By type
2021-05-14 22:51:31,164 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-14 22:51:31,835 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-14 22:51:32.383 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-05-14 22:51:34.390 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-14 22:51:34.579 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-05-14 22:51:34.695 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-14 22:51:36.582 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 5.869 seconds (JVM running for 7.078) 2021-05-14 22:52:36.915 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-14 22:52:36.923 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-14 22:52:36.964 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-14 22:52:36.967 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-14 22:52:36.981 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-14 22:52:36.984 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-14 22:52:36.988 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-14 22:52:36.989 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-14 22:52:36.989 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-14 22:52:36.996 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-14 22:52:36.999 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-14 22:52:37.037 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-14 22:52:37.042 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-14 22:52:37.042 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-14 22:52:37.054 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-14 22:52:37.552 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-14 22:52:37.555 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-14 22:52:37.555 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-14 22:52:37.562 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-14 22:52:37.564 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1257 2021-05-14 22:52:37.564 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-14 22:52:37.568 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-14 22:52:37.569 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-14 22:52:37.575 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-14 22:52:37.576 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-14 22:52:37.577 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-14 22:52:37.577 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-14 22:52:37.578 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-14 22:52:37.589 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-14 22:52:37.590 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-14 22:52:37.590 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-14 22:52:37.602 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-hv-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-034s7oul1o6nt1b0g,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-14 22:52:37.632 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 369971402302328439452366645131959231583947191748 IssuerDN: UID=c-034s7oul1o6nt1b0g,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 14 22:48:52 UTC 2021 Final Date: Wed May 14 22:48:51 UTC 2031 SubjectDN: UID=c-034s7oul1o6nt1b0g,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [05:5c:be:c9:77:20:e3:68:af:db:10:cb:dc:da:22:b1:bd:c2:11:d8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aae0f06b90491532f2ffa0dad49a8cc2f1971387 0b4fcb084f9b5f4420337f8feba3d2003bc08015 8eeb66c72d9a167395dc98a3fb3f10582742a996 4b46432564be9c107d3c5f41df0e2f8ccb5dbc0e 20baa82f008f3a371c5043704a800b853c22a7bc d54ce1b2c659d7d3102d1396c6d9f1bef133bca8 bae6a470c01e2a8b08eedbc7658fe695713f1aca 468e3a76061a60052251b3f9ece66b877957bdbc 8b3f0a349185b4b0af35df5b6411aecd8c4e8762 2b5c455a8dcaaebd659c179ad1833a569745d56a 9769cf05cc0faf7cd3dc4a3aa16190e835ff786c a0572e1fc7c50fdea4d24ded1097b8c123ecb93a 0dfd4bcaa7023b703d625ff350db4354dbe5125f 48265073d9370aacb05511d1001275d0093413af 804902f625d6cf30cf1f737c48627107fe0050ac c6018aea83a333404e89ab33b4a74136fadb3b68 c8ec6efa4014db8482b6ff00b47ff74793ec92cc 1db8561ceed5f7220de25ee8318f7bbef14180d4 106299e0e75aa776a6728634e3a0f12d935ba542 7d96b0e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:1b:51:33:3a:79:28:68:86:6e:7f:cc:27:ef:12:76:f0:09:01:35] modulus: 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 public exponent: 10001 ] 2021-05-14 22:52:37.729 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-14 22:52:37.730 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-14 22:52:37.731 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-14 22:52:37.732 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-14 22:52:37.733 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-14 22:52:37.734 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-14 22:52:37.735 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-14 22:52:37.735 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-14 22:52:37.736 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-14 22:52:37.743 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-14 22:52:37.743 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-14 22:52:37.744 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-14 22:52:37.746 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-14 22:52:37.802 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-14 22:52:37.803 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-14 22:52:37.803 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-14 22:52:37.807 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-14 22:52:37.808 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1257 2021-05-14 22:52:37.808 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-14 22:52:37.810 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-14 22:52:37.811 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-14 22:52:37.811 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-14 22:52:37.812 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-14 22:52:37.813 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-14 