Results

By type

          2022-01-15 02:56:37,411 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-01-15 02:56:40,915 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2022-01-15 02:56:43.420  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2022-01-15 02:56:55.626 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-01-15 02:56:56.834  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-01-15 02:56:57.326  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-01-15 02:57:07.625  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 32.011 seconds (JVM running for 38.258)
2022-01-15 03:01:03.238  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-01-15 03:01:03.317 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-01-15 03:01:03.435 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-01-15 03:01:03.438 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-01-15 03:01:03.520  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-01-15 03:01:03.524  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-01-15 03:01:03.524  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-01-15 03:01:03.526 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-01-15 03:01:03.527 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-15 03:01:03.610 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-01-15 03:01:03.617 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-01-15 03:01:03.620 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-01-15 03:01:03.732 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-01-15 03:01:03.736 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-15 03:01:03.736 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-15 03:01:03.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-15 03:01:05.022  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-01-15 03:01:05.026  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-01-15 03:01:05.110 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-01-15 03:01:05.113 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-15 03:01:05.122  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-01-15 03:01:05.123  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-01-15 03:01:05.124 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 03:01:05.124 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 03:01:05.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 03:01:05.209 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 03:01:05.210 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 03:01:05.210 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 03:01:05.218 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 03:01:05.218 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 03:01:05.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 03:01:05.221 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-01-15 03:01:05.324 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203487876945264968802104854975824454210455655535
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 15 02:52:07 UTC 2022
           Final Date: Thu Jan 15 02:52:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:06:33:81:3f:35:07:07:48:d9:c3:77:55:48:fd:d9:26:49:7a:36]
            modulus: 8ccd8178543047b4a89216de0fc9a7211ddc39eebdca65b435ee8875fbf869e2d97ede94e2e562a1e30bede28454ea90b549ebabd8d107c430bef8247729212395d5dadc3f9f0e54cc994daf21519681125b5d77389c3b9dc9c2bd289b8846decf653787a069a177be317e0c5c07d7d43eba15677c237ab46c9f0f892f9a1e342a59d53a9ece20d65713a90f36f5dabe8dafe6336e0af05cb7a7e108d0a7675553d23e10ff20ae7ff43867bcbaa0572af6a57537300602a2ffd319c032b4bc207e98c0d4f90adaeae022aa6aa8f60f109003e6464c3600dcc7d865b1bf742c3cb0c822783cea1fadd71c0729b67b945163ddaf7ae604c0750376cc196689e97aa162c8379545d0addb67bea57897d807624b2ad27042b3c83d00b2007127b2b411006bc4a9f9631193b7cd32f17d85a50d0d0823b545a18b1b16f3f3bec6ccd3d89539ff586a52aec7f0cdfd44c416617bd172e593ff32aa5afc4fcb480b7d1e89e26dbf01e441ca26341f4002e38c042f628995e30c27754411ae85fc43c531
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d47adf9ebf3bd9a90e172e8d85b0650b8ac976e
                       f2c68fbbe066b9cb6fa4604d818e43d86c7b6d05
                       231c9e582f1132bd9f124431db95297a5a888771
                       7401f6b350e47d72bfa718550a4cfd1549759cd1
                       2ec75373e797434c7b82c87872648c4e42f09d20
                       9fba2949bffe587ca2bb60561ed77707c53e5b8b
                       b9987f092ccd11686b93e69ddf93b1265309126c
                       4295f4a2838530c7e1befe12d9ba877e039b0add
                       f949dcecde54a8a5db487edf46dea79ddde65b9d
                       ce2769d20559cf2362742e12e3d997a5cd3f7782
                       5fd28cebfca5e1f915d63e69e2ff4399a18ef053
                       bf9dca13b127f5e7b21ae0109e054722784e366c
                       8da01d09a9733df1b05152a59b1bb358a3638848
                       890e40bf8ebefed03f4f4e3d89e28572bbe84d2c
                       ca37d08ef432d6fe9293998a78e59622289d4b21
