Results

By type

          2022-02-05 03:01:56,611 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-02-05 03:02:01,406 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-02-05 03:02:04.594  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Feb 05, 2022 3:02:14 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Feb 05, 2022 3:02:14 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Feb 05, 2022 3:02:14 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Feb 05, 2022 3:02:14 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-02-05 03:02:16.895 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-02-05 03:02:18.303  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-02-05 03:02:19.006  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-02-05 03:02:22.207 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-02-05 03:02:22.209 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-02-05 03:02:22.209 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-02-05 03:02:22.212 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-02-05 03:02:22.402 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-02-05 03:02:22.404 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-02-05 03:02:22.814 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-02-05 03:02:28.101 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Feb 05, 2022 3:02:31 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-02-05 03:02:32.210  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 39.311 seconds (JVM running for 46.946)
Feb 05, 2022 3:02:38 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-02-05 03:05:51.341  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-05 03:05:51.405 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-05 03:05:51.514 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-02-05 03:05:51.517 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-05 03:05:51.692  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-02-05 03:05:51.695  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-05 03:05:51.696  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-05 03:05:51.698 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-05 03:05:51.698 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-05 03:05:51.701 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-05 03:05:51.706 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-05 03:05:51.708 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-05 03:05:51.908 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-05 03:05:51.913 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-05 03:05:51.914 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-05 03:05:51.997 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-05 03:05:53.453  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-05 03:05:53.455  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-05 03:05:53.455 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-05 03:05:53.456 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-05 03:05:53.498  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-05 03:05:53.499  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-05 03:05:53.500 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 03:05:53.501 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 03:05:53.501 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 03:05:53.512 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 03:05:53.513 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 03:05:53.513 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 03:05:53.517 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 03:05:53.517 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 03:05:53.518 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 03:05:53.519 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-05 03:05:53.620 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 712996106735384391122744409262632015241735878955
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Feb 05 02:59:05 UTC 2022
           Final Date: Thu Feb 05 02:59:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [52:27:25:a8:d0:56:a0:99:9c:13:f6:87:83:f8:19:c9:27:fb:a8:16]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89768c367bd3dc3cab0130a0385a809d76e8a878
                       daedf268c48483fe5c75fcd78f7dc2fa3aed0f64
                       b2482dee2a81977c14533b986d75d362bc6c7df7
                       8db8b5050d0fefe321339c60d1a5b0461aeedd20
                       ae00df814dbcbd60be132270af540477758646d4
                       f5f8c281bcb602effbaaabf7884fd7a4ba2c1b18
                       9d2a4b1968eea145620acd6e11b0545e88e30586
                       5b7d4ef094bd946471b93b3f7b53e0395bdaabf4
                       4f0891ffe7cf97aa3b6e8bafa5845a660c2475b3
                       1d66511fe040cdb65991de296b4bdd0048244723
                       71b7bbc1676b52a6c3eb8404f636dbcdcbd0e041
                       7f44ee9f14bcf7695a78794adb70ea269a1db9e2
                       dcb352b8c37ebd2aaafeb0f2bfe82f8465cd2b89
                       e0ecab9282a71779c1d24e27f8dbe85b393e51da
                       9e60a4547dd0a8f800c5184f534b01f00d0d7e9e
                       c66816707187a9fbad6ddcd301819a4b27f253da
                       e96c083c7704794d90fa9fd375ca6dce850ce9c9
                       f6a96d2264e5187353b5e9bdc0531dc69eec7335
                       2c926cd4b028d555e297864c2292cee5f4979b8d
                       caa26784
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cc:a7:d5:ff:d8:ac:76:14:09:2e:f9:02:5f:9a:aa:88:3a:43:8f:64]
