By type
2021-05-21 22:49:53,235 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-21 22:49:54,002 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-21 22:49:54.644 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-05-21 22:49:57.103 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-21 22:49:57.371 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-05-21 22:49:57.556 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-21 22:49:59.853 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.083 seconds (JVM running for 8.69) 2021-05-21 22:50:59.443 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-21 22:50:59.457 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-21 22:50:59.500 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-21 22:50:59.525 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-21 22:50:59.732 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-21 22:50:59.736 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-21 22:50:59.741 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-21 22:50:59.742 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-21 22:50:59.742 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-21 22:50:59.750 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-21 22:50:59.754 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-21 22:50:59.792 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-21 22:50:59.797 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-21 22:50:59.798 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-21 22:50:59.891 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-21 22:51:00.585 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-21 22:51:00.591 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-21 22:51:00.592 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-21 22:51:00.603 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-21 22:51:00.605 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1152 2021-05-21 22:51:00.606 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-21 22:51:00.612 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-21 22:51:00.613 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-21 22:51:00.629 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-21 22:51:00.640 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-21 22:51:00.644 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-21 22:51:00.645 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-21 22:51:00.646 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-21 22:51:00.664 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-21 22:51:00.665 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-21 22:51:00.666 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-21 22:51:00.675 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0yr4ua2t6ddn0qlpe,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-21 22:51:00.720 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 96435550773946713204393816623440535703282147043 IssuerDN: UID=c-0yr4ua2t6ddn0qlpe,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 21 22:46:34 UTC 2021 Final Date: Wed May 21 22:46:33 UTC 2031 SubjectDN: UID=c-0yr4ua2t6ddn0qlpe,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:27:ee:f6:f0:de:6b:27:a7:eb:84:4c:04:d9:27:e1:19:4a:01:37] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18faa3f188d0fcedd043da9648c4bf5bfa874bd5 427fd397a752c56fe563101f1f8fb068637396c0 ddbe7a618a937aba9f37d3815cbc173c9b490589 2760ceab4853d059201f0818904b5de142471cc8 02e56d3b3918c4f5d0af9bcfd7a45edc7f377c16 5adb540be11216799eb716da34f41fb61c9d6fc0 473da561dd623e0873e0d00b4f6aeebd7f583752 fd2e9129c9440c59058281fc6b9de9df1510bb99 47c71af2c7dfab5d3be6395a1dd94d2da5795d7a 719a1cad0a9b0b9d8fbd3556777dc54b8a37f2bd e4616db72c0bc136b0189a4f166330f95a1c481e 0915be69a2f2c5781889ac4cb6c842e30b904fa8 53b04a56b854c0704e66260d5ff1b5a2f2f77d76 50e339fc81697e2d4cc23dcdd45e136c86a4ef30 d7209ad02246e28c0db2e1533a5401203a0ecbf8 b1da009f453f99f9883dde42f7b33d5d993ebc2b 4a0c2169db6b63384ab7961929418d9b18a744cb 17980920babc04efaaaf0bd85754235503eec97e 29465f188ca78ccbbafd2e7654a28ed246587783 5ea0650b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8d:38:71:e4:f9:ce:c6:37:07:72:01:5e:82:2e:7f:17:78:83:29:90] modulus: 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 public exponent: 10001 ] 2021-05-21 22:51:00.909 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-21 22:51:00.911 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-21 22:51:00.913 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-21 22:51:00.914 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-21 22:51:00.916 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-21 22:51:00.920 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-21 22:51:00.921 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-21 22:51:00.929 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-21 22:51:00.939 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-21 22:51:00.951 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-21 22:51:00.952 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-21 22:51:00.953 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-21 22:51:00.955 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-21 22:51:01.014 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-21 22:51:01.015 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-21 22:51:01.016 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-21 22:51:01.027 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-21 22:51:01.029 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1152 2021-05-21 22:51:01.030 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-21 22:51:01.031 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-21 22:51:01.031 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-21 22:51:01.039 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-21 22:51:01.040 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-21 22:51:01.040 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-21 22:51:01.041 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-21 22:51:01.041 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-21 22:51:01.045 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-21 