22:52:37.813 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-14 22:52:37.814 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-14 22:52:37.815 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-14 22:52:37.816 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-14 22:52:37.817 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-14 22:52:37.818 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-034s7oul1o6nt1b0g,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-14 22:52:37.824 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 369971402302328439452366645131959231583947191748 IssuerDN: UID=c-034s7oul1o6nt1b0g,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 14 22:48:52 UTC 2021 Final Date: Wed May 14 22:48:51 UTC 2031 SubjectDN: UID=c-034s7oul1o6nt1b0g,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [05:5c:be:c9:77:20:e3:68:af:db:10:cb:dc:da:22:b1:bd:c2:11:d8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aae0f06b90491532f2ffa0dad49a8cc2f1971387 0b4fcb084f9b5f4420337f8feba3d2003bc08015 8eeb66c72d9a167395dc98a3fb3f10582742a996 4b46432564be9c107d3c5f41df0e2f8ccb5dbc0e 20baa82f008f3a371c5043704a800b853c22a7bc d54ce1b2c659d7d3102d1396c6d9f1bef133bca8 bae6a470c01e2a8b08eedbc7658fe695713f1aca 468e3a76061a60052251b3f9ece66b877957bdbc 8b3f0a349185b4b0af35df5b6411aecd8c4e8762 2b5c455a8dcaaebd659c179ad1833a569745d56a 9769cf05cc0faf7cd3dc4a3aa16190e835ff786c a0572e1fc7c50fdea4d24ded1097b8c123ecb93a 0dfd4bcaa7023b703d625ff350db4354dbe5125f 48265073d9370aacb05511d1001275d0093413af 804902f625d6cf30cf1f737c48627107fe0050ac c6018aea83a333404e89ab33b4a74136fadb3b68 c8ec6efa4014db8482b6ff00b47ff74793ec92cc 1db8561ceed5f7220de25ee8318f7bbef14180d4 106299e0e75aa776a6728634e3a0f12d935ba542 7d96b0e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [91:b7:cd:f9:de:90:5f:19:c3:5b:77:d2:48:e5:b7:48:e8:fb:a1:e7] modulus: c6e2fc3d9aae64576fe950da0d437c93a0ad2a32f8fb01f72189861abd0455b611c7a030c876c493216798bd378d64c39d432a71c32def61c924d5f738ef6ce116cfb3ae5ce139b40acaf5b40c56e491e700c1e6293855d72f0c3826963224dc379d97a8114c3d31800a320fe31a1a2be895dd99b1f9d61812692ad612d03454e0173919e13093fa3aa3f436b91905839a753606c451e21a6f919c43b9335a35a8b1117798b7387ce315a6ecad867f5b17189364531112001581df1fdfc856e96ae1455e20d9b1fa67d43b379670c96bb93bb49a8c2952041f4af1be5092ea6e398962289eedcc2c411e5b76614314091952d10b1347d8fde711b23e00c93f89 public exponent: 10001 ] 2021-05-14 22:52:37.887 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-14 22:52:37.888 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-14 22:52:37.889 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-14 22:52:37.890 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-14 22:52:37.890 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-14 22:52:37.891 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-14 22:52:37.891 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-14 22:52:37.891 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-14 22:52:37.892 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-14 22:52:37.901 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-14 22:52:37.901 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-14 22:52:37.902 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-14 22:52:37.903 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-14 22:52:37.954 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-14 22:52:37.955 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-14 22:52:37.955 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-14 22:52:37.958 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-14 22:52:37.959 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1257 2021-05-14 22:52:37.959 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-14 22:52:37.961 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-14 22:52:37.962 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-14 22:52:37.963 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-14 22:52:37.963 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-14 22:52:37.964 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-14 22:52:37.964 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-14 22:52:37.965 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-14 22:52:37.966 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-14 22:52:37.967 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-14 22:52:37.967 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-14 22:52:37.969 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-034s7oul1o6nt1b0g,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-14 22:52:37.972 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 369971402302328439452366645131959231583947191748 IssuerDN: UID=c-034s7oul1o6nt1b0g,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 14 22:48:52 UTC 2021 Final Date: Wed May 14 22:48:51 UTC 2031 SubjectDN: UID=c-034s7oul1o6nt1b0g,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [05:5c:be:c9:77:20:e3:68:af:db:10:cb:dc:da:22:b1:bd:c2:11:d8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: aae0f06b90491532f2ffa0dad49a8cc2f1971387 0b4fcb084f9b5f4420337f8feba3d2003bc08015 8eeb66c72d9a167395dc98a3fb3f10582742a996 4b46432564be9c107d3c5f41df0e2f8ccb5dbc0e 20baa82f008f3a371c5043704a800b853c22a7bc d54ce1b2c659d7d3102d1396c6d9f1bef133bca8 bae6a470c01e2a8b08eedbc7658fe695713f1aca 468e3a76061a60052251b3f9ece66b877957bdbc 8b3f0a349185b4b0af35df5b6411aecd8c4e8762 2b5c455a8dcaaebd659c179ad1833a569745d56a 9769cf05cc0faf7cd3dc4a3aa16190e835ff786c a0572e1fc7c50fdea4d24ded1097b8c123ecb93a 0dfd4bcaa7023b703d625ff350db4354dbe5125f 48265073d9370aacb05511d1001275d0093413af 804902f625d6cf30cf1f737c48627107fe0050ac c6018aea83a333404e89ab33b4a74136fadb3b68 c8ec6efa4014db8482b6ff00b47ff74793ec92cc 1db8561ceed5f7220de25ee8318f7bbef14180d4 106299e0e75aa776a6728634e3a0f12d935ba542 7d96b0e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e3:3d:45:5e:02:28:49:91:2d:5c:66:d8:1e:94:71:39:8f:49:57:b1] modulus: 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 public exponent: 10001 ]