By type
2021-05-18 10:54:38,415 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-18 10:54:39,219 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-18 10:54:39.864 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-05-18 10:54:42.316 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-18 10:54:42.535 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-05-18 10:54:42.695 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-18 10:54:44.971 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.369 seconds (JVM running for 9.574) 2021-05-18 10:55:47.813 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-18 10:55:47.823 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-18 10:55:47.879 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-18 10:55:47.883 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-18 10:55:47.896 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-18 10:55:47.899 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-18 10:55:47.903 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-18 10:55:47.903 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-18 10:55:47.904 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-18 10:55:47.920 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-18 10:55:47.926 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-18 10:55:47.985 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-18 10:55:47.993 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-18 10:55:47.993 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-18 10:55:48.021 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-18 10:55:48.623 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-18 10:55:48.628 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-18 10:55:48.630 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-18 10:55:48.637 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-18 10:55:48.640 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1101 2021-05-18 10:55:48.640 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-18 10:55:48.652 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-18 10:55:48.653 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-18 10:55:48.660 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-18 10:55:48.661 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-18 10:55:48.661 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-18 10:55:48.662 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-18 10:55:48.662 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-18 10:55:48.679 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-18 10:55:48.680 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-18 10:55:48.681 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-18 10:55:48.699 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-hv-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0j43vqqzkmb46wxmk,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-18 10:55:48.757 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 651289630953937154989133666292979984877893502491 IssuerDN: UID=c-0j43vqqzkmb46wxmk,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 18 10:50:14 UTC 2021 Final Date: Sun May 18 10:50:13 UTC 2031 SubjectDN: UID=c-0j43vqqzkmb46wxmk,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c6:28:89:23:ee:18:63:2c:7f:25:81:13:7c:2b:89:9d:8c:8c:77:02] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fb9bb9c8676297587af2b88677f20f41a33b89d 6455af48a32ae129ffe8462688eedb1025d84696 efb6f780fe07966b274e4eb00c039762bd1646b2 ca4ab887772207dc90415388d3dc49761140f02e a9dea27f4bba741aff3fab11af336126357fdc0e 5356168fc8c72ea72787717c183a5207d291f202 485849c30b77e90e70bd2cfb08ae238297e993f2 4e604c505fd14c9969c9ea858ea88457b10ee1b0 ec95d80a176e65abd815cb6db7954cb773264579 687e919fca996292d9b78ee377a6a65f0e1d4446 0155a162e10db495ab9eda7def2b273e4b5013a1 ba1793165d07813ceff9aef3322ffb13ec0eb295 2ca0b352a7531e964200e5bc37fcd9bc9ca2f57d 5f364d947aaf4f472a1fa134801f9ad1d5e83b2c 3d09bfa58538f9114dbda1219c7aab5b03bca5e4 b24fd1690d609ca2f45de9c5af5c9d8e2ef0e4b1 00eb5299a85be972de0db91025b472291d93f60f 8842b47a65089ede53461924a267f98113067aa8 10d5bcbd5b8dc24f3940bb8ed64e66f0f711e3e5 7ea49ffb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [76:d2:c9:0a:92:d7:7f:7a:0c:2d:d2:b7:79:35:6a:58:17:33:81:11] modulus: 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 public exponent: 10001 ] 2021-05-18 10:55:48.974 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-18 10:55:48.984 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-18 10:55:48.987 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-18 10:55:48.997 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-18 10:55:49.006 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-18 10:55:49.007 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-18 10:55:49.008 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-18 10:55:49.009 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-18 10:55:49.031 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-18 10:55:49.059 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-18 10:55:49.060 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-18 10:55:49.060 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-18 10:55:49.063 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-18 10:55:49.199 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-18 10:55:49.200 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-18 10:55:49.200 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-18 10:55:49.205 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-18 10:55:49.205 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1101 2021-05-18 10:55:49.206 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-18 10:55:49.208 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-18 10:55:49.209 