By type
2021-05-24 07:43:15,673 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-24 07:43:16,356 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-24 07:43:16.872 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-05-24 07:43:19.075 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-24 07:43:19.284 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-05-24 07:43:19.409 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-24 07:43:21.241 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 6.017 seconds (JVM running for 7.519) 2021-05-24 07:44:09.523 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-24 07:44:09.530 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-24 07:44:09.562 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-24 07:44:09.565 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-24 07:44:09.577 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-24 07:44:09.580 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-24 07:44:09.584 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-24 07:44:09.585 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-24 07:44:09.585 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-24 07:44:09.591 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-24 07:44:09.594 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-24 07:44:09.627 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-24 07:44:09.631 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-24 07:44:09.631 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-24 07:44:09.643 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-24 07:44:10.183 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-24 07:44:10.186 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-24 07:44:10.186 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-24 07:44:10.191 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-24 07:44:10.192 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1865 2021-05-24 07:44:10.192 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-24 07:44:10.197 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-24 07:44:10.197 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-24 07:44:10.203 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-24 07:44:10.204 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-24 07:44:10.205 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-24 07:44:10.205 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-24 07:44:10.206 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-24 07:44:10.215 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-24 07:44:10.216 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-24 07:44:10.216 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-24 07:44:10.222 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-hv-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jbfdqgqk3skn2xzu,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-24 07:44:10.245 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 647601569762850197916878790509846600396403566259 IssuerDN: UID=c-0jbfdqgqk3skn2xzu,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 24 07:40:11 UTC 2021 Final Date: Sat May 24 07:40:10 UTC 2031 SubjectDN: UID=c-0jbfdqgqk3skn2xzu,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:e4:44:3c:97:33:d1:1d:81:70:35:dd:37:1f:24:a5:ee:bb:2f:5b] modulus: e93ddf856039f378721561c25e5fc9934cb93f92058d67bb71b8a23bc81ff03353b20e4841b7ad18b6757b29bf60c1fb7121de591b7d66c2cba834d4af95ac818789513aa2136610235d0544dc7c725c424be455088617e4f346f63a573ec11653c2f5de349ecb6735d064a6bce2298ad580994f0850879f8343b21931515b8da34f20185ea1f1a28168536c5b661327d28e767c35f64e938f78ac34e99ec893c6f0f20cd96b7103171f8c4b9fb62ef83a032a53e9f09b1035ce5f03b79a0ac94a4eb66cdd8aea961b06ba148ff4a6577774dbac5374bf00f92a0d8f089f684863f6df2e118eb4574ecb183fa3307bee8149a6775b0c2b46b34193d1b569a67b9eb3363f89be47dd1b08a1e30ba5148ee03f86189b38cd9eeee5c1dda8f4cab3f40dc79ef8403881fd30ddbd9cd32789db37e9dbdb7d1f04db38950851207965539248ef09ee26eb90101f44b2208c0600072c047560d35c09cb83db801e5f1478d2d4eca5b50b66dce00e6c98b845b5887427c9372488b5a432499fcfede4c9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a3cc01ec772b3b2b8938a46df4ca4218be515d3 52ce9c0e25bd24801706611814bb4f00fa4c2055 c3b50fdc52e7f405043dbb51ddad9b43827d82a3 a3b576d7f4e2af70966b85f5ac5e6b2a2ae5f0c1 d6ab9283683bd34e1002bb9a606960bca0677567 474a2d4463a56ca5e82706f5c12b57ed5de0a710 9ab125a982317a9b386b6e95707bcaa711031c0e 38cbdadc7c1d1e69492c38bb0d0f30868c56b187 baad84deb9e05a7b72e9f1b9348cf1eaff13f169 9b9ddb3c782cd12af4e43949e72128dddf546d3d a61840ccbb1951247b1696ef569300d90f22859c 6ffaf3334d20c084e63b246aec1c3d88f8776df1 d2f1808be020575247d05b297bab2df9dff9c830 27c3087c62c5605a641b1f92d80bdf6231e56454 f2e416d7144866642a2500dc7552f7077febf97f 407b76066865106aa2a616b637803ebea1fb8914 3c85978d079c5f1925150123d11ed073cb3a86a7 7fa87c585206a677ef23af9aa7f1fb9ffb868832 e3d6bd05d2d6e6ea316d71ceeef4db6073896a09 1d4475d5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:e2:a6:f5:97:c8:40:9a:c8:ac:41:e1:93:a8:bd:1e:c7:9e:3e:96] modulus: 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 public exponent: 10001 ] 2021-05-24 07:44:10.607 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-24 07:44:10.608 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-24 07:44:10.615 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-24 07:44:10.618 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-24 07:44:10.619 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-24 07:44:10.620 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-24 07:44:10.621 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-24 07:44:10.622 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-24 07:44:10.623 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-24 07:44:10.634 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-24 07:44:10.635 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-24 07:44:10.636 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-24 07:44:10.639 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-24 07:44:10.716 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-24 07:44:10.717 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-24 