22:51:01.045 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-21 22:51:01.045 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-21 22:51:01.047 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0yr4ua2t6ddn0qlpe,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-21 22:51:01.051 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 96435550773946713204393816623440535703282147043 IssuerDN: UID=c-0yr4ua2t6ddn0qlpe,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 21 22:46:34 UTC 2021 Final Date: Wed May 21 22:46:33 UTC 2031 SubjectDN: UID=c-0yr4ua2t6ddn0qlpe,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:27:ee:f6:f0:de:6b:27:a7:eb:84:4c:04:d9:27:e1:19:4a:01:37] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18faa3f188d0fcedd043da9648c4bf5bfa874bd5 427fd397a752c56fe563101f1f8fb068637396c0 ddbe7a618a937aba9f37d3815cbc173c9b490589 2760ceab4853d059201f0818904b5de142471cc8 02e56d3b3918c4f5d0af9bcfd7a45edc7f377c16 5adb540be11216799eb716da34f41fb61c9d6fc0 473da561dd623e0873e0d00b4f6aeebd7f583752 fd2e9129c9440c59058281fc6b9de9df1510bb99 47c71af2c7dfab5d3be6395a1dd94d2da5795d7a 719a1cad0a9b0b9d8fbd3556777dc54b8a37f2bd e4616db72c0bc136b0189a4f166330f95a1c481e 0915be69a2f2c5781889ac4cb6c842e30b904fa8 53b04a56b854c0704e66260d5ff1b5a2f2f77d76 50e339fc81697e2d4cc23dcdd45e136c86a4ef30 d7209ad02246e28c0db2e1533a5401203a0ecbf8 b1da009f453f99f9883dde42f7b33d5d993ebc2b 4a0c2169db6b63384ab7961929418d9b18a744cb 17980920babc04efaaaf0bd85754235503eec97e 29465f188ca78ccbbafd2e7654a28ed246587783 5ea0650b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [87:fd:0e:40:7a:d6:70:ae:25:d4:da:4a:37:b8:ec:9a:81:e6:7a:aa] modulus: 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 public exponent: 10001 ] 2021-05-21 22:51:01.156 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-21 22:51:01.157 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-21 22:51:01.160 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-21 22:51:01.161 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-21 22:51:01.161 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-21 22:51:01.165 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-21 22:51:01.166 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-21 22:51:01.167 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-21 22:51:01.167 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-21 22:51:01.178 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-21 22:51:01.179 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-21 22:51:01.180 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-21 22:51:01.181 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-21 22:51:01.238 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-21 22:51:01.239 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-21 22:51:01.240 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-21 22:51:01.251 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-21 22:51:01.253 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1152 2021-05-21 22:51:01.253 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-21 22:51:01.254 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-21 22:51:01.255 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-21 22:51:01.255 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-21 22:51:01.256 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-21 22:51:01.256 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-21 22:51:01.257 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-21 22:51:01.257 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-21 22:51:01.258 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-21 22:51:01.258 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-21 22:51:01.258 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-21 22:51:01.259 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-hv-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0yr4ua2t6ddn0qlpe,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-21 22:51:01.262 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 96435550773946713204393816623440535703282147043 IssuerDN: UID=c-0yr4ua2t6ddn0qlpe,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 21 22:46:34 UTC 2021 Final Date: Wed May 21 22:46:33 UTC 2031 SubjectDN: UID=c-0yr4ua2t6ddn0qlpe,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:27:ee:f6:f0:de:6b:27:a7:eb:84:4c:04:d9:27:e1:19:4a:01:37] modulus: d6d6434064c0b197c81cd34589638b3059c683f2019f5a663802199d8d02952154b938e187b0cfefb019dc29565e1d0c2f85862248924069fe6e9ee043243145e9806ed2709819b911aa6b2f79d78635aba4a99f11723e85fba4fcc0aea6f4d55994b8f17338b300e230582579786afc155d7ff575e4c0ce22ecad670af1ebab5483700b491bbab5b8cd5c415c5cce58d198ef684d183d2a5b649b554d51ecb8a56db275cb6db5b98422c3880c6178af21705204f663b7311c8d4d05a20230ebfb63b0ddc02a09aed48054bb721142438ab8302b250052f667f42d8b21853a965b5a8c78b0cbd3f4a5751783136cc68b53f9670c5176c37399e25a45c72f5a4998a2e6c6b5c92ea1a5da2e55ca77fc9fb549acdefc469c48e037df9865a324237d8d8853d0bed08ddea06520f8a4d939dfc8d609b9ef6725e650ff2a2666fa1bfb77c680e4d3beef90c565dc63ff88e16b92b609e02baf116b79b2b7a9dc9d6f4b1f0a2815c7dc843f8d58b74c708b68ed9adcf4fb50ae4d7941a58fda6cde95 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18faa3f188d0fcedd043da9648c4bf5bfa874bd5 427fd397a752c56fe563101f1f8fb068637396c0 ddbe7a618a937aba9f37d3815cbc173c9b490589 2760ceab4853d059201f0818904b5de142471cc8 02e56d3b3918c4f5d0af9bcfd7a45edc7f377c16 5adb540be11216799eb716da34f41fb61c9d6fc0 473da561dd623e0873e0d00b4f6aeebd7f583752 fd2e9129c9440c59058281fc6b9de9df1510bb99 47c71af2c7dfab5d3be6395a1dd94d2da5795d7a 719a1cad0a9b0b9d8fbd3556777dc54b8a37f2bd e4616db72c0bc136b0189a4f166330f95a1c481e 0915be69a2f2c5781889ac4cb6c842e30b904fa8 53b04a56b854c0704e66260d5ff1b5a2f2f77d76 50e339fc81697e2d4cc23dcdd45e136c86a4ef30 d7209ad02246e28c0db2e1533a5401203a0ecbf8 b1da009f453f99f9883dde42f7b33d5d993ebc2b 4a0c2169db6b63384ab7961929418d9b18a744cb 17980920babc04efaaaf0bd85754235503eec97e 29465f188ca78ccbbafd2e7654a28ed246587783 5ea0650b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [00:d4:30:d6:68:9d:3b:78:b5:b1:1a:e4:cd:07:bf:a1:0e:a9:df:65] modulus: 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 public exponent: 10001 ]