                       5f92f990c773be03222c6d6a1be3420f317d1558
                       ef1f7efab0e75df37f41858e4401f8502aa693a4
                       db3fd2f58885a0b2f70c918c3c19c75eeaab0961
                       96e4ac8cfd357de2dd97a1049859620e3d1522f2
                       ace2023c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [de:27:ed:a5:02:fe:5a:00:9a:48:99:97:73:52:f2:23:0d:8e:35:24]
            modulus: e8d39694327c51e5227b29c1bde1c4f1f164d8566e94e8cb8a81d967488d3c783ad6359fc53a7cf092ab4637ead0a2442bb42c4d43afc294c6f56b746a269ae8d97ebd30872db2b50413661cd97ae7f0ff8a3cb8ac63d5e47e64fda5bf72c8b5035c87fc05841d504f719e34a6ed67c4363082aeeae529c841038a3c3eeced2fbd2b67953e4d7d5fb2498d5ba3a6ae07caf9b668e0651fd46ae07fb1ecec9fc7bdb3902fce023cb456d438a04f3b2be17b4828777f0ac25c523c28d7f5d40b8fada44d7f822d5778f3827cc78e684a05642c74d8c7313f8facfd3b8e077bb136702da234663fed986c7c1b94c8cb1a17f4bf633737efabf6c0f31b0eec9bff53
    public exponent: 10001

] 
2022-01-15 04:56:58.279  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-01-15 04:56:58.280 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-01-15 04:56:58.309 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-15 04:56:58.313 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-01-15 04:56:58.315  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-15 04:56:58.316  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-01-15 04:56:58.317  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-01-15 04:56:58.317 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-01-15 04:56:58.318 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-01-15 04:56:58.321 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-01-15 04:56:58.417 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-01-15 04:56:58.419 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-15 04:56:58.419 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-15 04:56:58.419 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-15 04:56:58.610  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-01-15 04:56:58.611  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-01-15 04:56:58.611 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-01-15 04:56:58.612 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-15 04:56:58.615  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-01-15 04:56:58.615  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-01-15 04:56:58.616 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 04:56:58.616 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 04:56:58.617 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 04:56:58.619 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 04:56:58.619 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 04:56:58.619 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 04:56:58.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 04:56:58.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 04:56:58.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 04:56:58.622 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-01-15 04:56:58.711 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203487876945264968802104854975824454210455655535
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 15 02:52:07 UTC 2022
           Final Date: Thu Jan 15 02:52:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:06:33:81:3f:35:07:07:48:d9:c3:77:55:48:fd:d9:26:49:7a:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d47adf9ebf3bd9a90e172e8d85b0650b8ac976e
                       f2c68fbbe066b9cb6fa4604d818e43d86c7b6d05
                       231c9e582f1132bd9f124431db95297a5a888771
                       7401f6b350e47d72bfa718550a4cfd1549759cd1
                       2ec75373e797434c7b82c87872648c4e42f09d20
                       9fba2949bffe587ca2bb60561ed77707c53e5b8b
                       b9987f092ccd11686b93e69ddf93b1265309126c
                       4295f4a2838530c7e1befe12d9ba877e039b0add
                       f949dcecde54a8a5db487edf46dea79ddde65b9d
                       ce2769d20559cf2362742e12e3d997a5cd3f7782
                       5fd28cebfca5e1f915d63e69e2ff4399a18ef053
                       bf9dca13b127f5e7b21ae0109e054722784e366c
                       8da01d09a9733df1b05152a59b1bb358a3638848
                       890e40bf8ebefed03f4f4e3d89e28572bbe84d2c
                       ca37d08ef432d6fe9293998a78e59622289d4b21
                       5f92f990c773be03222c6d6a1be3420f317d1558
                       ef1f7efab0e75df37f41858e4401f8502aa693a4
                       db3fd2f58885a0b2f70c918c3c19c75eeaab0961
                       96e4ac8cfd357de2dd97a1049859620e3d1522f2
                       ace2023c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a4:ec:4b:37:89:96:db:97:12:01:a9:1b:24:4e:61:36:98:56:0e:b9]