07:44:10.717 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-24 07:44:10.726 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-24 07:44:10.727 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1865 2021-05-24 07:44:10.728 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-24 07:44:10.731 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-24 07:44:10.732 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-24 07:44:10.732 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-24 07:44:10.733 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-24 07:44:10.733 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-24 07:44:10.734 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-24 07:44:10.734 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-24 07:44:10.741 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-24 07:44:10.742 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-24 07:44:10.742 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-24 07:44:10.745 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jbfdqgqk3skn2xzu,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-24 07:44:10.751 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 647601569762850197916878790509846600396403566259 IssuerDN: UID=c-0jbfdqgqk3skn2xzu,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 24 07:40:11 UTC 2021 Final Date: Sat May 24 07:40:10 UTC 2031 SubjectDN: UID=c-0jbfdqgqk3skn2xzu,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:e4:44:3c:97:33:d1:1d:81:70:35:dd:37:1f:24:a5:ee:bb:2f:5b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a3cc01ec772b3b2b8938a46df4ca4218be515d3 52ce9c0e25bd24801706611814bb4f00fa4c2055 c3b50fdc52e7f405043dbb51ddad9b43827d82a3 a3b576d7f4e2af70966b85f5ac5e6b2a2ae5f0c1 d6ab9283683bd34e1002bb9a606960bca0677567 474a2d4463a56ca5e82706f5c12b57ed5de0a710 9ab125a982317a9b386b6e95707bcaa711031c0e 38cbdadc7c1d1e69492c38bb0d0f30868c56b187 baad84deb9e05a7b72e9f1b9348cf1eaff13f169 9b9ddb3c782cd12af4e43949e72128dddf546d3d a61840ccbb1951247b1696ef569300d90f22859c 6ffaf3334d20c084e63b246aec1c3d88f8776df1 d2f1808be020575247d05b297bab2df9dff9c830 27c3087c62c5605a641b1f92d80bdf6231e56454 f2e416d7144866642a2500dc7552f7077febf97f 407b76066865106aa2a616b637803ebea1fb8914 3c85978d079c5f1925150123d11ed073cb3a86a7 7fa87c585206a677ef23af9aa7f1fb9ffb868832 e3d6bd05d2d6e6ea316d71ceeef4db6073896a09 1d4475d5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [83:72:8d:8b:46:6b:8a:88:c2:a4:73:db:48:c4:92:f1:ac:51:92:bb] modulus: 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 public exponent: 10001 ] 2021-05-24 07:44:10.837 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-24 07:44:10.839 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-24 07:44:10.840 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-24 07:44:10.844 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-24 07:44:10.844 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-24 07:44:10.846 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-24 07:44:10.848 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-24 07:44:10.848 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-24 07:44:10.849 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-24 07:44:10.863 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-24 07:44:10.864 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-24 07:44:10.865 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-24 07:44:10.868 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-24 07:44:10.948 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-24 07:44:10.949 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-24 07:44:10.949 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-24 07:44:10.951 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-24 07:44:10.952 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1865 2021-05-24 07:44:10.952 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-24 07:44:10.955 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-24 07:44:10.956 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-24 07:44:10.957 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-24 07:44:10.957 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-24 07:44:10.958 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-24 07:44:10.958 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-24 07:44:10.959 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-24 07:44:10.959 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-24 07:44:10.960 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-24 07:44:10.960 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-24 07:44:10.961 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jbfdqgqk3skn2xzu,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-24 07:44:10.964 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 647601569762850197916878790509846600396403566259 IssuerDN: UID=c-0jbfdqgqk3skn2xzu,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 24 07:40:11 UTC 2021 Final Date: Sat May 24 07:40:10 UTC 2031 SubjectDN: UID=c-0jbfdqgqk3skn2xzu,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:e4:44:3c:97:33:d1:1d:81:70:35:dd:37:1f:24:a5:ee:bb:2f:5b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a3cc01ec772b3b2b8938a46df4ca4218be515d3 52ce9c0e25bd24801706611814bb4f00fa4c2055 c3b50fdc52e7f405043dbb51ddad9b43827d82a3 a3b576d7f4e2af70966b85f5ac5e6b2a2ae5f0c1 d6ab9283683bd34e1002bb9a606960bca0677567 474a2d4463a56ca5e82706f5c12b57ed5de0a710 9ab125a982317a9b386b6e95707bcaa711031c0e 38cbdadc7c1d1e69492c38bb0d0f30868c56b187 baad84deb9e05a7b72e9f1b9348cf1eaff13f169 9b9ddb3c782cd12af4e43949e72128dddf546d3d a61840ccbb1951247b1696ef569300d90f22859c 6ffaf3334d20c084e63b246aec1c3d88f8776df1 d2f1808be020575247d05b297bab2df9dff9c830 27c3087c62c5605a641b1f92d80bdf6231e56454 f2e416d7144866642a2500dc7552f7077febf97f 407b76066865106aa2a616b637803ebea1fb8914 3c85978d079c5f1925150123d11ed073cb3a86a7 7fa87c585206a677ef23af9aa7f1fb9ffb868832 e3d6bd05d2d6e6ea316d71ceeef4db6073896a09 1d4475d5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8d:b8:73:87:62:c4:d4:53:fd:77:af:89:d6:ef:47:78:9b:9a:21:b3] modulus: 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 public exponent: 10001 ]