Results

By type

          2022-02-06 02:53:57,261 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-02-06 02:54:01,566 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-02-06 02:54:04.051  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Feb 06, 2022 2:54:12 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Feb 06, 2022 2:54:12 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Feb 06, 2022 2:54:12 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Feb 06, 2022 2:54:13 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-02-06 02:54:15.262 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-02-06 02:54:16.555  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-02-06 02:54:17.165  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-02-06 02:54:20.251 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-02-06 02:54:20.253 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-02-06 02:54:20.255 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-02-06 02:54:20.260 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-02-06 02:54:20.455 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-02-06 02:54:20.458 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-02-06 02:54:20.867 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-02-06 02:54:25.160 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Feb 06, 2022 2:54:27 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-02-06 02:54:29.063  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 34.809 seconds (JVM running for 41.542)
Feb 06, 2022 2:54:36 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-02-06 03:03:39.995  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-06 03:03:40.053 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-06 03:03:40.252 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-02-06 03:03:40.255 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-06 03:03:40.349  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-02-06 03:03:40.351  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-06 03:03:40.352  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-06 03:03:40.353 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-06 03:03:40.354 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-06 03:03:40.356 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-06 03:03:40.362 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-06 03:03:40.365 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-06 03:03:40.549 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-06 03:03:40.554 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-06 03:03:40.554 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-06 03:03:40.557 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-06 03:03:41.860  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-06 03:03:41.862  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-06 03:03:41.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-06 03:03:41.864 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-06 03:03:41.953  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-06 03:03:41.955  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-06 03:03:41.955 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 03:03:41.956 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 03:03:41.956 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 03:03:42.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 03:03:42.063 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 03:03:42.063 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 03:03:42.148 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 03:03:42.149 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 03:03:42.149 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 03:03:42.150 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-06 03:03:42.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 327306651452967168171431762997721169221923337905
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Feb 06 02:47:04 UTC 2022
           Final Date: Fri Feb 06 02:47:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ac:d0:14:77:77:88:a1:77:a0:97:13:9a:5e:2f:a3:24:ce:f0:8a:0a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6287820d0f62db1067e36417fdb0bd5e2b05198a
                       0a1fd5de1dc5117da92b615d2f376906b026a21a
                       f86a3cd0c95799cf412afb92e01bda37b514fc21
                       218b7dc9968d533be2e8d4fdfa9809afeaaef860
                       765db0d70f031dfb3565c87cce6b5fb292e8af84
                       3a02645c93af180e55bd78a13a153c9cbe5e43d4
                       c6cf7e893257d8a21b50f239090b04ff2d0fdc00
                       0123363b0903396c61244ee1485e7f2ce6acd8b8
                       b532d7490252d521af2032f586417cad23d91f6b
                       ff1b37c976b3e53cb506e2acb8e3ad9e3556766f
                       2474aafc46818d5cb8762eb2f25d3ed20f524b44
                       bca91916f2f50d89766c7bfe2a48fc4e77853882
                       04e78959d8c60cf4644147f5255d5ffc90a477f0
                       d271e02096d35403bdec0d86fafa0e0090200802
                       0c7dc3a776c3f08c470a6cbe092eb4b232918cfd
                       d14169693970f53474d574e0812bc5784a42fdbf
                       1d0bcfa5317b2644665cd4377b545b6284797256
                       ad224fcbb6eb167af3e2003e5bcf49ef07d248d1
                       0a7a444ccdc15d60ba39b6a65aaad4a76a32f641