            modulus: d795877aba2e223dbb15fe09229ebdf6261a6df0d6571765bb6099003c401f6590dff517dc5bcab86560b8e158c155ea0aa45231bbad182c732e16315caf2e6fd19325bf9a5256e8d9b4806ec33f3922cc642e881ae7583a2245051877cfbf2565fa227f6a7570220998a555be3fd6cff0d052ee70123056f34f68b3f60aa07f0f654e78083d9c47f8e93f4808defe299e124c1e33df83839b92b4381648728bca859cdda64879c05e2ca908f772710ca6daacc4d9013054f5a1d8cc33a0465a3b7867851d2b683437c7c09f5786ea75bf2d7dd320827e86cc172db69bf1a045671c46f1611573ca5158e6660f77451395787644ccc785299f99d9d8a8e405dd
    public exponent: 10001

] 
2022-01-15 05:06:58.893  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-01-15 05:06:58.894 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-01-15 05:06:58.895 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-15 05:06:58.896 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-01-15 05:06:58.897  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-15 05:06:58.898  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-01-15 05:06:58.898  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-01-15 05:06:58.899 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-01-15 05:06:58.899 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-01-15 05:06:58.900 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-01-15 05:06:58.907 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-01-15 05:06:58.907 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-15 05:06:58.908 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-15 05:06:58.908 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-15 05:06:59.045  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-01-15 05:06:59.109  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-01-15 05:06:59.110 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-01-15 05:06:59.110 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-15 05:06:59.112  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-01-15 05:06:59.113  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-01-15 05:06:59.113 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 05:06:59.114 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 05:06:59.114 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 05:06:59.115 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 05:06:59.115 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 05:06:59.115 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 05:06:59.116 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 05:06:59.117 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 05:06:59.117 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 05:06:59.118 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-01-15 05:06:59.121 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203487876945264968802104854975824454210455655535
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 15 02:52:07 UTC 2022
           Final Date: Thu Jan 15 02:52:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:06:33:81:3f:35:07:07:48:d9:c3:77:55:48:fd:d9:26:49:7a:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d47adf9ebf3bd9a90e172e8d85b0650b8ac976e
                       f2c68fbbe066b9cb6fa4604d818e43d86c7b6d05
                       231c9e582f1132bd9f124431db95297a5a888771
                       7401f6b350e47d72bfa718550a4cfd1549759cd1
                       2ec75373e797434c7b82c87872648c4e42f09d20
                       9fba2949bffe587ca2bb60561ed77707c53e5b8b
                       b9987f092ccd11686b93e69ddf93b1265309126c
                       4295f4a2838530c7e1befe12d9ba877e039b0add
                       f949dcecde54a8a5db487edf46dea79ddde65b9d
                       ce2769d20559cf2362742e12e3d997a5cd3f7782
                       5fd28cebfca5e1f915d63e69e2ff4399a18ef053
                       bf9dca13b127f5e7b21ae0109e054722784e366c
                       8da01d09a9733df1b05152a59b1bb358a3638848
                       890e40bf8ebefed03f4f4e3d89e28572bbe84d2c
                       ca37d08ef432d6fe9293998a78e59622289d4b21
                       5f92f990c773be03222c6d6a1be3420f317d1558
                       ef1f7efab0e75df37f41858e4401f8502aa693a4
                       db3fd2f58885a0b2f70c918c3c19c75eeaab0961
                       96e4ac8cfd357de2dd97a1049859620e3d1522f2
                       ace2023c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b6:94:6a:a0:d9:d4:d0:7c:97:99:2d:04:88:02:05:cb:8e:3b:f4:93]
            modulus: 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
    public exponent: 10001

] 
