By type
2021-05-13 22:47:57,464 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-13 22:47:58,453 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-13 22:47:59.079 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-05-13 22:48:02.114 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-13 22:48:02.483 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-05-13 22:48:02.644 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-13 22:48:05.334 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.684 seconds (JVM running for 11.072) 2021-05-13 22:49:27.655 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-13 22:49:27.665 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-13 22:49:27.706 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-13 22:49:27.711 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 22:49:27.724 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-13 22:49:27.728 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 22:49:27.732 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-13 22:49:27.733 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-13 22:49:27.733 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-13 22:49:27.740 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-13 22:49:27.744 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-13 22:49:27.778 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-13 22:49:27.784 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-13 22:49:27.785 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-13 22:49:27.802 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 22:49:28.322 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-13 22:49:28.327 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-13 22:49:28.327 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-13 22:49:28.335 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-13 22:49:28.336 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1168 2021-05-13 22:49:28.337 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-13 22:49:28.341 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 22:49:28.342 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-13 22:49:28.348 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-13 22:49:28.349 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-13 22:49:28.350 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 22:49:28.350 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-13 22:49:28.350 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-13 22:49:28.362 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 22:49:28.363 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-13 22:49:28.363 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-13 22:49:28.369 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0euadq3an19yhas18,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 22:49:28.397 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 647147866364618396951211346626422304448755818037 IssuerDN: UID=c-0euadq3an19yhas18,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 22:45:05 UTC 2021 Final Date: Tue May 13 22:45:04 UTC 2031 SubjectDN: UID=c-0euadq3an19yhas18,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:5a:f9:58:fd:d2:c5:d0:00:49:30:b8:33:8b:74:7b:80:54:09:e5] modulus: dd2930bb75503a701d81d200d8e7bb1a800c4b13496061af710170221c7bf75e84fd41372cf708dcafc91bf5ee20498026dad5c25a16a15bcbd4c2d7628360c175383e2e6a3e5fa8084bb65f023c8493fa0842f8f874b00c9a88e6db12605d5712ffef73407204fa4a483f3dd64e66e4ba10cdb4a32dc6fd39e8530acb4d951d77abe1e7b34de1e9f3d3c531a3fb317278925f671398bb28b74cffc4fdbd8489662a65519c01b1e8db796377dcfa44a359e413d3456f7a041d2b1a709525a183b0a4d332774abf7d2b98eb35353448139b428a1c43cb3ecc48a755b9edec7ef81815f29d16477f6fa79061b83991c9f7c38ac0726599667e27027103915c8fa95d8bb9e637ebc84fb96846e07dcc8cb266e32e77c67c7bcf3b570b7063cf9b303a1788ccd05ea03a384dfc0110d7bb1e2d7f8b0d8dd6a7ae62fca4ea7c2dd5cf592033b9698014ae21b8069bd08e1ac28e02ccc9469bec8145ac9f6f9d4dd2baf055b633738f6040da7e653ad6751cb5f7a0a36711de16a816abfee0db05b185 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16176d09b2189e58a2454377688b946d6851e9f8 9a9fd3b8096695914603f35866074280dc992e8a 55f2dad218f28ecdc3e430b1b5c0c0b0e5866c99 233f50e97574db773997543443b97ff66de18d45 ab088b9e49acc89a58252cf123cd69a2e451e86e 536c8d87a6ec3c98a23efc2355d7e7b4d89d310d 18f76c7b94755abff83545d6a33d8fd47576967d 6bfb457ddf75c9473ab8f0bfa81337ef7ae9f345 9e19279cb327941fd0812020a22c9a8030b3775c a8f3bf34ba1f6e57a41bf89a23efb10ff09c029c 4db9b63b233554f0938ad1de9953a8da411c42bd bd136c32ce56848cbc538136ccf0c1f4c767a3be 2b4b295c7a5964eba2af843b6bd9da0cd21233da 