By type
2021-05-14 10:49:26,033 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-14 10:49:26,772 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-14 10:49:27.291 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-05-14 10:49:29.380 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-14 10:49:29.585 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-05-14 10:49:29.707 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-14 10:49:31.561 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 5.946 seconds (JVM running for 7.356) 2021-05-14 10:50:42.450 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-14 10:50:42.459 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-14 10:50:42.496 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-14 10:50:42.500 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-14 10:50:42.514 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-14 10:50:42.518 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-14 10:50:42.522 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-14 10:50:42.523 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-14 10:50:42.523 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-14 10:50:42.531 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-14 10:50:42.534 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-14 10:50:42.572 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-14 10:50:42.576 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-14 10:50:42.577 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-14 10:50:42.587 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-14 10:50:43.111 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-14 10:50:43.115 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-14 10:50:43.115 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-14 10:50:43.122 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-14 10:50:43.124 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1209 2021-05-14 10:50:43.124 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-14 10:50:43.127 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-14 10:50:43.128 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-14 10:50:43.144 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-14 10:50:43.146 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-14 10:50:43.147 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-14 10:50:43.147 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-14 10:50:43.147 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-14 10:50:43.161 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-14 10:50:43.161 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-14 10:50:43.162 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-14 10:50:43.168 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0en4762awurv6qzko,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-14 10:50:43.198 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 531151645300604057374640021753511802463250039127 IssuerDN: UID=c-0en4762awurv6qzko,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 14 10:46:31 UTC 2021 Final Date: Wed May 14 10:46:30 UTC 2031 SubjectDN: UID=c-0en4762awurv6qzko,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:e5:30:b8:34:a1:e4:00:9f:af:0d:d3:3d:3d:db:dd:c3:fd:2c:d7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 258f83c8e5e38767ac3beb023ff6b581b96db990 f14dcb0e667d952869d26482c2baba70bc1c808e a3ea645dbd9c4798f20f7d148939017d603310a1 ff0305284c6dabc84a73ecb10b92bbc22b0b3663 36754ab81c4d4591b16386c13522fda6fe4ca11f 00b64e551bda2fdf9a2b20b50670a7f58869bacf a02ed1e346bf180b027ed2759dfdd62400687c9b 938a5ab439aa43698b8617fc93ad69feec95f361 aeddc06904bd15636e7111ad24ad42cfe22e98d0 8a1ab89a791a808c31981144c9f4b9b471383e77 74bb3ddb1c369f53910f3956ee65e16e6c798929 812fe825c9ec13d5d18788698cc56c75a72b345e bf7328374abc54ff126e1df86296fe4cf5b0b259 476afa3e4b42304e2e5147d20ad87e2a53f84594 143ae160f10b4a6745fb2386a446b145399d680b 6fbf05ee8a9b464047e296c94df9cf0af22238e9 07af0c487c270a64f08703038bbdf4eb6f36be1f 0b3641e73c455b7bc81e3090ecd2ef90cfb1a641 6b8ecf949fe17a9971c6a282e8ae9eb82ff0ab6c c5b1b063 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [39:1e:6c:99:58:b6:a3:92:46:a1:1c:5d:5b:da:48:cb:75:35:1a:2c] modulus: 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 public exponent: 10001 ] 2021-05-14 10:50:43.307 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-14 10:50:43.309 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-14 10:50:43.311 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-14 10:50:43.313 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-14 10:50:43.314 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-14 10:50:43.315 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-14 10:50:43.316 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-14 10:50:43.317 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-14 10:50:43.318 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-14 10:50:43.330 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-14 10:50:43.332 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-14 10:50:43.333 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-14 10:50:43.338 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-14 10:50:43.425 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-14 10:50:43.426 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-14 10:50:43.427 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-14 10:50:43.431 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-14 10:50:43.433 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1209 2021-05-14 10:50:43.434 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-14 10:50:43.437 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-14 10:50:43.438 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-14 10:50:43.438 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-14 10:50:43.439 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-14 10:50:43.439 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-14 10:50:43.440 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-14 10:50:43.440 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-14 10:50:43.442 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-14 10:50:43.443 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-14 10:50:43.443 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-14 10:50:43.445 