4b3092909a0 220fb14961b4f040cdd5549341784bdb81a3bb98 d6223edcf13289b7f70e3c5ee71c0be8854f0186 6772813408a23b83626f072ed978928b48e1b267 3ab51d68b7929dfbea3a3fe8da96c770804f061c 0242e756e81313b5f95d85fa0df06230a77f22ae 4bfe28d81655ff0be9263bef9be716c0d403167e 6eda8057 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [04:13:a7:68:75:67:68:98:22:61:dd:0c:3a:20:a8:ef:3a:94:cf:d5] modulus: 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 public exponent: 10001 ]