By type
2021-05-15 10:57:57,854 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-15 10:57:58,724 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-15 10:57:59.492 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-05-15 10:58:02.074 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-15 10:58:02.310 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-05-15 10:58:02.454 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-15 10:58:04.854 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.596 seconds (JVM running for 9.276) 2021-05-15 10:59:10.047 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-15 10:59:10.057 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-15 10:59:10.096 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-15 10:59:10.101 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-15 10:59:10.116 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-15 10:59:10.119 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-15 10:59:10.124 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-15 10:59:10.125 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-15 10:59:10.125 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-15 10:59:10.132 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-15 10:59:10.136 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-15 10:59:10.173 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-15 10:59:10.179 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-15 10:59:10.179 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-15 10:59:10.207 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-15 10:59:10.926 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-15 10:59:10.944 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-15 10:59:10.945 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-15 10:59:10.954 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-15 10:59:10.956 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1160 2021-05-15 10:59:10.957 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-15 10:59:10.961 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-15 10:59:10.962 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-15 10:59:10.971 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-15 10:59:10.972 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-15 10:59:10.974 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-15 10:59:10.975 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-15 10:59:10.976 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-15 10:59:10.991 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-15 10:59:10.991 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-15 10:59:10.992 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-15 10:59:11.000 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-048vodotbi2b7cpdw,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-15 10:59:11.037 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 604794570247749488650519758516741564127413128634 IssuerDN: UID=c-048vodotbi2b7cpdw,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 15 10:53:48 UTC 2021 Final Date: Thu May 15 10:53:47 UTC 2031 SubjectDN: UID=c-048vodotbi2b7cpdw,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [99:39:07:94:9e:fc:42:2c:e9:d7:e4:8c:77:a0:9b:01:a8:14:78:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 707e7a54135066a4831e4cfee04e7a5292ee4209 1b92be562a0a97013f52373212dcb2ae4dc83b5f 49405fe05918e6754dc90253d2329db7cd4b3a37 161c41686075bd633e4795f9e56d25bf15c6d75a 20814867b30c7659c4644f551a9b03643f8eb9db c87633e030c344bffc993b6066728633d9676bd6 70d9800386d2db32501ea7540990af96284acf4c 6b338d43c39ca2da4fb09c753ba7f82d4832882a 41324e9bb9d83ccd3f57ada8510eb37b59dfe20b 72574f3fd2cc8f1bd57dfac4d9908f238b558fc5 655d1cbff086cdbf2723cf180a1134e60d431540 1543ebf6737bac402ab9516c723873823ea86152 806b120612430458f15e54bcc635ead350dade87 6b7a39f980d25ac2bc0e90d42266b01b171f5075 c447c4d181cbb85a40ab720fde5287f316d7c513 15b3efe965e5f4e3754a581ece2fa10f2667fd77 455f84650d464cc81eff9b5481d17940fe027f89 0fe1aed9ffb6bfbb713e59d98d7c08a7dc107f05 a51524ec5f7048da16e5df53677b588334f52399 b207eb43 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6a:92:f9:2f:89:cb:c1:d8:c9:30:c3:ed:1a:6c:92:12:6e:4c:ff:0f] modulus: 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 public exponent: 10001 ] 2021-05-15 10:59:11.162 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-15 10:59:11.164 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-15 10:59:11.166 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-15 10:59:11.167 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-15 10:59:11.168 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-15 10:59:11.169 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-15 10:59:11.170 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-15 10:59:11.170 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-15 10:59:11.171 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-15 10:59:11.182 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-15 10:59:11.184 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-15 10:59:11.185 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-15 10:59:11.187 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-15 10:59:11.282 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-15 10:59:11.283 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-15 10:59:11.284 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-15 10:59:11.288 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-15 10:59:11.289 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1160 2021-05-15 10:59:11.290 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-15 10:59:11.293 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-15 10:59:11.293 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-15 10:59:11.294 