By type
2021-05-18 22:47:20,352 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-18 22:47:21,094 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-18 22:47:21.876 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-05-18 22:47:24.879 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-18 22:47:25.147 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-05-18 22:47:25.320 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-18 22:47:27.902 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.051 seconds (JVM running for 9.639) 2021-05-18 22:48:19.146 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-18 22:48:19.154 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-18 22:48:19.195 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-18 22:48:19.199 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-18 22:48:19.211 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-18 22:48:19.214 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-18 22:48:19.218 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-18 22:48:19.218 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-18 22:48:19.218 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-18 22:48:19.225 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-18 22:48:19.229 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-18 22:48:19.261 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-18 22:48:19.266 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-18 22:48:19.267 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-18 22:48:19.284 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-18 22:48:19.801 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-18 22:48:19.804 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-18 22:48:19.805 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-18 22:48:19.810 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-18 22:48:19.812 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1742 2021-05-18 22:48:19.812 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-18 22:48:19.818 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-18 22:48:19.819 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-18 22:48:19.831 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-18 22:48:19.832 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-18 22:48:19.833 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-18 22:48:19.833 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-18 22:48:19.833 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-18 22:48:19.846 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-18 22:48:19.848 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-18 22:48:19.849 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-18 22:48:19.857 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0der2sw54du90u5uz,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-18 22:48:19.888 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 591989098046302790403165744038907693585295592504 IssuerDN: UID=c-0der2sw54du90u5uz,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 18 22:44:50 UTC 2021 Final Date: Sun May 18 22:44:49 UTC 2031 SubjectDN: UID=c-0der2sw54du90u5uz,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cc:1b:61:a0:2c:7b:31:44:56:81:67:cd:b5:73:5e:05:96:48:5c:78] modulus: 9d1b6b873bf865e0757567dc2b908b10c319eebb65b60d56a50f48d8aa81f4fb4624311b3a5ec1d0964578f17eb63bc77d68ae0a4f8f866b2aca291a1c243ebc2e96ffff4bb61ac7cf4e78cfba8c3232027b4824fb867a69807a74366058fc4d1e2e42df9224af20fa579f9102fc2596e9b07ab2895fcc55c33c40af765a32686dd0fb087c858720dec5bf702da7bb32db14e20f249b2014396207240ca93df360c2f3536cb8baaec5df7a629d813be69070922b759a87ca98989236623bf3127a07add56dbff11219d22cf9adfe8330c1db2aa382e086f2f3ce658655356ba29d79eac39f122f7560b13ac2a6734ef081809a7e44566dbd03c2332c6b833391e4f845947cf9e4d0263290f502595a3b6d506df4db3e07e35fb249d97d6a44f03748369aa3d459927488786575b2b9da883b018eeca6a8114299020921e2745f632a791ca2e19546ecb5f0303222d1b96d9d16ce87b1b02590edcbf970d206bc648404fdb99383ff7d50359baf07c7c2363f1d8a3b959c036badbac1096f53eb public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 85a3ff7a54e866f9ff7b31d409902384f5a4e70b 54e1dcc3109f0d54ecfb6489cdc6e65e42b356ac 2a42ba8d16d43a32739d6bdb62c3b26cb4fbdb1a c48e2f9ed9e341452b67a9fb21d76e3dede44b56 9d0018fec1d49af31479006780a217c18847b2cd f264d3b8001afc1ef99b32b0b6fd5b3ce4ce75b6 e33ebe04d2ff350f147249ba39f30d0a31834a79 c4707cddb4bfbf5dd2714c9cf08cfc3c65c88f98 7b4890a7db39714f32cbb59f7e2bc057626974e7 e4272ab0945ba44cee0bd2233663ee2631d6293e 5556e045aea15cf0d14224317f232a0aa1030403 29a6d2a7f4848f3c49fd31d47f17b4427229cb5f 70111ac08dc6e67eab59224668ec51985912af07 9d42f7ebdea91d6ba7e99c08e6fb2de88d9b1c84 7f9955868dd3434cee83df8b4403e6e0c6d08c1b acbb235b61bca16b8df69c219e8ac352d0100807 86ba35e7e747d4a8f645810f7357c98d3db5fee1 a2eeebef3f9eb4359c1a40321cc98f619a16597c e00ec2226847b34354fce9ec7f553bd8c608858e 6b7286f7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [86:32:e3:2a:5c:e9:91:f1:6b:41:ec:67:6a:c1:f3:8d:e4:d5:1a:bf] modulus: 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 public exponent: 10001 ] 2021-05-18 22:48:20.004 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-18 22:48:20.006 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-18 22:48:20.007 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-18 22:48:20.008 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-18 22:48:20.009 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-18 22:48:20.010 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-18 22:48:20.010 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-18 22:48:20.011 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-18 22:48:20.011 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-18 22:48:20.018 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-18 22:48:20.019 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-18 22:48:20.020 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-18 22:48:20.022 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-18 22:48:20.085 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-18 22:48:20.086 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-18 22:48:20.086 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-18 