By type
2021-04-05 01:48:29,245 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-04-05 01:48:32,851 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-04-05 01:48:35.356 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-04-05 01:48:46.063 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-04-05 01:48:47.264 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-04-05 01:48:48.052 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-04-05 01:49:00.950 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 33.684 seconds (JVM running for 40.368) 2021-04-05 01:59:03.657 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-04-05 01:59:03.741 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-04-05 01:59:03.778 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org ,SANs: [] } 2021-04-05 01:59:03.841 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-05 01:59:03.856 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org ,SANs: [] } 2021-04-05 01:59:03.944 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-05 01:59:03.948 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-04-05 01:59:03.949 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-04-05 01:59:03.949 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-04-05 01:59:03.956 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-04-05 01:59:03.962 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-04-05 01:59:04.159 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-04-05 01:59:04.165 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-04-05 01:59:04.166 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-04-05 01:59:04.257 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-04-05 01:59:05.647 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-04-05 01:59:05.650 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-04-05 01:59:05.656 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-04-05 01:59:05.657 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1848 2021-04-05 01:59:05.658 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-04-05 01:59:05.662 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-05 01:59:05.662 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-04-05 01:59:05.746 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-04-05 01:59:05.748 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-05 01:59:05.748 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-04-05 01:59:05.749 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-04-05 01:59:05.760 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-05 01:59:05.761 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-04-05 01:59:05.761 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-04-05 01:59:05.846 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0afe9819aeb2cb3ea,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-05 01:59:05.948 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 468445405441775543297537107495006993015199311053 IssuerDN: UID=c-0afe9819aeb2cb3ea,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 05 01:44:54 UTC 2021 Final Date: Sat Apr 05 01:44:54 UTC 2031 SubjectDN: UID=c-0afe9819aeb2cb3ea,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:ef:30:89:dc:f2:87:00:6d:9c:68:c1:58:12:e7:a6:bb:f6:d5:9d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1b2b65b378f17c04cd2b9b8ee02f723167dbd5ac 3f9c1f61e95056247011cb0f5fbf91b833f28be3 22e0402cea7115404fb188c22d8a45228efa519e 54138422cffc52f3840496e1d39fcd2e3819adf6 f51067370fbcb364dc9f53362446bdd8f0b7962c 011bbdf000c56f2214a00625772594a1279b651f c5acba1bebfb4d9312e80db6126b1945dbb21a05 9049d071c3b690a1678c7986c8ec8e7fcc57e8be e4de1621a1f448eb65201aca3db3b44e7ebc0178 93cf3bbf70c71182d6672a7eb102c437b4cbd191 ec726d4f35ac54740678b20cff9e53af9335178b 73154ef909a8027d87c5f17dccacbe27f33c61e4 7879f5c64e2c4549186ca1e8f0ef672d533cbdfb 3179cb33edd85ab6beb56645008b7889a676556e a105ed7069082a5116460c29b589aee3767e4fb8 745e081e5ab5b8c8b68dc334db11d44e5a538a29 63364316c0f42c8211b8e78500c939dcb5c298e4 83c48243dfd8d0dfed46160f60a42049c17b0e97 cacf9d3d8edba1334f0db7f4eeda9eec0a5bf2c7 3e06d7c6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:94:93:c8:b7:7f:9f:f9:05:dd:13:79:f8:6f:0b:97:43:1e:2e:db] modulus: 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 public exponent: 10001 ] 2021-04-05 02:40:36.473 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-04-05 02:40:36.475 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-04-05 02:40:36.479 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator ,SANs: [pnf-simulator] } 2021-04-05 02:40:36.541 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-05 02:40:36.543 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator ,SANs: [pnf-simulator] } 2021-04-05 02:40:36.544 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-05 02:40:36.545 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-04-05 02:40:36.546 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-04-05 02:40:36.546 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-04-05 02:40:36.557 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-04-05 02:40:36.558 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-04-05 02:40:36.558 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-04-05 