                       c3ae7fc6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ba:ce:88:b5:09:f4:48:c3:be:e1:34:97:08:d6:3e:9a:97:0e:1b:1c]
            modulus: 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
    public exponent: 10001

] 
2022-02-06 04:30:27.332  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-06 04:30:27.334 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-06 04:30:27.337 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-06 04:30:27.338 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-06 04:30:27.340  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-06 04:30:27.340  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-06 04:30:27.341  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-06 04:30:27.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-06 04:30:27.342 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-06 04:30:27.343 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-06 04:30:27.350 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-06 04:30:27.350 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-06 04:30:27.351 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-06 04:30:27.351 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-06 04:30:27.483  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-06 04:30:27.483  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-06 04:30:27.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-06 04:30:27.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-06 04:30:27.487  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-06 04:30:27.488  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-06 04:30:27.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:30:27.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:30:27.489 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:30:27.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:30:27.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:30:27.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:30:27.546 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:30:27.547 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:30:27.547 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:30:27.549 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-06 04:30:27.557 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 327306651452967168171431762997721169221923337905
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Feb 06 02:47:04 UTC 2022
           Final Date: Fri Feb 06 02:47:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ac:d0:14:77:77:88:a1:77:a0:97:13:9a:5e:2f:a3:24:ce:f0:8a:0a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6287820d0f62db1067e36417fdb0bd5e2b05198a
                       0a1fd5de1dc5117da92b615d2f376906b026a21a
                       f86a3cd0c95799cf412afb92e01bda37b514fc21
                       218b7dc9968d533be2e8d4fdfa9809afeaaef860
                       765db0d70f031dfb3565c87cce6b5fb292e8af84
                       3a02645c93af180e55bd78a13a153c9cbe5e43d4
                       c6cf7e893257d8a21b50f239090b04ff2d0fdc00
                       0123363b0903396c61244ee1485e7f2ce6acd8b8
                       b532d7490252d521af2032f586417cad23d91f6b
                       ff1b37c976b3e53cb506e2acb8e3ad9e3556766f
                       2474aafc46818d5cb8762eb2f25d3ed20f524b44
                       bca91916f2f50d89766c7bfe2a48fc4e77853882
                       04e78959d8c60cf4644147f5255d5ffc90a477f0
                       d271e02096d35403bdec0d86fafa0e0090200802
                       0c7dc3a776c3f08c470a6cbe092eb4b232918cfd
                       d14169693970f53474d574e0812bc5784a42fdbf
                       1d0bcfa5317b2644665cd4377b545b6284797256
                       ad224fcbb6eb167af3e2003e5bcf49ef07d248d1
                       0a7a444ccdc15d60ba39b6a65aaad4a76a32f641
                       c3ae7fc6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d5:35:bd:b2:ca:b7:bb:70:82:6e:fd:4f:2e:12:a6:21:51:49:5d:24]
            modulus: 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
    public exponent: 10001

] 
2022-02-06 04:35:58.477  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-06 04:35:58.478 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-06 04:35:58.480 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-06 04:35:58.480 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-06 04:35:58.481  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-06 04:35:58.482  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-06 04:35:58.482  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-06 04:35:58.483 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-06 04:35:58.483 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-06 04:35:58.484 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-06 04:35:58.490 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-06 04:35:58.491 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-06 04:35:58.491 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-06 04:35:58.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-06 04:35:58.639  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-06 04:35:58.646  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-06 04:35:58.647 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-06 04:35:58.647 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-06 04:35:58.649  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-06 04:35:58.649  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-06 04:35:58.649 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:35:58.650 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:35:58.650 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:35:58.651 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:35:58.651 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:35:58.651 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:35:58.652 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:35:58.652 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:35:58.652 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:35:58.653 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-06 04:35:58.656 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 327306651452967168171431762997721169221923337905