22:48:20.089 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-18 22:48:20.090 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1742 2021-05-18 22:48:20.091 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-18 22:48:20.093 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-18 22:48:20.094 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-18 22:48:20.094 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-18 22:48:20.095 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-18 22:48:20.095 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-18 22:48:20.096 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-18 22:48:20.096 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-18 22:48:20.097 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-18 22:48:20.098 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-18 22:48:20.098 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-18 22:48:20.099 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-hv-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0der2sw54du90u5uz,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-18 22:48:20.104 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 591989098046302790403165744038907693585295592504 IssuerDN: UID=c-0der2sw54du90u5uz,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 18 22:44:50 UTC 2021 Final Date: Sun May 18 22:44:49 UTC 2031 SubjectDN: UID=c-0der2sw54du90u5uz,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cc:1b:61:a0:2c:7b:31:44:56:81:67:cd:b5:73:5e:05:96:48:5c:78] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 85a3ff7a54e866f9ff7b31d409902384f5a4e70b 54e1dcc3109f0d54ecfb6489cdc6e65e42b356ac 2a42ba8d16d43a32739d6bdb62c3b26cb4fbdb1a c48e2f9ed9e341452b67a9fb21d76e3dede44b56 9d0018fec1d49af31479006780a217c18847b2cd f264d3b8001afc1ef99b32b0b6fd5b3ce4ce75b6 e33ebe04d2ff350f147249ba39f30d0a31834a79 c4707cddb4bfbf5dd2714c9cf08cfc3c65c88f98 7b4890a7db39714f32cbb59f7e2bc057626974e7 e4272ab0945ba44cee0bd2233663ee2631d6293e 5556e045aea15cf0d14224317f232a0aa1030403 29a6d2a7f4848f3c49fd31d47f17b4427229cb5f 70111ac08dc6e67eab59224668ec51985912af07 9d42f7ebdea91d6ba7e99c08e6fb2de88d9b1c84 7f9955868dd3434cee83df8b4403e6e0c6d08c1b acbb235b61bca16b8df69c219e8ac352d0100807 86ba35e7e747d4a8f645810f7357c98d3db5fee1 a2eeebef3f9eb4359c1a40321cc98f619a16597c e00ec2226847b34354fce9ec7f553bd8c608858e 6b7286f7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [79:f1:f0:fb:c2:53:9e:1e:3c:8b:05:53:81:76:13:90:0a:08:03:1d] modulus: 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 public exponent: 10001 ] 2021-05-18 22:48:20.183 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-18 22:48:20.184 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-18 22:48:20.185 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-18 22:48:20.186 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-18 22:48:20.186 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-18 22:48:20.187 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-18 22:48:20.187 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-18 22:48:20.188 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-18 22:48:20.188 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-18 22:48:20.194 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-18 22:48:20.195 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-18 22:48:20.195 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-18 22:48:20.198 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-18 22:48:20.265 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-18 22:48:20.267 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-18 22:48:20.267 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-18 22:48:20.270 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-18 22:48:20.271 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1742 2021-05-18 22:48:20.272 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-18 22:48:20.273 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-18 22:48:20.274 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-18 22:48:20.275 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-18 22:48:20.275 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-18 22:48:20.276 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-18 22:48:20.276 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-18 22:48:20.276 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-18 22:48:20.277 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-18 22:48:20.278 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-18 22:48:20.278 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-18 22:48:20.279 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0der2sw54du90u5uz,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-18 22:48:20.283 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 591989098046302790403165744038907693585295592504 IssuerDN: UID=c-0der2sw54du90u5uz,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 18 22:44:50 UTC 2021 Final Date: Sun May 18 22:44:49 UTC 2031 SubjectDN: UID=c-0der2sw54du90u5uz,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cc:1b:61:a0:2c:7b:31:44:56:81:67:cd:b5:73:5e:05:96:48:5c:78] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 85a3ff7a54e866f9ff7b31d409902384f5a4e70b 54e1dcc3109f0d54ecfb6489cdc6e65e42b356ac 2a42ba8d16d43a32739d6bdb62c3b26cb4fbdb1a c48e2f9ed9e341452b67a9fb21d76e3dede44b56 9d0018fec1d49af31479006780a217c18847b2cd f264d3b8001afc1ef99b32b0b6fd5b3ce4ce75b6 e33ebe04d2ff350f147249ba39f30d0a31834a79 c4707cddb4bfbf5dd2714c9cf08cfc3c65c88f98 7b4890a7db39714f32cbb59f7e2bc057626974e7 e4272ab0945ba44cee0bd2233663ee2631d6293e 5556e045aea15cf0d14224317f232a0aa1030403 29a6d2a7f4848f3c49fd31d47f17b4427229cb5f 70111ac08dc6e67eab59224668ec51985912af07 9d42f7ebdea91d6ba7e99c08e6fb2de88d9b1c84 7f9955868dd3434cee83df8b4403e6e0c6d08c1b acbb235b61bca16b8df69c219e8ac352d0100807 86ba35e7e747d4a8f645810f7357c98d3db5fee1 a2eeebef3f9eb4359c1a40321cc98f619a16597c e00ec2226847b34354fce9ec7f553bd8c608858e 6b7286f7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1a:e2:e6:3e:4a:94:57:f2:81:64:6d:15:55:af:c0:9c:38:e6:99:2d] modulus: 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 public exponent: 10001 ]