By type
2021-05-27 10:57:11,509 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-27 10:57:12,223 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-27 10:57:12.825 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-05-27 10:57:15.033 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-27 10:57:15.266 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-05-27 10:57:15.404 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-27 10:57:17.411 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 6.382 seconds (JVM running for 7.64) 2021-05-27 10:58:56.815 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-27 10:58:56.827 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-27 10:58:56.869 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-27 10:58:56.873 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-27 10:58:56.890 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-27 10:58:56.893 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-27 10:58:56.898 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-27 10:58:56.898 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-27 10:58:56.899 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-27 10:58:56.906 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-27 10:58:56.910 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-27 10:58:56.946 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-27 10:58:56.954 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-27 10:58:56.954 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-27 10:58:56.969 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-27 10:58:57.465 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-27 10:58:57.468 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-27 10:58:57.469 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-27 10:58:57.473 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-27 10:58:57.474 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1672 2021-05-27 10:58:57.475 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-27 10:58:57.478 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-27 10:58:57.479 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-27 10:58:57.485 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-27 10:58:57.485 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-27 10:58:57.486 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-27 10:58:57.487 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-27 10:58:57.487 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-27 10:58:57.513 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-27 10:58:57.513 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-27 10:58:57.514 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-27 10:58:57.520 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0wztb9hkp7ne8l82e,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-27 10:58:57.546 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120087692174092206055794157754265959318776228104 IssuerDN: UID=c-0wztb9hkp7ne8l82e,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 27 10:54:18 UTC 2021 Final Date: Tue May 27 10:54:17 UTC 2031 SubjectDN: UID=c-0wztb9hkp7ne8l82e,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [89:b9:d4:4a:ae:e5:f7:5d:df:83:d3:4d:f5:62:10:1f:d6:b2:a4:46] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 73f5553bb38dd1d510797aa998b61cc38696dc12 9322d6535edc58bc261b676798bc8f3fdd2ee7ba d3c908dd5a4572f3b6f952b1daecea07be299b66 10f6a61e95f16bb37ad81e5fdf02444e24b675d7 2d7c22d9b1d14846f32e66082b9a7dcf185b7ba6 14f27dbc34af524a3316341105fd49de2b14e474 e17bb594acc94e09658dc978913b70359d231363 a2949446d26599929baec726883b10f8add85d18 f9c046c1a757ae81916627c48e3313f49bfa94f0 620f7ce7904efe13ec730e9585125255f533585c 32f084c155af97c58cfb376118c88408a6bc5df6 92d45560bec85e581166d14eae660c9503edd0c9 61386dddaa1d8cebea4431bff795f08c879a972b 0aa54dc6ec39cec6f5c0acc0460a9f653c9e3230 24c854b2af61427f1b15f4fafc99516e2a673e67 040016ce95702009283fac9ede894c8e89d0be2b 3eda437e2e0bd7ec4dc4c4659298a70ec4e32f10 bf7b6e8fe75445ff2f2b4f2d1e3b002a64e99bbc 2a96b4ac40c4dc0ee2b0723ad64f3ff9c2b673ca 4fd052ac Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dd:e0:5e:b2:16:6a:67:40:25:75:9d:a8:6a:33:e1:35:51:76:2a:d8] modulus: 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 public exponent: 10001 ] 2021-05-27 10:58:57.640 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-27 10:58:57.643 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-27 10:58:57.644 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-27 10:58:57.645 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-27 10:58:57.646 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-05-27 10:58:57.647 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-27 10:58:57.648 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-27 10:58:57.648 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-27 10:58:57.649 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-27 10:58:57.656 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-27 10:58:57.657 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-27 10:58:57.657 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-27 10:58:57.660 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-27 10:58:57.801 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-27 10:58:57.802 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-27 10:58:57.802 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-27 10:58:57.806 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-27 10:58:57.807 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1672 2021-05-27 10:58:57.808 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-27 10:58:57.809 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-27 10:58:57.810 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-27 10:58:57.811 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-27 10:58:57.811 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-27 10:58:57.812 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-27 10:58:57.812 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-27 