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Feb 06 02:47:04 UTC 2022
           Final Date: Fri Feb 06 02:47:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ac:d0:14:77:77:88:a1:77:a0:97:13:9a:5e:2f:a3:24:ce:f0:8a:0a]
            modulus: cac1eececf132d62285bcf46e2ddf86841ede9c32b678a7f75d10d14cca46ff8d0826c4e030575d387ed0c09dbf0ca932875478c13c476829c91792e04da1a92ae4a36a62baf679f0ef39f564c0dc947a4e887bfd28337555521a32dc9a7280b9f1e83a9e960743714eb1e24f5117c1d85bff824ea1eadd036da55eb13ea7db2b9b26bfa3980f48c99b448429cf47cf7fc5fc0466b1890eb8dead4137c4dbe3ef141d0a6b0fd3c0645db4ccd9ff049b3873d1b5fb2b046e2a773d46dc0b403501cce931c6a35cb54ccba6f3f99797f47f2c66c88888e4820d5517d3eed4e33a9fc7bba7629e93f6007307be59751bbe0279dddc4c72aed56ba5aff3383a410442020e3a26f0ec3af7c85b1a53c2486f29238523b6ebed2f0b46206e09aafcd7944b512fc6d8603bf0b31e0d389b8653ba3bdd82bb0b05eb42c37d46fc2aa0225d34d7b94c22a896858ede28b6b77edd784ea9e2e4418e07fc5d4e17ddfcdb1fc75b173a4d0a1a2c047ca2bf954b289ca971c22930f4160bff7177795e2752325
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6287820d0f62db1067e36417fdb0bd5e2b05198a
                       0a1fd5de1dc5117da92b615d2f376906b026a21a
                       f86a3cd0c95799cf412afb92e01bda37b514fc21
                       218b7dc9968d533be2e8d4fdfa9809afeaaef860
                       765db0d70f031dfb3565c87cce6b5fb292e8af84
                       3a02645c93af180e55bd78a13a153c9cbe5e43d4
                       c6cf7e893257d8a21b50f239090b04ff2d0fdc00
                       0123363b0903396c61244ee1485e7f2ce6acd8b8
                       b532d7490252d521af2032f586417cad23d91f6b
                       ff1b37c976b3e53cb506e2acb8e3ad9e3556766f
                       2474aafc46818d5cb8762eb2f25d3ed20f524b44
                       bca91916f2f50d89766c7bfe2a48fc4e77853882
                       04e78959d8c60cf4644147f5255d5ffc90a477f0
                       d271e02096d35403bdec0d86fafa0e0090200802
                       0c7dc3a776c3f08c470a6cbe092eb4b232918cfd
                       d14169693970f53474d574e0812bc5784a42fdbf
                       1d0bcfa5317b2644665cd4377b545b6284797256
                       ad224fcbb6eb167af3e2003e5bcf49ef07d248d1
                       0a7a444ccdc15d60ba39b6a65aaad4a76a32f641
                       c3ae7fc6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6c:c0:4e:5e:d0:91:b1:36:e8:61:f0:5a:9a:19:35:f8:c1:4f:ad:67]
            modulus: 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
    public exponent: 10001

] 
2022-02-06 04:38:07.544  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-06 04:38:07.546 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-06 04:38:07.547 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-06 04:38:07.548 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-06 04:38:07.548  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-06 04:38:07.549  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-06 04:38:07.550  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-06 04:38:07.550 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-06 04:38:07.550 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-06 04:38:07.551 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-06 04:38:07.560 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-06 04:38:07.561 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-06 04:38:07.561 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-06 04:38:07.561 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-06 04:38:07.742  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-06 04:38:07.746  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-06 04:38:07.747 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-06 04:38:07.747 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-06 04:38:07.748  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-06 04:38:07.749  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-06 04:38:07.749 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:38:07.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:38:07.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:38:07.751 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:38:07.751 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:38:07.752 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:38:07.752 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:38:07.753 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:38:07.753 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:38:07.754 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-06 04:38:07.757 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 327306651452967168171431762997721169221923337905