            modulus: ac46d87be586f2948a54067ed2c9a2c5b70b54c2083005f97f5129759419c1e987dc2e047878faf51ad137e0519cde24948ceca0d7f6f087800c3a208a060532c70f5e87da0b2128541e1631f1250ec983cc0458856ce9fdfcdd73d2ac55a0692baf261f602bee67c6d21145ab8bc988ec1c5f1acb21e612033f9cbc07584d88b6553912d53526df3f64e9a8a7064b7ead5cb7aadbc0cbcb705962b37a14391d381a0c7aab01b35e32690becf1744f463579823fb6c179ac17d869365af70857aa753b1af08022e716b5dd96a966683b1385e907256ddae19aa3be13dc82a83870125efd0ddc7057fd1b6ae4e920e98c106f17dd88ecf5a05209544a9447a811
    public exponent: 10001

] 
2022-02-05 04:36:43.946  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-05 04:36:43.949 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-05 04:36:43.952 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-05 04:36:43.953 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-05 04:36:43.955  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-05 04:36:43.955  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-05 04:36:43.956  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-05 04:36:43.956 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-05 04:36:43.956 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-05 04:36:43.957 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-05 04:36:43.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-05 04:36:43.992 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-05 04:36:43.992 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-05 04:36:43.993 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-05 04:36:44.106  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-05 04:36:44.108  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-05 04:36:44.109 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-05 04:36:44.109 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-05 04:36:44.114  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-05 04:36:44.114  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-05 04:36:44.114 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:36:44.115 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:36:44.115 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:36:44.192 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:36:44.192 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:36:44.193 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:36:44.194 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:36:44.194 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:36:44.194 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:36:44.196 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-05 04:36:44.201 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 712996106735384391122744409262632015241735878955
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Feb 05 02:59:05 UTC 2022
           Final Date: Thu Feb 05 02:59:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [52:27:25:a8:d0:56:a0:99:9c:13:f6:87:83:f8:19:c9:27:fb:a8:16]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89768c367bd3dc3cab0130a0385a809d76e8a878
                       daedf268c48483fe5c75fcd78f7dc2fa3aed0f64
                       b2482dee2a81977c14533b986d75d362bc6c7df7
                       8db8b5050d0fefe321339c60d1a5b0461aeedd20
                       ae00df814dbcbd60be132270af540477758646d4
                       f5f8c281bcb602effbaaabf7884fd7a4ba2c1b18
                       9d2a4b1968eea145620acd6e11b0545e88e30586
                       5b7d4ef094bd946471b93b3f7b53e0395bdaabf4
                       4f0891ffe7cf97aa3b6e8bafa5845a660c2475b3
                       1d66511fe040cdb65991de296b4bdd0048244723
                       71b7bbc1676b52a6c3eb8404f636dbcdcbd0e041
                       7f44ee9f14bcf7695a78794adb70ea269a1db9e2
                       dcb352b8c37ebd2aaafeb0f2bfe82f8465cd2b89
                       e0ecab9282a71779c1d24e27f8dbe85b393e51da
                       9e60a4547dd0a8f800c5184f534b01f00d0d7e9e
                       c66816707187a9fbad6ddcd301819a4b27f253da
                       e96c083c7704794d90fa9fd375ca6dce850ce9c9
                       f6a96d2264e5187353b5e9bdc0531dc69eec7335
                       2c926cd4b028d555e297864c2292cee5f4979b8d
                       caa26784
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6d:72:08:ae:59:20:f0:97:6b:92:17:8a:ff:61:02:c8:cb:fd:7e:50]
            modulus: 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
    public exponent: 10001

] 
2022-02-05 04:41:28.828  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-05 04:41:28.829 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-05 04:41:28.831 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-05 04:41:28.832 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-05 04:41:28.833  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-05 04:41:28.834  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-05 04:41:28.835  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-05 04:41:28.835 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-05 04:41:28.836 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-05 04:41:28.836 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-05 04:41:28.843 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-05 04:41:28.843 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-05 04:41:28.843 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-05 04:41:28.844 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-05 04:41:28.992  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-05 04:41:28.993  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-05 04:41:28.994 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-05 04:41:28.994 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-05 