2022-01-15 05:06:59.803  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-01-15 05:06:59.804 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-01-15 05:06:59.805 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-15 05:06:59.806 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-01-15 05:06:59.806  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-15 05:06:59.807  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-01-15 05:06:59.807  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-01-15 05:06:59.808 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-01-15 05:06:59.808 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-01-15 05:06:59.808 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-01-15 05:06:59.816 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-01-15 05:06:59.816 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-15 05:06:59.816 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-15 05:06:59.817 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-15 05:06:59.884  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-01-15 05:06:59.884  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-01-15 05:06:59.885 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-01-15 05:06:59.885 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-15 05:06:59.910  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-01-15 05:06:59.911  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-01-15 05:06:59.911 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 05:06:59.912 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 05:06:59.912 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 05:06:59.913 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 05:06:59.913 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 05:06:59.913 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 05:06:59.914 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 05:06:59.914 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 05:06:59.914 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 05:06:59.915 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-01-15 05:06:59.918 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203487876945264968802104854975824454210455655535
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 15 02:52:07 UTC 2022
           Final Date: Thu Jan 15 02:52:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:06:33:81:3f:35:07:07:48:d9:c3:77:55:48:fd:d9:26:49:7a:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d47adf9ebf3bd9a90e172e8d85b0650b8ac976e
                       f2c68fbbe066b9cb6fa4604d818e43d86c7b6d05
                       231c9e582f1132bd9f124431db95297a5a888771
                       7401f6b350e47d72bfa718550a4cfd1549759cd1
                       2ec75373e797434c7b82c87872648c4e42f09d20
                       9fba2949bffe587ca2bb60561ed77707c53e5b8b
                       b9987f092ccd11686b93e69ddf93b1265309126c
                       4295f4a2838530c7e1befe12d9ba877e039b0add
                       f949dcecde54a8a5db487edf46dea79ddde65b9d
                       ce2769d20559cf2362742e12e3d997a5cd3f7782
                       5fd28cebfca5e1f915d63e69e2ff4399a18ef053
                       bf9dca13b127f5e7b21ae0109e054722784e366c
                       8da01d09a9733df1b05152a59b1bb358a3638848
                       890e40bf8ebefed03f4f4e3d89e28572bbe84d2c
                       ca37d08ef432d6fe9293998a78e59622289d4b21
                       5f92f990c773be03222c6d6a1be3420f317d1558
                       ef1f7efab0e75df37f41858e4401f8502aa693a4
                       db3fd2f58885a0b2f70c918c3c19c75eeaab0961
                       96e4ac8cfd357de2dd97a1049859620e3d1522f2
                       ace2023c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ca:40:08:09:62:9b:f9:85:25:a1:1d:be:d1:a7:7c:61:81:6c:e0:6b]
            modulus: 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
    public exponent: 10001

] 
2022-01-15 05:10:03.605  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-01-15 05:10:03.607 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-01-15 05:10:03.608 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-15 05:10:03.608 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-01-15 05:10:03.608  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-15 05:10:03.609  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-01-15 05:10:03.609  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-01-15 05:10:03.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-01-15 05:10:03.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-01-15 05:10:03.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-01-15 05:10:03.615 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-01-15 05:10:03.615 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-15 05:10:03.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-15 05:10:03.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-15 05:10:03.694  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-01-15 05:10:03.695  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-01-15 05:10:03.695 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-01-15 05:10:03.695 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-15 05:10:03.709  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-01-15 05:10:03.710  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-01-15 05:10:03.710 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 05:10:03.710 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 05:10:03.710 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 05:10:03.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 05:10:03.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 05:10:03.712 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 05:10:03.712 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 05:10:03.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 05:10:03.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 05:10:03.714 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-01-15 05:10:03.716 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203487876945264968802104854975824454210455655535
