By type
2021-05-20 10:52:40,050 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-20 10:52:40,794 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-20 10:52:41.474 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-05-20 10:52:43.795 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-20 10:52:44.006 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-05-20 10:52:44.181 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-20 10:52:46.175 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 6.735 seconds (JVM running for 8.363) 2021-05-20 10:53:50.850 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-20 10:53:50.858 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-20 10:53:50.899 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-20 10:53:50.903 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-20 10:53:50.917 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-20 10:53:50.920 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-20 10:53:50.924 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-20 10:53:50.925 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-20 10:53:50.925 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-20 10:53:50.934 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-20 10:53:50.937 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-20 10:53:50.970 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-20 10:53:50.976 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-20 10:53:50.976 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-20 10:53:50.989 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-20 10:53:51.525 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-20 10:53:51.529 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-20 10:53:51.530 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-20 10:53:51.537 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-20 10:53:51.538 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1440 2021-05-20 10:53:51.539 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-20 10:53:51.542 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-20 10:53:51.542 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-20 10:53:51.549 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-20 10:53:51.551 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-20 10:53:51.552 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-20 10:53:51.552 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-20 10:53:51.552 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-20 10:53:51.569 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-20 10:53:51.571 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-20 10:53:51.572 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-20 10:53:51.581 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-hv-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0hz5vr6rqh87vx3ry,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-20 10:53:51.607 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 143109056159089555162657172004451444157629518415 IssuerDN: UID=c-0hz5vr6rqh87vx3ry,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 20 10:48:42 UTC 2021 Final Date: Tue May 20 10:48:41 UTC 2031 SubjectDN: UID=c-0hz5vr6rqh87vx3ry,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:d0:23:b5:74:49:33:89:26:a9:6b:68:ad:e7:d2:6e:aa:3b:d9:72] modulus: b15d119c4b0517e14afe9d4ce18596ed9289624182672942fb7cb7cec55fb0a06be7b73c7262e6074c0ae8be274f657221aa3c3c6d56834dfbc8c195ac77edac0f9e6705c22ba5ec8e90c5d9052eefbc1e5f6f6570b817776ee115e07088c9de431a751febb596a54eac4211c4e168efd56791b3056461de2541ddfaf40584aceee61e82c8cf52427a1f29f796749a3f078553a5fdd0b54505cc13136925b163542eb7d724f73a9a5566163141072acfcda1070f28abf180f9178227705e79fb5ec7184586c8872fda9d5ba0e8e3f28b7f67dffe941a5aef3e5ee70d9aaf77fd51e4eaeb812155ac22ef2a75de30dda851f5745cf1e5e43421d9d957cfd021d2b87d0a1806dfe1448a32357bdba65c7a8fbb590cc3398194da330b4d98c9128c8e531d557a0178ed45bc01fcd9dcbb46c7ce9bb9dd7f662180f063184b201a4ad506ac5284aeb1904333f8d7eadcf218fdd4c0923130eec91afcead8061be2b33a35f95bbd87023fce1989560240eaba107fbb522e5485efa0392ac0f5917597 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2b8768269ed8b8d2efb9df2a97039551c357fbc2 feca6aa1e9ccca350bd370b9f888c603dd28abad 4f68f5254afe0089da7da34191eb17e7c0a20600 93bb055bf09c0d1a20e0a897426b4463f5d83694 36617b6bfb9ee0fab3ab75771ae763fb696c7c5f a1cc19db7252b335f4fb7f2fa9dab512ae7393f0 9a49d8fabd62c5252a1d3b88d1bd9051b1469958 bdb8cfda07e2d8597045c7661a279ddb40245fa3 db1ff757aa5d11299af5da8bc2a72332f2eb3e7c 2e4b3935ef828a2fb078b9e0ff10a193a9856d25 cd59bf77491452cfa5d95ac9d5a5475e93c2aaa9 a3a1a38f08ee48716c0854f92888951420ab6072 26b753c814b38a6cbde24453e38ecbdfd2c97c69 d6dea5fe84a02035c0f768b9593754eb514eb651 3d028e5eed0872283b26e51780c758996b07a682 7595b42e3cc78fd9cc3e87219ab986a4e1eaaf94 69c1f89d152fb4fe262d44709adefbf97af45d28 92442afbb42e321ebf01486e6861ad41f9df5c50 7104946526b76a171dfc037fbb0b326db0f71b83 f32db517 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [71:54:e7:7b:23:da:53:4f:7a:06:b6:63:e9:98:b4:9f:ab:ed:40:79] modulus: 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 public exponent: 10001 ] 2021-05-20 10:53:51.692 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-20 10:53:51.699 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-20 10:53:51.700 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-20 10:53:51.701 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-20 10:53:51.702 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-20 10:53:51.703 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-20 10:53:51.703 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-20 10:53:51.704 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-20 10:53:51.705 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-20 10:53:51.717 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-20 10:53:51.718 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-20 10:53:51.718 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-20 10:53:51.726 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-20 10:53:51.786 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-20 10:53:51.786 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-20 