04:41:28.997  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-05 04:41:28.997  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-05 04:41:28.998 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:41:28.999 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:41:28.999 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:41:29.000 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:41:29.001 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:41:29.001 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:41:29.002 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:41:29.003 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:41:29.003 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:41:29.004 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-05 04:41:29.009 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 712996106735384391122744409262632015241735878955
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Feb 05 02:59:05 UTC 2022
           Final Date: Thu Feb 05 02:59:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [52:27:25:a8:d0:56:a0:99:9c:13:f6:87:83:f8:19:c9:27:fb:a8:16]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89768c367bd3dc3cab0130a0385a809d76e8a878
                       daedf268c48483fe5c75fcd78f7dc2fa3aed0f64
                       b2482dee2a81977c14533b986d75d362bc6c7df7
                       8db8b5050d0fefe321339c60d1a5b0461aeedd20
                       ae00df814dbcbd60be132270af540477758646d4
                       f5f8c281bcb602effbaaabf7884fd7a4ba2c1b18
                       9d2a4b1968eea145620acd6e11b0545e88e30586
                       5b7d4ef094bd946471b93b3f7b53e0395bdaabf4
                       4f0891ffe7cf97aa3b6e8bafa5845a660c2475b3
                       1d66511fe040cdb65991de296b4bdd0048244723
                       71b7bbc1676b52a6c3eb8404f636dbcdcbd0e041
                       7f44ee9f14bcf7695a78794adb70ea269a1db9e2
                       dcb352b8c37ebd2aaafeb0f2bfe82f8465cd2b89
                       e0ecab9282a71779c1d24e27f8dbe85b393e51da
                       9e60a4547dd0a8f800c5184f534b01f00d0d7e9e
                       c66816707187a9fbad6ddcd301819a4b27f253da
                       e96c083c7704794d90fa9fd375ca6dce850ce9c9
                       f6a96d2264e5187353b5e9bdc0531dc69eec7335
                       2c926cd4b028d555e297864c2292cee5f4979b8d
                       caa26784
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:30:ff:e9:49:4e:6e:13:6b:94:ee:f0:0e:85:80:fd:4e:81:fe:62]
            modulus: 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
    public exponent: 10001

] 
2022-02-05 04:44:00.604  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-05 04:44:00.605 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-05 04:44:00.606 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-05 04:44:00.607 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-05 04:44:00.607  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-05 04:44:00.608  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-05 04:44:00.608  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-05 04:44:00.608 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-05 04:44:00.609 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-05 04:44:00.609 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-05 04:44:00.613 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-05 04:44:00.613 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-05 04:44:00.613 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-05 04:44:00.614 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-05 04:44:00.765  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-05 04:44:00.766  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-05 04:44:00.767 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-05 04:44:00.767 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-05 04:44:00.770  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-05 04:44:00.771  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-05 04:44:00.772 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:44:00.772 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:44:00.773 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:44:00.774 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:44:00.775 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:44:00.792 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:44:00.793 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:44:00.793 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:44:00.794 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:44:00.795 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-05 04:44:00.799 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 712996106735384391122744409262632015241735878955
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Feb 05 02:59:05 UTC 2022
           Final Date: Thu Feb 05 02:59:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [52:27:25:a8:d0:56:a0:99:9c:13:f6:87:83:f8:19:c9:27:fb:a8:16]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89768c367bd3dc3cab0130a0385a809d76e8a878
                       daedf268c48483fe5c75fcd78f7dc2fa3aed0f64
                       b2482dee2a81977c14533b986d75d362bc6c7df7
                       8db8b5050d0fefe321339c60d1a5b0461aeedd20
                       ae00df814dbcbd60be132270af540477758646d4
                       f5f8c281bcb602effbaaabf7884fd7a4ba2c1b18
                       9d2a4b1968eea145620acd6e11b0545e88e30586
                       5b7d4ef094bd946471b93b3f7b53e0395bdaabf4
                       4f0891ffe7cf97aa3b6e8bafa5845a660c2475b3