10:58:57.813 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-27 10:58:57.814 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-27 10:58:57.815 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-27 10:58:57.815 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-27 10:58:57.817 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0wztb9hkp7ne8l82e,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-27 10:58:57.821 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120087692174092206055794157754265959318776228104 IssuerDN: UID=c-0wztb9hkp7ne8l82e,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 27 10:54:18 UTC 2021 Final Date: Tue May 27 10:54:17 UTC 2031 SubjectDN: UID=c-0wztb9hkp7ne8l82e,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [89:b9:d4:4a:ae:e5:f7:5d:df:83:d3:4d:f5:62:10:1f:d6:b2:a4:46] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 73f5553bb38dd1d510797aa998b61cc38696dc12 9322d6535edc58bc261b676798bc8f3fdd2ee7ba d3c908dd5a4572f3b6f952b1daecea07be299b66 10f6a61e95f16bb37ad81e5fdf02444e24b675d7 2d7c22d9b1d14846f32e66082b9a7dcf185b7ba6 14f27dbc34af524a3316341105fd49de2b14e474 e17bb594acc94e09658dc978913b70359d231363 a2949446d26599929baec726883b10f8add85d18 f9c046c1a757ae81916627c48e3313f49bfa94f0 620f7ce7904efe13ec730e9585125255f533585c 32f084c155af97c58cfb376118c88408a6bc5df6 92d45560bec85e581166d14eae660c9503edd0c9 61386dddaa1d8cebea4431bff795f08c879a972b 0aa54dc6ec39cec6f5c0acc0460a9f653c9e3230 24c854b2af61427f1b15f4fafc99516e2a673e67 040016ce95702009283fac9ede894c8e89d0be2b 3eda437e2e0bd7ec4dc4c4659298a70ec4e32f10 bf7b6e8fe75445ff2f2b4f2d1e3b002a64e99bbc 2a96b4ac40c4dc0ee2b0723ad64f3ff9c2b673ca 4fd052ac Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [70:68:08:e6:ab:e6:02:14:61:f5:ad:80:ae:f5:83:f9:df:09:5f:5a] modulus: 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 public exponent: 10001 ] 2021-05-27 10:58:57.884 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-27 10:58:57.885 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-27 10:58:57.887 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-27 10:58:57.887 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-27 10:58:57.888 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-hv-ves-collector }, SANs: [dcae-hv-ves-collector, hv-ves-collector, hv-ves] } 2021-05-27 10:58:57.888 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-27 10:58:57.889 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-27 10:58:57.889 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-27 10:58:57.889 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-27 10:58:57.897 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-27 10:58:57.898 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-27 10:58:57.898 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-27 10:58:57.900 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-27 10:58:57.964 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-27 10:58:57.965 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-27 10:58:57.966 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-27 10:58:57.972 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-27 10:58:57.973 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1672 2021-05-27 10:58:57.974 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-27 10:58:57.976 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-27 10:58:57.976 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-27 10:58:57.977 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-27 10:58:57.977 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-27 10:58:57.978 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-27 10:58:57.979 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-27 10:58:57.979 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-27 10:58:57.980 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-27 10:58:57.982 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-27 10:58:57.985 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-27 10:58:57.986 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-hv-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0wztb9hkp7ne8l82e,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-27 10:58:57.990 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120087692174092206055794157754265959318776228104 IssuerDN: UID=c-0wztb9hkp7ne8l82e,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 27 10:54:18 UTC 2021 Final Date: Tue May 27 10:54:17 UTC 2031 SubjectDN: UID=c-0wztb9hkp7ne8l82e,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [89:b9:d4:4a:ae:e5:f7:5d:df:83:d3:4d:f5:62:10:1f:d6:b2:a4:46] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 73f5553bb38dd1d510797aa998b61cc38696dc12 9322d6535edc58bc261b676798bc8f3fdd2ee7ba d3c908dd5a4572f3b6f952b1daecea07be299b66 10f6a61e95f16bb37ad81e5fdf02444e24b675d7 2d7c22d9b1d14846f32e66082b9a7dcf185b7ba6 14f27dbc34af524a3316341105fd49de2b14e474 e17bb594acc94e09658dc978913b70359d231363 a2949446d26599929baec726883b10f8add85d18 f9c046c1a757ae81916627c48e3313f49bfa94f0 620f7ce7904efe13ec730e9585125255f533585c 32f084c155af97c58cfb376118c88408a6bc5df6 92d45560bec85e581166d14eae660c9503edd0c9 61386dddaa1d8cebea4431bff795f08c879a972b 0aa54dc6ec39cec6f5c0acc0460a9f653c9e3230 24c854b2af61427f1b15f4fafc99516e2a673e67 040016ce95702009283fac9ede894c8e89d0be2b 3eda437e2e0bd7ec4dc4c4659298a70ec4e32f10 bf7b6e8fe75445ff2f2b4f2d1e3b002a64e99bbc 2a96b4ac40c4dc0ee2b0723ad64f3ff9c2b673ca 4fd052ac Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:f1:88:8a:57:37:94:8d:98:4e:f1:71:4f:05:65:55:0b:ff:27:7e] modulus: b900f2eeed07a6f1e8f1aa80af247dd2e70264a0d7fc4e81c7e70befea0ac1e4e2aeb396725e3404262e3327054c2afef4f215ef5bbcf12dcad004528552a9b15f117f0e6011be9c9fee6e96cfafafd30ce0d3e6d2d6d87ced14fc87f5fd6140c8683045511225ffb4478dd401e53ca313d4da8750dcd38d3541dbece1a7a2923f30381986ce149b83de8fef5baa68e4c38fd676832dd849ddf27cc9af6e9fd47b2a962654a91ba5b64508f7ce2c537bee42ba386045dd997ba41623f3bc72e258bd359fce015981c65b274766d48c292f7438e7eddec3774c0317842c19bba086e0b213d89a5c50889de0aa55c6f5d8a0d7f3a17a8b20394b12f892025ceb57 public exponent: 10001 ]