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 15 02:52:07 UTC 2022
           Final Date: Thu Jan 15 02:52:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:06:33:81:3f:35:07:07:48:d9:c3:77:55:48:fd:d9:26:49:7a:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d47adf9ebf3bd9a90e172e8d85b0650b8ac976e
                       f2c68fbbe066b9cb6fa4604d818e43d86c7b6d05
                       231c9e582f1132bd9f124431db95297a5a888771
                       7401f6b350e47d72bfa718550a4cfd1549759cd1
                       2ec75373e797434c7b82c87872648c4e42f09d20
                       9fba2949bffe587ca2bb60561ed77707c53e5b8b
                       b9987f092ccd11686b93e69ddf93b1265309126c
                       4295f4a2838530c7e1befe12d9ba877e039b0add
                       f949dcecde54a8a5db487edf46dea79ddde65b9d
                       ce2769d20559cf2362742e12e3d997a5cd3f7782
                       5fd28cebfca5e1f915d63e69e2ff4399a18ef053
                       bf9dca13b127f5e7b21ae0109e054722784e366c
                       8da01d09a9733df1b05152a59b1bb358a3638848
                       890e40bf8ebefed03f4f4e3d89e28572bbe84d2c
                       ca37d08ef432d6fe9293998a78e59622289d4b21
                       5f92f990c773be03222c6d6a1be3420f317d1558
                       ef1f7efab0e75df37f41858e4401f8502aa693a4
                       db3fd2f58885a0b2f70c918c3c19c75eeaab0961
                       96e4ac8cfd357de2dd97a1049859620e3d1522f2
                       ace2023c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4f:b2:36:d1:fc:b4:1f:a0:d4:33:23:85:8f:e9:e4:99:72:db:00:65]
            modulus: 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
    public exponent: 10001

] 
2022-01-15 05:12:59.517  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-01-15 05:12:59.518 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-01-15 05:12:59.519 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-15 05:12:59.520 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-01-15 05:12:59.520  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-15 05:12:59.521  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-01-15 05:12:59.521  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-01-15 05:12:59.522 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-01-15 05:12:59.522 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-01-15 05:12:59.522 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-01-15 05:12:59.527 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-01-15 05:12:59.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-15 05:12:59.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-15 05:12:59.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-15 05:12:59.603  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-01-15 05:12:59.604  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-01-15 05:12:59.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-01-15 05:12:59.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-15 05:12:59.605  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-01-15 05:12:59.606  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-01-15 05:12:59.609 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 05:12:59.609 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 05:12:59.610 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 05:12:59.610 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 05:12:59.610 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 05:12:59.611 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 05:12:59.611 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 05:12:59.612 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 05:12:59.612 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 05:12:59.613 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-01-15 05:12:59.616 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203487876945264968802104854975824454210455655535
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 15 02:52:07 UTC 2022
           Final Date: Thu Jan 15 02:52:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:06:33:81:3f:35:07:07:48:d9:c3:77:55:48:fd:d9:26:49:7a:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d47adf9ebf3bd9a90e172e8d85b0650b8ac976e
                       f2c68fbbe066b9cb6fa4604d818e43d86c7b6d05
                       231c9e582f1132bd9f124431db95297a5a888771
                       7401f6b350e47d72bfa718550a4cfd1549759cd1
                       2ec75373e797434c7b82c87872648c4e42f09d20