                       1d66511fe040cdb65991de296b4bdd0048244723
                       71b7bbc1676b52a6c3eb8404f636dbcdcbd0e041
                       7f44ee9f14bcf7695a78794adb70ea269a1db9e2
                       dcb352b8c37ebd2aaafeb0f2bfe82f8465cd2b89
                       e0ecab9282a71779c1d24e27f8dbe85b393e51da
                       9e60a4547dd0a8f800c5184f534b01f00d0d7e9e
                       c66816707187a9fbad6ddcd301819a4b27f253da
                       e96c083c7704794d90fa9fd375ca6dce850ce9c9
                       f6a96d2264e5187353b5e9bdc0531dc69eec7335
                       2c926cd4b028d555e297864c2292cee5f4979b8d
                       caa26784
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f0:da:85:d4:cd:3e:e6:3b:0f:9b:3f:fa:71:2e:5a:b0:8d:74:34:37]
            modulus: b794625393f0a66866b5849add57ea786a6590ac7295fa2d03922e7c5ac0e5466e54fab834a642d057de6621dabc597faec7260e6040f4a45c0652e839b9922f805e00cfc5a25d0bf1dbf5a0bcce9d567b85c3171e8482afaaf89e57e163058c3a3b397c986924bcfbb18c1285937fba779b249d2f2a472e7076a7de819e4ff38674c00dbc66659015a2387b91834074fd3a5bd686f85a0dff8af9c0f353365f61870541d7bd9c11340be6a0b372f43aa1d0636dac839c0edb04967d499165637159eb4b03138fdf36acd21f6de3222f4fa7c677e4c45d7028bf23760c537d2de923881b0bf21cc0a72e2cffec415e86be29fb82421d48d2ded9dbe13fe0bdbf
    public exponent: 10001

] 
2022-02-05 04:46:39.953  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-05 04:46:39.954 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-05 04:46:39.956 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-05 04:46:39.956 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-05 04:46:39.957  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-05 04:46:39.958  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-05 04:46:39.958  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-05 04:46:39.958 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-05 04:46:39.959 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-05 04:46:39.959 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-05 04:46:39.966 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-05 04:46:39.967 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-05 04:46:39.967 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-05 04:46:39.967 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-05 04:46:40.065  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-05 04:46:40.067  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-05 04:46:40.068 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-05 04:46:40.069 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-05 04:46:40.074  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-05 04:46:40.075  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-05 04:46:40.092 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:46:40.092 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:46:40.093 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:46:40.093 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:46:40.094 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:46:40.094 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:46:40.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:46:40.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:46:40.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:46:40.097 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-05 04:46:40.101 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 712996106735384391122744409262632015241735878955
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Feb 05 02:59:05 UTC 2022
           Final Date: Thu Feb 05 02:59:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [52:27:25:a8:d0:56:a0:99:9c:13:f6:87:83:f8:19:c9:27:fb:a8:16]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89768c367bd3dc3cab0130a0385a809d76e8a878
                       daedf268c48483fe5c75fcd78f7dc2fa3aed0f64
                       b2482dee2a81977c14533b986d75d362bc6c7df7
                       8db8b5050d0fefe321339c60d1a5b0461aeedd20
                       ae00df814dbcbd60be132270af540477758646d4
                       f5f8c281bcb602effbaaabf7884fd7a4ba2c1b18
                       9d2a4b1968eea145620acd6e11b0545e88e30586
                       5b7d4ef094bd946471b93b3f7b53e0395bdaabf4
                       4f0891ffe7cf97aa3b6e8bafa5845a660c2475b3
                       1d66511fe040cdb65991de296b4bdd0048244723
                       71b7bbc1676b52a6c3eb8404f636dbcdcbd0e041
                       7f44ee9f14bcf7695a78794adb70ea269a1db9e2
                       dcb352b8c37ebd2aaafeb0f2bfe82f8465cd2b89
                       e0ecab9282a71779c1d24e27f8dbe85b393e51da
                       9e60a4547dd0a8f800c5184f534b01f00d0d7e9e
                       c66816707187a9fbad6ddcd301819a4b27f253da
                       e96c083c7704794d90fa9fd375ca6dce850ce9c9
                       f6a96d2264e5187353b5e9bdc0531dc69eec7335
                       2c926cd4b028d555e297864c2292cee5f4979b8d
                       caa26784
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [43:1a:18:cb:21:18:35:26:78:87:bb:0f:f6:1b:15:89:c4:bf:4e:06]
            modulus: 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
    public exponent: 10001

] 