9a423f34ff6bdf96b5fe3a05b824b3906417946a c1277ca2957406748acbad7077765a1ceec82fe5 9023371da8fd5f0315650f86bda4ba22425ff4ba 85277d916159e0ab4f37eb3a8ccc73eb39e2e0c2 09412f340b4f7132a6c3807e8f4500c7e121f75b 2ee950d5b560b6decc12d9ea5e91b5a7e3d7ad50 74e57c8e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [65:da:80:59:29:3b:ff:8d:46:f2:d2:17:a8:04:76:83:5b:66:59:0c] modulus: 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 public exponent: 10001 ] 2021-05-13 22:49:28.495 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-13 22:49:28.497 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-13 22:49:28.499 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-13 22:49:28.500 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 22:49:28.502 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-13 22:49:28.503 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 22:49:28.504 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-13 22:49:28.504 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-13 22:49:28.505 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-13 22:49:28.518 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-13 22:49:28.519 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-13 22:49:28.519 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-13 22:49:28.523 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 22:49:28.588 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-13 22:49:28.589 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-13 22:49:28.589 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-13 22:49:28.593 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-13 22:49:28.594 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1168 2021-05-13 22:49:28.595 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-13 22:49:28.598 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 22:49:28.599 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-13 22:49:28.600 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-13 22:49:28.600 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-13 22:49:28.601 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 22:49:28.602 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-13 22:49:28.602 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-13 22:49:28.604 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 22:49:28.605 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-13 22:49:28.605 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-13 22:49:28.607 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-hv-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0euadq3an19yhas18,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 22:49:28.613 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 647147866364618396951211346626422304448755818037 IssuerDN: UID=c-0euadq3an19yhas18,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 22:45:05 UTC 2021 Final Date: Tue May 13 22:45:04 UTC 2031 SubjectDN: UID=c-0euadq3an19yhas18,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:5a:f9:58:fd:d2:c5:d0:00:49:30:b8:33:8b:74:7b:80:54:09:e5] modulus: dd2930bb75503a701d81d200d8e7bb1a800c4b13496061af710170221c7bf75e84fd41372cf708dcafc91bf5ee20498026dad5c25a16a15bcbd4c2d7628360c175383e2e6a3e5fa8084bb65f023c8493fa0842f8f874b00c9a88e6db12605d5712ffef73407204fa4a483f3dd64e66e4ba10cdb4a32dc6fd39e8530acb4d951d77abe1e7b34de1e9f3d3c531a3fb317278925f671398bb28b74cffc4fdbd8489662a65519c01b1e8db796377dcfa44a359e413d3456f7a041d2b1a709525a183b0a4d332774abf7d2b98eb35353448139b428a1c43cb3ecc48a755b9edec7ef81815f29d16477f6fa79061b83991c9f7c38ac0726599667e27027103915c8fa95d8bb9e637ebc84fb96846e07dcc8cb266e32e77c67c7bcf3b570b7063cf9b303a1788ccd05ea03a384dfc0110d7bb1e2d7f8b0d8dd6a7ae62fca4ea7c2dd5cf592033b9698014ae21b8069bd08e1ac28e02ccc9469bec8145ac9f6f9d4dd2baf055b633738f6040da7e653ad6751cb5f7a0a36711de16a816abfee0db05b185 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16176d09b2189e58a2454377688b946d6851e9f8 9a9fd3b8096695914603f35866074280dc992e8a 55f2dad218f28ecdc3e430b1b5c0c0b0e5866c99 233f50e97574db773997543443b97ff66de18d45 ab088b9e49acc89a58252cf123cd69a2e451e86e 536c8d87a6ec3c98a23efc2355d7e7b4d89d310d 18f76c7b94755abff83545d6a33d8fd47576967d 6bfb457ddf75c9473ab8f0bfa81337ef7ae9f345 9e19279cb327941fd0812020a22c9a8030b3775c a8f3bf34ba1f6e57a41bf89a23efb10ff09c029c 4db9b63b233554f0938ad1de9953a8da411c42bd bd136c32ce56848cbc538136ccf0c1f4c767a3be 2b4b295c7a5964eba2af843b6bd9da0cd21233da 9a423f34ff6bdf96b5fe3a05b824b3906417946a c1277ca2957406748acbad7077765a1ceec82fe5 9023371da8fd5f0315650f86bda4ba22425ff4ba 85277d916159e0ab4f37eb3a8ccc73eb39e2e0c2 09412f340b4f7132a6c3807e8f4500c7e121f75b 