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-15 10:59:11.294 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-15 10:59:11.295 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-15 10:59:11.296 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-15 10:59:11.296 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-15 10:59:11.297 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-15 10:59:11.298 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-15 10:59:11.298 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-15 10:59:11.300 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-hv-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-048vodotbi2b7cpdw,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-15 10:59:11.305 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 604794570247749488650519758516741564127413128634 IssuerDN: UID=c-048vodotbi2b7cpdw,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 15 10:53:48 UTC 2021 Final Date: Thu May 15 10:53:47 UTC 2031 SubjectDN: UID=c-048vodotbi2b7cpdw,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [99:39:07:94:9e:fc:42:2c:e9:d7:e4:8c:77:a0:9b:01:a8:14:78:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 707e7a54135066a4831e4cfee04e7a5292ee4209 1b92be562a0a97013f52373212dcb2ae4dc83b5f 49405fe05918e6754dc90253d2329db7cd4b3a37 161c41686075bd633e4795f9e56d25bf15c6d75a 20814867b30c7659c4644f551a9b03643f8eb9db c87633e030c344bffc993b6066728633d9676bd6 70d9800386d2db32501ea7540990af96284acf4c 6b338d43c39ca2da4fb09c753ba7f82d4832882a 41324e9bb9d83ccd3f57ada8510eb37b59dfe20b 72574f3fd2cc8f1bd57dfac4d9908f238b558fc5 655d1cbff086cdbf2723cf180a1134e60d431540 1543ebf6737bac402ab9516c723873823ea86152 806b120612430458f15e54bcc635ead350dade87 6b7a39f980d25ac2bc0e90d42266b01b171f5075 c447c4d181cbb85a40ab720fde5287f316d7c513 15b3efe965e5f4e3754a581ece2fa10f2667fd77 455f84650d464cc81eff9b5481d17940fe027f89 0fe1aed9ffb6bfbb713e59d98d7c08a7dc107f05 a51524ec5f7048da16e5df53677b588334f52399 b207eb43 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:88:91:ce:c4:f0:14:ae:52:30:26:e2:94:06:de:64:0d:b4:7a:44] modulus: 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 public exponent: 10001 ] 2021-05-15 10:59:11.400 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-15 10:59:11.401 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-15 10:59:11.403 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-15 10:59:11.404 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-15 10:59:11.405 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-15 10:59:11.406 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-15 10:59:11.407 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-15 10:59:11.408 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-15 10:59:11.408 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-15 10:59:11.424 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-15 10:59:11.424 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-15 10:59:11.425 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-15 10:59:11.428 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-15 10:59:11.500 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-15 10:59:11.501 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-15 10:59:11.502 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-15 10:59:11.505 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-15 10:59:11.507 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1160 2021-05-15 10:59:11.507 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-15 10:59:11.512 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-15 10:59:11.513 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-15 10:59:11.514 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-15 10:59:11.515 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-15 10:59:11.516 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-15 10:59:11.516 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-15 10:59:11.517 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-15 10:59:11.519 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-15 10:59:11.520 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-15 10:59:11.521 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-15 10:59:11.523 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-048vodotbi2b7cpdw,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-15 10:59:11.529 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 604794570247749488650519758516741564127413128634 IssuerDN: UID=c-048vodotbi2b7cpdw,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 15 10:53:48 UTC 2021 Final Date: Thu May 15 10:53:47 UTC 2031 SubjectDN: UID=c-048vodotbi2b7cpdw,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [99:39:07:94:9e:fc:42:2c:e9:d7:e4:8c:77:a0:9b:01:a8:14:78:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 707e7a54135066a4831e4cfee04e7a5292ee4209 1b92be562a0a97013f52373212dcb2ae4dc83b5f 49405fe05918e6754dc90253d2329db7cd4b3a37 161c41686075bd633e4795f9e56d25bf15c6d75a 20814867b30c7659c4644f551a9b03643f8eb9db c87633e030c344bffc993b6066728633d9676bd6 70d9800386d2db32501ea7540990af96284acf4c 6b338d43c39ca2da4fb09c753ba7f82d4832882a 41324e9bb9d83ccd3f57ada8510eb37b59dfe20b 72574f3fd2cc8f1bd57dfac4d9908f238b558fc5 655d1cbff086cdbf2723cf180a1134e60d431540 1543ebf6737bac402ab9516c723873823ea86152 806b120612430458f15e54bcc635ead350dade87 6b7a39f980d25ac2bc0e90d42266b01b171f5075 c447c4d181cbb85a40ab720fde5287f316d7c513 15b3efe965e5f4e3754a581ece2fa10f2667fd77 455f84650d464cc81eff9b5481d17940fe027f89 0fe1aed9ffb6bfbb713e59d98d7c08a7dc107f05 a51524ec5f7048da16e5df53677b588334f52399 b207eb43 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6f:2a:fe:5b:ef:bc:78:54:d4:f4:33:0a:58:74:56:a8:47:fd:7c:3b] modulus: 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 public exponent: 10001 ]