                       9fba2949bffe587ca2bb60561ed77707c53e5b8b
                       b9987f092ccd11686b93e69ddf93b1265309126c
                       4295f4a2838530c7e1befe12d9ba877e039b0add
                       f949dcecde54a8a5db487edf46dea79ddde65b9d
                       ce2769d20559cf2362742e12e3d997a5cd3f7782
                       5fd28cebfca5e1f915d63e69e2ff4399a18ef053
                       bf9dca13b127f5e7b21ae0109e054722784e366c
                       8da01d09a9733df1b05152a59b1bb358a3638848
                       890e40bf8ebefed03f4f4e3d89e28572bbe84d2c
                       ca37d08ef432d6fe9293998a78e59622289d4b21
                       5f92f990c773be03222c6d6a1be3420f317d1558
                       ef1f7efab0e75df37f41858e4401f8502aa693a4
                       db3fd2f58885a0b2f70c918c3c19c75eeaab0961
                       96e4ac8cfd357de2dd97a1049859620e3d1522f2
                       ace2023c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d0:5d:3e:47:d0:02:36:4b:ea:c4:e2:05:74:43:ad:2d:83:21:55:02]
            modulus: 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
    public exponent: 10001

] 
2022-01-15 05:16:17.833  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-01-15 05:16:17.835 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-01-15 05:16:17.836 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-15 05:16:17.836 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-01-15 05:16:17.837  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-15 05:16:17.837  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-01-15 05:16:17.838  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-01-15 05:16:17.838 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-01-15 05:16:17.838 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-01-15 05:16:17.838 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-01-15 05:16:17.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-01-15 05:16:17.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-15 05:16:17.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-15 05:16:17.844 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-15 05:16:17.982  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-01-15 05:16:18.010  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-01-15 05:16:18.010 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-01-15 05:16:18.010 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-15 05:16:18.011  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-01-15 05:16:18.012  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-01-15 05:16:18.012 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 05:16:18.012 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 05:16:18.013 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 05:16:18.013 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 05:16:18.013 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 05:16:18.014 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 05:16:18.014 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 05:16:18.015 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 05:16:18.015 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 05:16:18.015 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-01-15 05:16:18.018 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203487876945264968802104854975824454210455655535
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 15 02:52:07 UTC 2022
           Final Date: Thu Jan 15 02:52:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:06:33:81:3f:35:07:07:48:d9:c3:77:55:48:fd:d9:26:49:7a:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d47adf9ebf3bd9a90e172e8d85b0650b8ac976e
                       f2c68fbbe066b9cb6fa4604d818e43d86c7b6d05
                       231c9e582f1132bd9f124431db95297a5a888771
                       7401f6b350e47d72bfa718550a4cfd1549759cd1
                       2ec75373e797434c7b82c87872648c4e42f09d20
                       9fba2949bffe587ca2bb60561ed77707c53e5b8b
                       b9987f092ccd11686b93e69ddf93b1265309126c
                       4295f4a2838530c7e1befe12d9ba877e039b0add
                       f949dcecde54a8a5db487edf46dea79ddde65b9d
                       ce2769d20559cf2362742e12e3d997a5cd3f7782
                       5fd28cebfca5e1f915d63e69e2ff4399a18ef053
                       bf9dca13b127f5e7b21ae0109e054722784e366c
                       8da01d09a9733df1b05152a59b1bb358a3638848
                       890e40bf8ebefed03f4f4e3d89e28572bbe84d2c
                       ca37d08ef432d6fe9293998a78e59622289d4b21
                       5f92f990c773be03222c6d6a1be3420f317d1558
                       ef1f7efab0e75df37f41858e4401f8502aa693a4
                       db3fd2f58885a0b2f70c918c3c19c75eeaab0961
                       96e4ac8cfd357de2dd97a1049859620e3d1522f2
                       ace2023c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e6:ee:ce:ca:38:ce:c8:8b:4b:1d:d5:ea:de:a0:ba:b8:33:ba:55:0b]