2ee950d5b560b6decc12d9ea5e91b5a7e3d7ad50 74e57c8e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1d:ab:aa:96:f4:83:08:b4:3d:7a:93:b7:98:5a:ae:a6:5a:c5:d6:2b] modulus: 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 public exponent: 10001 ] 2021-05-13 22:49:28.677 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-13 22:49:28.678 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-13 22:49:28.679 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-13 22:49:28.680 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 22:49:28.681 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-13 22:49:28.682 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 22:49:28.683 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-13 22:49:28.684 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-13 22:49:28.684 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-13 22:49:28.694 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-13 22:49:28.695 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-13 22:49:28.695 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-13 22:49:28.697 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 22:49:28.754 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-13 22:49:28.755 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-13 22:49:28.755 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-13 22:49:28.757 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-13 22:49:28.758 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1168 2021-05-13 22:49:28.759 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-13 22:49:28.760 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 22:49:28.761 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-13 22:49:28.761 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-13 22:49:28.762 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-13 22:49:28.763 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 22:49:28.763 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-13 22:49:28.764 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-13 22:49:28.765 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 22:49:28.765 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-13 22:49:28.766 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-13 22:49:28.767 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0euadq3an19yhas18,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 22:49:28.793 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 647147866364618396951211346626422304448755818037 IssuerDN: UID=c-0euadq3an19yhas18,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 22:45:05 UTC 2021 Final Date: Tue May 13 22:45:04 UTC 2031 SubjectDN: UID=c-0euadq3an19yhas18,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:5a:f9:58:fd:d2:c5:d0:00:49:30:b8:33:8b:74:7b:80:54:09:e5] modulus: dd2930bb75503a701d81d200d8e7bb1a800c4b13496061af710170221c7bf75e84fd41372cf708dcafc91bf5ee20498026dad5c25a16a15bcbd4c2d7628360c175383e2e6a3e5fa8084bb65f023c8493fa0842f8f874b00c9a88e6db12605d5712ffef73407204fa4a483f3dd64e66e4ba10cdb4a32dc6fd39e8530acb4d951d77abe1e7b34de1e9f3d3c531a3fb317278925f671398bb28b74cffc4fdbd8489662a65519c01b1e8db796377dcfa44a359e413d3456f7a041d2b1a709525a183b0a4d332774abf7d2b98eb35353448139b428a1c43cb3ecc48a755b9edec7ef81815f29d16477f6fa79061b83991c9f7c38ac0726599667e27027103915c8fa95d8bb9e637ebc84fb96846e07dcc8cb266e32e77c67c7bcf3b570b7063cf9b303a1788ccd05ea03a384dfc0110d7bb1e2d7f8b0d8dd6a7ae62fca4ea7c2dd5cf592033b9698014ae21b8069bd08e1ac28e02ccc9469bec8145ac9f6f9d4dd2baf055b633738f6040da7e653ad6751cb5f7a0a36711de16a816abfee0db05b185 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16176d09b2189e58a2454377688b946d6851e9f8 9a9fd3b8096695914603f35866074280dc992e8a 55f2dad218f28ecdc3e430b1b5c0c0b0e5866c99 233f50e97574db773997543443b97ff66de18d45 ab088b9e49acc89a58252cf123cd69a2e451e86e 536c8d87a6ec3c98a23efc2355d7e7b4d89d310d 18f76c7b94755abff83545d6a33d8fd47576967d 6bfb457ddf75c9473ab8f0bfa81337ef7ae9f345 9e19279cb327941fd0812020a22c9a8030b3775c a8f3bf34ba1f6e57a41bf89a23efb10ff09c029c 4db9b63b233554f0938ad1de9953a8da411c42bd bd136c32ce56848cbc538136ccf0c1f4c767a3be 2b4b295c7a5964eba2af843b6bd9da0cd21233da 9a423f34ff6bdf96b5fe3a05b824b3906417946a c1277ca2957406748acbad7077765a1ceec82fe5 9023371da8fd5f0315650f86bda4ba22425ff4ba 85277d916159e0ab4f37eb3a8ccc73eb39e2e0c2 09412f340b4f7132a6c3807e8f4500c7e121f75b 2ee950d5b560b6decc12d9ea5e91b5a7e3d7ad50 74e57c8e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:1c:f1:22:e8:d7:4b:47:c3:09:25:2a:4f:31:87:d0:52:99:18:19] modulus: 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 public exponent: 10001 ]