02:40:36.642 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-04-05 02:40:36.990 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-04-05 02:40:36.991 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-04-05 02:40:36.994 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-04-05 02:40:36.994 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1848 2021-04-05 02:40:36.995 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-04-05 02:40:36.998 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-05 02:40:36.999 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-04-05 02:40:37.000 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-04-05 02:40:37.000 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-05 02:40:37.001 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-04-05 02:40:37.001 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-04-05 02:40:37.002 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-05 02:40:37.003 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-04-05 02:40:37.003 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-04-05 02:40:37.041 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0afe9819aeb2cb3ea,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-05 02:40:37.046 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 468445405441775543297537107495006993015199311053 IssuerDN: UID=c-0afe9819aeb2cb3ea,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 05 01:44:54 UTC 2021 Final Date: Sat Apr 05 01:44:54 UTC 2031 SubjectDN: UID=c-0afe9819aeb2cb3ea,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:ef:30:89:dc:f2:87:00:6d:9c:68:c1:58:12:e7:a6:bb:f6:d5:9d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1b2b65b378f17c04cd2b9b8ee02f723167dbd5ac 3f9c1f61e95056247011cb0f5fbf91b833f28be3 22e0402cea7115404fb188c22d8a45228efa519e 54138422cffc52f3840496e1d39fcd2e3819adf6 f51067370fbcb364dc9f53362446bdd8f0b7962c 011bbdf000c56f2214a00625772594a1279b651f c5acba1bebfb4d9312e80db6126b1945dbb21a05 9049d071c3b690a1678c7986c8ec8e7fcc57e8be e4de1621a1f448eb65201aca3db3b44e7ebc0178 93cf3bbf70c71182d6672a7eb102c437b4cbd191 ec726d4f35ac54740678b20cff9e53af9335178b 73154ef909a8027d87c5f17dccacbe27f33c61e4 7879f5c64e2c4549186ca1e8f0ef672d533cbdfb 3179cb33edd85ab6beb56645008b7889a676556e a105ed7069082a5116460c29b589aee3767e4fb8 745e081e5ab5b8c8b68dc334db11d44e5a538a29 63364316c0f42c8211b8e78500c939dcb5c298e4 83c48243dfd8d0dfed46160f60a42049c17b0e97 cacf9d3d8edba1334f0db7f4eeda9eec0a5bf2c7 3e06d7c6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e4:ff:e5:06:33:70:93:56:f2:31:11:25:76:70:6c:5f:d6:62:d0:26] modulus: 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 public exponent: 10001 ] 2021-04-05 02:43:16.826 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-04-05 02:43:16.827 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-04-05 02:43:16.829 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert ,SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-05 02:43:16.829 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-05 02:43:16.830 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert ,SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-05 02:43:16.830 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-05 02:43:16.831 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-04-05 02:43:16.831 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-04-05 02:43:16.832 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-04-05 02:43:16.844 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-04-05 02:43:16.845 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-04-05 02:43:16.845 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-04-05 02:43:16.849 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-04-05 02:43:16.967 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-04-05 02:43:16.968 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-04-05 02:43:16.969 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-04-05 02:43:16.970 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1848 2021-04-05 02:43:16.971 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-04-05 02:43:16.974 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-05 02:43:16.975 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-04-05 02:43:16.975 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-04-05 02:43:16.976 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-05 02:43:16.976 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-04-05 02:43:16.977 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-04-05 02:43:16.977 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-05 02:43:16.978 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-04-05 02:43:16.978 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-04-05 02:43:16.979 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0afe9819aeb2cb3ea,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-05 02:43:17.043 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 468445405441775543297537107495006993015199311053 IssuerDN: UID=c-0afe9819aeb2cb3ea,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 05 01:44:54 UTC 2021 Final Date: Sat Apr 05 01:44:54 UTC 2031 SubjectDN: UID=c-0afe9819aeb2cb3ea,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:ef:30:89:dc:f2:87:00:6d:9c:68:c1:58:12:e7:a6:bb:f6:d5:9d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1b2b65b378f17c04cd2b9b8ee02f723167dbd5ac 3f9c1f61e95056247011cb0f5fbf91b833f28be3 22e0402cea7115404fb188c22d8a45228efa519e 54138422cffc52f3840496e1d39fcd2e3819adf6 f51067370fbcb364dc9f53362446bdd8f0b7962c 011bbdf000c56f2214a00625772594a1279b651f c5acba1bebfb4d9312e80db6126b1945dbb21a05 9049d071c3b690a1678c7986c8ec8e7fcc57e8be e4de1621a1f448eb65201aca3db3b44e7ebc0178 93cf3bbf70c71182d6672a7eb102c437b4cbd191 ec726d4f35ac54740678b20cff9e53af9335178b 73154ef909a8027d87c5f17dccacbe27f33c61e4 7879f5c64e2c4549186ca1e8f0ef672d533cbdfb 3179cb33edd85ab6beb56645008b7889a676556e a105ed7069082a5116460c29b589aee3767e4fb8 745e081e5ab5b8c8b68dc334db11d44e5a538a29 63364316c0f42c8211b8e78500c939dcb5c298e4 83c48243dfd8d0dfed46160f60a42049c17b0e97 cacf9d3d8edba1334f0db7f4eeda9eec0a5bf2c7 3e06d7c6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:cd:8d:fa:5b:5f:37:1e:1a:de:30:3d:cc:30:ae:96:f0:42:b2:51] modulus: 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 public exponent: 10001 ] 2021-04-05 02:45:20.948 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-04-05 02:45:20.952 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-04-05 02:45:20.957 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans ,SANs: [wrong-sans] } 2021-04-05 02:45:20.958 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-05 02:45:20.959 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans ,SANs: [wrong-sans] } 2021-04-05 02:45:20.960 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-05 02:45:20.961 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-04-05 02:45:20.961 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-04-05 02:45:21.041 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-04-05 02:45:21.051 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-04-05 02:45:21.053 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-04-05 02:45:21.053 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-04-05 02:45:21.054 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-04-05 02:45:21.306 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-04-05 02:45:21.306 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-04-05 02:45:21.308 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-04-05 02:45:21.309 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1848 2021-04-05 02:45:21.309 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-04-05 02:45:21.310 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-05 02:45:21.311 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-04-05 02:45:21.311 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-04-05 02:45:21.312 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-05 02:45:21.312 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-04-05 02:45:21.313 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-04-05 02:45:21.313 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-05 02:45:21.314 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-04-05 02:45:21.314 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-04-05 02:45:21.315 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0afe9819aeb2cb3ea,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-05 02:45:21.318 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 468445405441775543297537107495006993015199311053 IssuerDN: UID=c-0afe9819aeb2cb3ea,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 05 01:44:54 UTC 2021 Final Date: Sat Apr 05 01:44:54 UTC 2031 SubjectDN: UID=c-0afe9819aeb2cb3ea,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:ef:30:89:dc:f2:87:00:6d:9c:68:c1:58:12:e7:a6:bb:f6:d5:9d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1b2b65b378f17c04cd2b9b8ee02f723167dbd5ac 3f9c1f61e95056247011cb0f5fbf91b833f28be3 22e0402cea7115404fb188c22d8a45228efa519e 54138422cffc52f3840496e1d39fcd2e3819adf6 f51067370fbcb364dc9f53362446bdd8f0b7962c 011bbdf000c56f2214a00625772594a1279b651f c5acba1bebfb4d9312e80db6126b1945dbb21a05 9049d071c3b690a1678c7986c8ec8e7fcc57e8be e4de1621a1f448eb65201aca3db3b44e7ebc0178 93cf3bbf70c71182d6672a7eb102c437b4cbd191 ec726d4f35ac54740678b20cff9e53af9335178b 73154ef909a8027d87c5f17dccacbe27f33c61e4 7879f5c64e2c4549186ca1e8f0ef672d533cbdfb 3179cb33edd85ab6beb56645008b7889a676556e a105ed7069082a5116460c29b589aee3767e4fb8 745e081e5ab5b8c8b68dc334db11d44e5a538a29 63364316c0f42c8211b8e78500c939dcb5c298e4 83c48243dfd8d0dfed46160f60a42049c17b0e97 cacf9d3d8edba1334f0db7f4eeda9eec0a5bf2c7 3e06d7c6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:ba:a5:a8:b0:1b:fd:68:68:b6:58:57:0a:d1:bc:b2:2d:e8:e4:1d] modulus: c9e0d8d711d560e8b353c1101812d30e6556c23fd019c8ebd3bf08d7788a2640674ec27e056fae8f3e5b3874d78c147cd353a184bf2ec908421569913e3016a886b99aef563681a2767cf95b1b433fcc51be54d3b849b03480a01fbaf1e11e65ca4886421af681309fe7657559667aa9ed144c85685ad96b0aa74727132e12d7426ecb5399dacfb0c0417f797c5c9a29497aa5e3e3b6330486ee82980835cd78ef2c850e1a7adbf9c696ffc0818e7ea5ede0291e65dd6d89dda5b0f02feabe737bce1ca06bc0c2bbbc57dc6214ee190ef33f42cf699d1c971fe9c99d531c74dc0eb50cda2dfc0e93f1c8f956b1366bdff20937ec4afb76388f37f1665887d433 public exponent: 10001 ]