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-hv-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0en4762awurv6qzko,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-14 10:50:43.452 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 531151645300604057374640021753511802463250039127 IssuerDN: UID=c-0en4762awurv6qzko,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 14 10:46:31 UTC 2021 Final Date: Wed May 14 10:46:30 UTC 2031 SubjectDN: UID=c-0en4762awurv6qzko,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:e5:30:b8:34:a1:e4:00:9f:af:0d:d3:3d:3d:db:dd:c3:fd:2c:d7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 258f83c8e5e38767ac3beb023ff6b581b96db990 f14dcb0e667d952869d26482c2baba70bc1c808e a3ea645dbd9c4798f20f7d148939017d603310a1 ff0305284c6dabc84a73ecb10b92bbc22b0b3663 36754ab81c4d4591b16386c13522fda6fe4ca11f 00b64e551bda2fdf9a2b20b50670a7f58869bacf a02ed1e346bf180b027ed2759dfdd62400687c9b 938a5ab439aa43698b8617fc93ad69feec95f361 aeddc06904bd15636e7111ad24ad42cfe22e98d0 8a1ab89a791a808c31981144c9f4b9b471383e77 74bb3ddb1c369f53910f3956ee65e16e6c798929 812fe825c9ec13d5d18788698cc56c75a72b345e bf7328374abc54ff126e1df86296fe4cf5b0b259 476afa3e4b42304e2e5147d20ad87e2a53f84594 143ae160f10b4a6745fb2386a446b145399d680b 6fbf05ee8a9b464047e296c94df9cf0af22238e9 07af0c487c270a64f08703038bbdf4eb6f36be1f 0b3641e73c455b7bc81e3090ecd2ef90cfb1a641 6b8ecf949fe17a9971c6a282e8ae9eb82ff0ab6c c5b1b063 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:85:11:27:99:29:20:5b:c4:7f:36:c5:59:83:3b:21:3a:fd:21:dc] modulus: d60b67f9de6522e511187fbef21e67785254b151557316d124f52cd9f66629e66150be1bcc552d8cadc11db37a9399a0d2ed7bba39458db34fd724d8bf3e3e431ae62bd77eee8110c96b00deed4921e5ce01aff6bc5172e7375222c17cd648c7b63336063942971be0941c0a95b4d8becb6fd95ecca5ff35d21f68e04f8f0c5b19594a12ea1161aa003431c5899511bc4ae9325cf4f4f44660fc20769ffb6abc0212db1981e481fc7d70221ce302184d45a3813827970afbcd5530c95d17773c473b562563d0c6a76dee5b59d498b3199ac55398f8fe5c97c531ab261b69288e0e77d135cdfde84d502da4ec5c4bde60b39f8af4001adcf35ac8099a71d7bc45 public exponent: 10001 ] 2021-05-14 10:50:43.524 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-14 10:50:43.526 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-14 10:50:43.527 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-14 10:50:43.529 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-14 10:50:43.529 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-14 10:50:43.530 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-14 10:50:43.531 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-14 10:50:43.531 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-14 10:50:43.531 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-14 10:50:43.540 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-14 10:50:43.541 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-14 10:50:43.541 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-14 10:50:43.543 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-14 10:50:43.612 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-14 10:50:43.617 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-14 10:50:43.617 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-14 10:50:43.619 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-14 10:50:43.619 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1209 2021-05-14 10:50:43.620 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-14 10:50:43.621 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-14 10:50:43.622 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-14 10:50:43.622 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-14 10:50:43.623 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-14 10:50:43.623 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-14 10:50:43.623 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-14 10:50:43.624 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-14 10:50:43.625 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-14 10:50:43.625 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-14 10:50:43.625 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-14 10:50:43.626 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0en4762awurv6qzko,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-14 10:50:43.632 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 531151645300604057374640021753511802463250039127 IssuerDN: UID=c-0en4762awurv6qzko,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 14 10:46:31 UTC 2021 Final Date: Wed May 14 10:46:30 UTC 2031 SubjectDN: UID=c-0en4762awurv6qzko,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:e5:30:b8:34:a1:e4:00:9f:af:0d:d3:3d:3d:db:dd:c3:fd:2c:d7] modulus: b97bbd9947ae3b678b3681cb9a97825771a4336807b7ef17122262f88e9eb80b4463f18a963e3bcd79f9b7deee956579317ad1d9a55a8173330e31cfd647a86443b6269d7df53778d81dcbfa60a9180282eb1078c6c00b538d707cf8d2af377286d4c19cba58accf7c0092ac3178bd937be2017ff252529f0d6f55c38a106d21fb0fe25e07592b02d2671c906b993774d06c3620f1f8c3ccb8d49da5238d60cbbde059b67aa76631173abf9093f35e92ef258a4913c6f80a8a29af9c49b67725adbc7d600bdfc396946960d044bdc7dc4533f1c4a5c0fadbd0c73294323431e2ef18e1e07f1784793219ad77795b5f982de6fe1e0db72ac3d06795433c968a84ec1b15ebf32b1ddf69a37fd15a0fc8d1593f5cf29be30cc1f697be21d2d54e706e7eed2358bab3fc613e565e9f1f90f9d57d98c02a048c1f302f963a41b65be02ecd0d79e6812c2903c9b10e2c7a6385f4f30de31dbc3dea1fb7cc1c051f0750e26a2683e7ee682d00cea0c3063f46807b5ad68842dc3a70e96ca14e10b0c6c1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 258f83c8e5e38767ac3beb023ff6b581b96db990 f14dcb0e667d952869d26482c2baba70bc1c808e a3ea645dbd9c4798f20f7d148939017d603310a1 ff0305284c6dabc84a73ecb10b92bbc22b0b3663 36754ab81c4d4591b16386c13522fda6fe4ca11f 00b64e551bda2fdf9a2b20b50670a7f58869bacf a02ed1e346bf180b027ed2759dfdd62400687c9b 938a5ab439aa43698b8617fc93ad69feec95f361 aeddc06904bd15636e7111ad24ad42cfe22e98d0 8a1ab89a791a808c31981144c9f4b9b471383e77 74bb3ddb1c369f53910f3956ee65e16e6c798929 812fe825c9ec13d5d18788698cc56c75a72b345e bf7328374abc54ff126e1df86296fe4cf5b0b259 476afa3e4b42304e2e5147d20ad87e2a53f84594 143ae160f10b4a6745fb2386a446b145399d680b 6fbf05ee8a9b464047e296c94df9cf0af22238e9 07af0c487c270a64f08703038bbdf4eb6f36be1f 0b3641e73c455b7bc81e3090ecd2ef90cfb1a641 6b8ecf949fe17a9971c6a282e8ae9eb82ff0ab6c c5b1b063 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [90:85:0d:91:68:22:24:b5:d8:2c:02:4c:9c:fd:04:c6:eb:98:3a:9f] modulus: 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 public exponent: 10001 ]