2022-02-05 04:49:33.929  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-05 04:49:33.930 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-05 04:49:33.931 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-05 04:49:33.932 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-05 04:49:33.932  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-05 04:49:33.933  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-05 04:49:33.933  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-05 04:49:33.933 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-05 04:49:33.934 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-05 04:49:33.934 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-05 04:49:33.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-05 04:49:33.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-05 04:49:33.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-05 04:49:33.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-05 04:49:34.056  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-05 04:49:34.057  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-05 04:49:34.057 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-05 04:49:34.058 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-05 04:49:34.059  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-05 04:49:34.059  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-05 04:49:34.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:49:34.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:49:34.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:49:34.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:49:34.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:49:34.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:49:34.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:49:34.063 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:49:34.063 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:49:34.064 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-05 04:49:34.066 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 712996106735384391122744409262632015241735878955
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Feb 05 02:59:05 UTC 2022
           Final Date: Thu Feb 05 02:59:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [52:27:25:a8:d0:56:a0:99:9c:13:f6:87:83:f8:19:c9:27:fb:a8:16]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89768c367bd3dc3cab0130a0385a809d76e8a878
                       daedf268c48483fe5c75fcd78f7dc2fa3aed0f64
                       b2482dee2a81977c14533b986d75d362bc6c7df7
                       8db8b5050d0fefe321339c60d1a5b0461aeedd20
                       ae00df814dbcbd60be132270af540477758646d4
                       f5f8c281bcb602effbaaabf7884fd7a4ba2c1b18
                       9d2a4b1968eea145620acd6e11b0545e88e30586
                       5b7d4ef094bd946471b93b3f7b53e0395bdaabf4
                       4f0891ffe7cf97aa3b6e8bafa5845a660c2475b3
                       1d66511fe040cdb65991de296b4bdd0048244723
                       71b7bbc1676b52a6c3eb8404f636dbcdcbd0e041
                       7f44ee9f14bcf7695a78794adb70ea269a1db9e2
                       dcb352b8c37ebd2aaafeb0f2bfe82f8465cd2b89
                       e0ecab9282a71779c1d24e27f8dbe85b393e51da
                       9e60a4547dd0a8f800c5184f534b01f00d0d7e9e
                       c66816707187a9fbad6ddcd301819a4b27f253da
                       e96c083c7704794d90fa9fd375ca6dce850ce9c9
                       f6a96d2264e5187353b5e9bdc0531dc69eec7335
                       2c926cd4b028d555e297864c2292cee5f4979b8d
                       caa26784
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [98:e2:24:e8:ac:e8:97:3b:78:1f:cc:69:a1:36:fb:e4:62:b0:bd:b4]
            modulus: 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
    public exponent: 10001

] 
2022-02-05 04:52:57.118  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-05 04:52:57.120 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-05 04:52:57.121 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-05 04:52:57.122 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-05 04:52:57.122  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-05 04:52:57.123  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-05 04:52:57.123  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-05 04:52:57.124 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-05 04:52:57.124 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-05 04:52:57.125 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-05 04:52:57.197 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-05 04:52:57.198 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-05 04:52:57.198 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-05 04:52:57.199 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-05 04:52:57.288  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-05 04:52:57.289  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-05 04:52:57.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-05 04:52:57.290 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-05 04:52:57.291  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-05 04:52:57.292  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-05 04:52:57.293 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:52:57.293 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:52:57.294 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:52:57.295 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:52:57.296 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:52:57.296 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:52:57.297 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:52:57.297 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:52:57.297 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:52:57.298 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-05 04:52:57.301 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 712996106735384391122744409262632015241735878955