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-18 10:55:49.209 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-18 10:55:49.210 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-18 10:55:49.210 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-18 10:55:49.211 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-18 10:55:49.211 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-18 10:55:49.212 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-18 10:55:49.213 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-18 10:55:49.213 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-18 10:55:49.216 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0j43vqqzkmb46wxmk,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-18 10:55:49.220 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 651289630953937154989133666292979984877893502491 IssuerDN: UID=c-0j43vqqzkmb46wxmk,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 18 10:50:14 UTC 2021 Final Date: Sun May 18 10:50:13 UTC 2031 SubjectDN: UID=c-0j43vqqzkmb46wxmk,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c6:28:89:23:ee:18:63:2c:7f:25:81:13:7c:2b:89:9d:8c:8c:77:02] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fb9bb9c8676297587af2b88677f20f41a33b89d 6455af48a32ae129ffe8462688eedb1025d84696 efb6f780fe07966b274e4eb00c039762bd1646b2 ca4ab887772207dc90415388d3dc49761140f02e a9dea27f4bba741aff3fab11af336126357fdc0e 5356168fc8c72ea72787717c183a5207d291f202 485849c30b77e90e70bd2cfb08ae238297e993f2 4e604c505fd14c9969c9ea858ea88457b10ee1b0 ec95d80a176e65abd815cb6db7954cb773264579 687e919fca996292d9b78ee377a6a65f0e1d4446 0155a162e10db495ab9eda7def2b273e4b5013a1 ba1793165d07813ceff9aef3322ffb13ec0eb295 2ca0b352a7531e964200e5bc37fcd9bc9ca2f57d 5f364d947aaf4f472a1fa134801f9ad1d5e83b2c 3d09bfa58538f9114dbda1219c7aab5b03bca5e4 b24fd1690d609ca2f45de9c5af5c9d8e2ef0e4b1 00eb5299a85be972de0db91025b472291d93f60f 8842b47a65089ede53461924a267f98113067aa8 10d5bcbd5b8dc24f3940bb8ed64e66f0f711e3e5 7ea49ffb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f6:e9:39:a0:1d:56:ac:fb:a9:01:b6:1c:fc:91:33:b0:59:0c:c9:ca] modulus: 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 public exponent: 10001 ] 2021-05-18 10:55:49.317 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-18 10:55:49.318 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-18 10:55:49.320 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-18 10:55:49.321 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-18 10:55:49.321 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-18 10:55:49.322 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-18 10:55:49.322 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-18 10:55:49.323 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-18 10:55:49.323 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-18 10:55:49.332 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-18 10:55:49.333 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-18 10:55:49.334 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-18 10:55:49.336 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-18 10:55:49.405 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-18 10:55:49.406 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-18 10:55:49.406 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-18 10:55:49.409 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-18 10:55:49.410 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1101 2021-05-18 10:55:49.410 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-18 10:55:49.412 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-18 10:55:49.413 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-18 10:55:49.413 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-18 10:55:49.414 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-18 10:55:49.414 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-18 10:55:49.415 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-18 10:55:49.415 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-18 10:55:49.416 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-18 10:55:49.416 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-18 10:55:49.416 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-18 10:55:49.418 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0j43vqqzkmb46wxmk,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-18 10:55:49.421 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 651289630953937154989133666292979984877893502491 IssuerDN: UID=c-0j43vqqzkmb46wxmk,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 18 10:50:14 UTC 2021 Final Date: Sun May 18 10:50:13 UTC 2031 SubjectDN: UID=c-0j43vqqzkmb46wxmk,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c6:28:89:23:ee:18:63:2c:7f:25:81:13:7c:2b:89:9d:8c:8c:77:02] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fb9bb9c8676297587af2b88677f20f41a33b89d 6455af48a32ae129ffe8462688eedb1025d84696 efb6f780fe07966b274e4eb00c039762bd1646b2 ca4ab887772207dc90415388d3dc49761140f02e a9dea27f4bba741aff3fab11af336126357fdc0e 5356168fc8c72ea72787717c183a5207d291f202 485849c30b77e90e70bd2cfb08ae238297e993f2 4e604c505fd14c9969c9ea858ea88457b10ee1b0 ec95d80a176e65abd815cb6db7954cb773264579 687e919fca996292d9b78ee377a6a65f0e1d4446 0155a162e10db495ab9eda7def2b273e4b5013a1 ba1793165d07813ceff9aef3322ffb13ec0eb295 2ca0b352a7531e964200e5bc37fcd9bc9ca2f57d 5f364d947aaf4f472a1fa134801f9ad1d5e83b2c 3d09bfa58538f9114dbda1219c7aab5b03bca5e4 b24fd1690d609ca2f45de9c5af5c9d8e2ef0e4b1 00eb5299a85be972de0db91025b472291d93f60f 8842b47a65089ede53461924a267f98113067aa8 10d5bcbd5b8dc24f3940bb8ed64e66f0f711e3e5 7ea49ffb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [49:c4:50:fb:71:cc:a1:2a:47:08:88:e6:c0:2a:f5:e8:7c:25:b5:ce] modulus: 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 public exponent: 10001 ]