            modulus: c35641d0e33ca19f92b8d3a52dacb9bd740da9f10e0abdfbe0b7cae98d6ddadaba01b0a1fb65f2e5f34a6543dc7077dba4bfe62c5321e90991b72670705db57bfbfe8f3924a34054bd3cd042ca2b41dc0780b7c3d6eba05a691e6f1a36504ed2c49eb0e315cab08d43de3d315d67ed3cef43bf942bc0cf384ab4ac1f31c5456072d5244b155737751165b83a1d68b1f487bb7c6e2fccfcc5a0a3b19f4d50433a3998ac9112f090d22383dfeaa068789656e64fe4a6add80f2a550ddffd2ef13ed9e8b8f5c4909c07834b450aee17a7e0aba89ec45ce71ba2c54c85713cae3a947b5e7787a0de0084c6ef624985accbe0c0096a38fd4810c506a24b99f5fee5ab
    public exponent: 10001

] 
2022-01-15 05:20:22.130  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-01-15 05:20:22.131 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-01-15 05:20:22.132 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-15 05:20:22.133 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-01-15 05:20:22.133  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-01-15 05:20:22.134  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-01-15 05:20:22.134  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-01-15 05:20:22.134 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-01-15 05:20:22.135 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-01-15 05:20:22.135 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-01-15 05:20:22.139 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-01-15 05:20:22.139 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-15 05:20:22.140 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-01-15 05:20:22.140 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-15 05:20:22.221  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-01-15 05:20:22.221  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-01-15 05:20:22.221 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-01-15 05:20:22.222 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-01-15 05:20:22.223  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-01-15 05:20:22.224  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-01-15 05:20:22.224 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 05:20:22.224 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 05:20:22.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 05:20:22.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 05:20:22.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 05:20:22.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 05:20:22.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-01-15 05:20:22.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-01-15 05:20:22.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-01-15 05:20:22.228 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-01-15 05:20:22.231 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203487876945264968802104854975824454210455655535
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 15 02:52:07 UTC 2022
           Final Date: Thu Jan 15 02:52:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a1:06:33:81:3f:35:07:07:48:d9:c3:77:55:48:fd:d9:26:49:7a:36]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d47adf9ebf3bd9a90e172e8d85b0650b8ac976e
                       f2c68fbbe066b9cb6fa4604d818e43d86c7b6d05
                       231c9e582f1132bd9f124431db95297a5a888771
                       7401f6b350e47d72bfa718550a4cfd1549759cd1
                       2ec75373e797434c7b82c87872648c4e42f09d20
                       9fba2949bffe587ca2bb60561ed77707c53e5b8b
                       b9987f092ccd11686b93e69ddf93b1265309126c
                       4295f4a2838530c7e1befe12d9ba877e039b0add
                       f949dcecde54a8a5db487edf46dea79ddde65b9d
                       ce2769d20559cf2362742e12e3d997a5cd3f7782
                       5fd28cebfca5e1f915d63e69e2ff4399a18ef053
                       bf9dca13b127f5e7b21ae0109e054722784e366c
                       8da01d09a9733df1b05152a59b1bb358a3638848
                       890e40bf8ebefed03f4f4e3d89e28572bbe84d2c
                       ca37d08ef432d6fe9293998a78e59622289d4b21
                       5f92f990c773be03222c6d6a1be3420f317d1558
                       ef1f7efab0e75df37f41858e4401f8502aa693a4
                       db3fd2f58885a0b2f70c918c3c19c75eeaab0961
                       96e4ac8cfd357de2dd97a1049859620e3d1522f2
                       ace2023c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [88:5f:25:3b:c9:cb:dc:0d:73:49:50:8f:cf:83:4e:ff:ed:e1:4f:9a]
            modulus: d3449c1c1d2120ec2e15b86d1ef40f148b214b9df797c5b029e247a81a021596e6deee157d78203c273f2d5e87e971a061076603d2ed8672bf74bc75e45f1a9303b9132640ba1f6cd83782e462b29cecc390e8c35a40957d859365ef94e1967a37df5cca76743c26aa215c35e1dfb2e2065099bbdd3f5e5b68303c20ac5a1dac89b5788cd19a000cb510e14a07f744504d73192d9ce30bf157d4ade4dc032006d882e4c83a45a2fc00b551c93e5b98071982301370a0654144eae5b9aaa0c73e86a7f504a915036ac2fb4a4a8893014f777c0101b9e245985f6a9626885cf3bc000406404562882e937be7e022507199345f6be6ce04d86ebd050ba1ed1a859d
    public exponent: 10001

]