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Feb 05 02:59:05 UTC 2022
           Final Date: Thu Feb 05 02:59:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [52:27:25:a8:d0:56:a0:99:9c:13:f6:87:83:f8:19:c9:27:fb:a8:16]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89768c367bd3dc3cab0130a0385a809d76e8a878
                       daedf268c48483fe5c75fcd78f7dc2fa3aed0f64
                       b2482dee2a81977c14533b986d75d362bc6c7df7
                       8db8b5050d0fefe321339c60d1a5b0461aeedd20
                       ae00df814dbcbd60be132270af540477758646d4
                       f5f8c281bcb602effbaaabf7884fd7a4ba2c1b18
                       9d2a4b1968eea145620acd6e11b0545e88e30586
                       5b7d4ef094bd946471b93b3f7b53e0395bdaabf4
                       4f0891ffe7cf97aa3b6e8bafa5845a660c2475b3
                       1d66511fe040cdb65991de296b4bdd0048244723
                       71b7bbc1676b52a6c3eb8404f636dbcdcbd0e041
                       7f44ee9f14bcf7695a78794adb70ea269a1db9e2
                       dcb352b8c37ebd2aaafeb0f2bfe82f8465cd2b89
                       e0ecab9282a71779c1d24e27f8dbe85b393e51da
                       9e60a4547dd0a8f800c5184f534b01f00d0d7e9e
                       c66816707187a9fbad6ddcd301819a4b27f253da
                       e96c083c7704794d90fa9fd375ca6dce850ce9c9
                       f6a96d2264e5187353b5e9bdc0531dc69eec7335
                       2c926cd4b028d555e297864c2292cee5f4979b8d
                       caa26784
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:f3:86:73:e9:c6:6b:20:57:b6:ee:34:3f:4a:a1:72:ab:d6:46:63]
            modulus: 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
    public exponent: 10001

] 
2022-02-05 04:57:01.597  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-05 04:57:01.598 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-05 04:57:01.600 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-05 04:57:01.600 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-05 04:57:01.600  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-05 04:57:01.601  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-05 04:57:01.601  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-05 04:57:01.601 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-05 04:57:01.601 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-05 04:57:01.602 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-05 04:57:01.606 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-05 04:57:01.607 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-05 04:57:01.607 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-05 04:57:01.607 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-05 04:57:01.693  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-05 04:57:01.694  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-05 04:57:01.694 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-05 04:57:01.694 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-05 04:57:01.696  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-05 04:57:01.697  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-05 04:57:01.697 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:57:01.697 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:57:01.697 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:57:01.698 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:57:01.698 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:57:01.698 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:57:01.698 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-05 04:57:01.699 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-05 04:57:01.699 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-05 04:57:01.699 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-05 04:57:01.702 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 712996106735384391122744409262632015241735878955
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Feb 05 02:59:05 UTC 2022
           Final Date: Thu Feb 05 02:59:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [52:27:25:a8:d0:56:a0:99:9c:13:f6:87:83:f8:19:c9:27:fb:a8:16]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89768c367bd3dc3cab0130a0385a809d76e8a878
                       daedf268c48483fe5c75fcd78f7dc2fa3aed0f64
                       b2482dee2a81977c14533b986d75d362bc6c7df7
                       8db8b5050d0fefe321339c60d1a5b0461aeedd20
                       ae00df814dbcbd60be132270af540477758646d4
                       f5f8c281bcb602effbaaabf7884fd7a4ba2c1b18
                       9d2a4b1968eea145620acd6e11b0545e88e30586
                       5b7d4ef094bd946471b93b3f7b53e0395bdaabf4
                       4f0891ffe7cf97aa3b6e8bafa5845a660c2475b3
                       1d66511fe040cdb65991de296b4bdd0048244723
                       71b7bbc1676b52a6c3eb8404f636dbcdcbd0e041
                       7f44ee9f14bcf7695a78794adb70ea269a1db9e2
                       dcb352b8c37ebd2aaafeb0f2bfe82f8465cd2b89
                       e0ecab9282a71779c1d24e27f8dbe85b393e51da
                       9e60a4547dd0a8f800c5184f534b01f00d0d7e9e
                       c66816707187a9fbad6ddcd301819a4b27f253da
                       e96c083c7704794d90fa9fd375ca6dce850ce9c9
                       f6a96d2264e5187353b5e9bdc0531dc69eec7335
                       2c926cd4b028d555e297864c2292cee5f4979b8d
                       caa26784
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:d7:55:b5:20:41:5e:dc:f7:4c:19:4e:8a:9f:b7:d0:98:bf:2d:0b]
            modulus: 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
    public exponent: 10001

]