10:53:51.787 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-20 10:53:51.791 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-20 10:53:51.792 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1440 2021-05-20 10:53:51.793 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-20 10:53:51.796 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-20 10:53:51.797 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-20 10:53:51.797 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-20 10:53:51.798 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-20 10:53:51.798 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-20 10:53:51.799 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-20 10:53:51.800 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-20 10:53:51.801 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-20 10:53:51.802 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-20 10:53:51.802 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-20 10:53:51.804 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0hz5vr6rqh87vx3ry,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-20 10:53:51.810 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 143109056159089555162657172004451444157629518415 IssuerDN: UID=c-0hz5vr6rqh87vx3ry,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 20 10:48:42 UTC 2021 Final Date: Tue May 20 10:48:41 UTC 2031 SubjectDN: UID=c-0hz5vr6rqh87vx3ry,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:d0:23:b5:74:49:33:89:26:a9:6b:68:ad:e7:d2:6e:aa:3b:d9:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2b8768269ed8b8d2efb9df2a97039551c357fbc2 feca6aa1e9ccca350bd370b9f888c603dd28abad 4f68f5254afe0089da7da34191eb17e7c0a20600 93bb055bf09c0d1a20e0a897426b4463f5d83694 36617b6bfb9ee0fab3ab75771ae763fb696c7c5f a1cc19db7252b335f4fb7f2fa9dab512ae7393f0 9a49d8fabd62c5252a1d3b88d1bd9051b1469958 bdb8cfda07e2d8597045c7661a279ddb40245fa3 db1ff757aa5d11299af5da8bc2a72332f2eb3e7c 2e4b3935ef828a2fb078b9e0ff10a193a9856d25 cd59bf77491452cfa5d95ac9d5a5475e93c2aaa9 a3a1a38f08ee48716c0854f92888951420ab6072 26b753c814b38a6cbde24453e38ecbdfd2c97c69 d6dea5fe84a02035c0f768b9593754eb514eb651 3d028e5eed0872283b26e51780c758996b07a682 7595b42e3cc78fd9cc3e87219ab986a4e1eaaf94 69c1f89d152fb4fe262d44709adefbf97af45d28 92442afbb42e321ebf01486e6861ad41f9df5c50 7104946526b76a171dfc037fbb0b326db0f71b83 f32db517 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [94:d7:a1:f0:8c:83:12:db:ca:49:a4:86:bd:23:89:30:51:5d:86:8d] modulus: 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 public exponent: 10001 ] 2021-05-20 10:53:51.884 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-20 10:53:51.886 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-20 10:53:51.888 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-20 10:53:51.888 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-20 10:53:51.889 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-20 10:53:51.890 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-20 10:53:51.890 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-20 10:53:51.891 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-20 10:53:51.891 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-20 10:53:51.900 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-20 10:53:51.901 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-20 10:53:51.902 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-20 10:53:51.904 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-20 10:53:51.964 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-20 10:53:51.964 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-20 10:53:51.965 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-20 10:53:51.967 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-20 10:53:51.968 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1440 2021-05-20 10:53:51.969 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-20 10:53:51.972 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-20 10:53:51.973 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-20 10:53:51.973 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-20 10:53:51.974 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-20 10:53:51.975 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-20 10:53:51.976 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-20 10:53:51.976 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-20 10:53:51.977 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-20 10:53:51.977 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-20 10:53:51.978 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-20 10:53:51.979 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0hz5vr6rqh87vx3ry,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-20 10:53:51.986 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 143109056159089555162657172004451444157629518415 IssuerDN: UID=c-0hz5vr6rqh87vx3ry,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 20 10:48:42 UTC 2021 Final Date: Tue May 20 10:48:41 UTC 2031 SubjectDN: UID=c-0hz5vr6rqh87vx3ry,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:d0:23:b5:74:49:33:89:26:a9:6b:68:ad:e7:d2:6e:aa:3b:d9:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2b8768269ed8b8d2efb9df2a97039551c357fbc2 feca6aa1e9ccca350bd370b9f888c603dd28abad 4f68f5254afe0089da7da34191eb17e7c0a20600 93bb055bf09c0d1a20e0a897426b4463f5d83694 36617b6bfb9ee0fab3ab75771ae763fb696c7c5f a1cc19db7252b335f4fb7f2fa9dab512ae7393f0 9a49d8fabd62c5252a1d3b88d1bd9051b1469958 bdb8cfda07e2d8597045c7661a279ddb40245fa3 db1ff757aa5d11299af5da8bc2a72332f2eb3e7c 2e4b3935ef828a2fb078b9e0ff10a193a9856d25 cd59bf77491452cfa5d95ac9d5a5475e93c2aaa9 a3a1a38f08ee48716c0854f92888951420ab6072 26b753c814b38a6cbde24453e38ecbdfd2c97c69 d6dea5fe84a02035c0f768b9593754eb514eb651 3d028e5eed0872283b26e51780c758996b07a682 7595b42e3cc78fd9cc3e87219ab986a4e1eaaf94 69c1f89d152fb4fe262d44709adefbf97af45d28 92442afbb42e321ebf01486e6861ad41f9df5c50 7104946526b76a171dfc037fbb0b326db0f71b83 f32db517 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [93:93:f9:3c:ae:dc:80:a5:6b:d5:8b:75:12:c8:91:b8:86:45:f5:b6] modulus: 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 public exponent: 10001 ]