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Feb 06 02:47:04 UTC 2022
           Final Date: Fri Feb 06 02:47:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ac:d0:14:77:77:88:a1:77:a0:97:13:9a:5e:2f:a3:24:ce:f0:8a:0a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6287820d0f62db1067e36417fdb0bd5e2b05198a
                       0a1fd5de1dc5117da92b615d2f376906b026a21a
                       f86a3cd0c95799cf412afb92e01bda37b514fc21
                       218b7dc9968d533be2e8d4fdfa9809afeaaef860
                       765db0d70f031dfb3565c87cce6b5fb292e8af84
                       3a02645c93af180e55bd78a13a153c9cbe5e43d4
                       c6cf7e893257d8a21b50f239090b04ff2d0fdc00
                       0123363b0903396c61244ee1485e7f2ce6acd8b8
                       b532d7490252d521af2032f586417cad23d91f6b
                       ff1b37c976b3e53cb506e2acb8e3ad9e3556766f
                       2474aafc46818d5cb8762eb2f25d3ed20f524b44
                       bca91916f2f50d89766c7bfe2a48fc4e77853882
                       04e78959d8c60cf4644147f5255d5ffc90a477f0
                       d271e02096d35403bdec0d86fafa0e0090200802
                       0c7dc3a776c3f08c470a6cbe092eb4b232918cfd
                       d14169693970f53474d574e0812bc5784a42fdbf
                       1d0bcfa5317b2644665cd4377b545b6284797256
                       ad224fcbb6eb167af3e2003e5bcf49ef07d248d1
                       0a7a444ccdc15d60ba39b6a65aaad4a76a32f641
                       c3ae7fc6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [29:ce:6b:04:7e:b2:52:03:ba:ac:aa:8a:61:ef:56:fb:83:2a:28:07]
            modulus: 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
    public exponent: 10001

] 
2022-02-06 04:40:59.462  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-06 04:40:59.463 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-06 04:40:59.465 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-06 04:40:59.465 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-06 04:40:59.466  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-06 04:40:59.466  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-06 04:40:59.467  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-06 04:40:59.467 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-06 04:40:59.467 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-06 04:40:59.467 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-06 04:40:59.472 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-06 04:40:59.472 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-06 04:40:59.472 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-06 04:40:59.472 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-06 04:40:59.558  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-06 04:40:59.559  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-06 04:40:59.559 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-06 04:40:59.560 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-06 04:40:59.561  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-06 04:40:59.561  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-06 04:40:59.561 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:40:59.561 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:40:59.562 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:40:59.562 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:40:59.562 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:40:59.562 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:40:59.563 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:40:59.563 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:40:59.563 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:40:59.564 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-06 04:40:59.566 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 327306651452967168171431762997721169221923337905
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Feb 06 02:47:04 UTC 2022
           Final Date: Fri Feb 06 02:47:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ac:d0:14:77:77:88:a1:77:a0:97:13:9a:5e:2f:a3:24:ce:f0:8a:0a]
            modulus: cac1eececf132d62285bcf46e2ddf86841ede9c32b678a7f75d10d14cca46ff8d0826c4e030575d387ed0c09dbf0ca932875478c13c476829c91792e04da1a92ae4a36a62baf679f0ef39f564c0dc947a4e887bfd28337555521a32dc9a7280b9f1e83a9e960743714eb1e24f5117c1d85bff824ea1eadd036da55eb13ea7db2b9b26bfa3980f48c99b448429cf47cf7fc5fc0466b1890eb8dead4137c4dbe3ef141d0a6b0fd3c0645db4ccd9ff049b3873d1b5fb2b046e2a773d46dc0b403501cce931c6a35cb54ccba6f3f99797f47f2c66c88888e4820d5517d3eed4e33a9fc7bba7629e93f6007307be59751bbe0279dddc4c72aed56ba5aff3383a410442020e3a26f0ec3af7c85b1a53c2486f29238523b6ebed2f0b46206e09aafcd7944b512fc6d8603bf0b31e0d389b8653ba3bdd82bb0b05eb42c37d46fc2aa0225d34d7b94c22a896858ede28b6b77edd784ea9e2e4418e07fc5d4e17ddfcdb1fc75b173a4d0a1a2c047ca2bf954b289ca971c22930f4160bff7177795e2752325
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6287820d0f62db1067e36417fdb0bd5e2b05198a
                       0a1fd5de1dc5117da92b615d2f376906b026a21a
                       f86a3cd0c95799cf412afb92e01bda37b514fc21
                       218b7dc9968d533be2e8d4fdfa9809afeaaef860
                       765db0d70f031dfb3565c87cce6b5fb292e8af84
                       3a02645c93af180e55bd78a13a153c9cbe5e43d4
                       c6cf7e893257d8a21b50f239090b04ff2d0fdc00
                       0123363b0903396c61244ee1485e7f2ce6acd8b8
                       b532d7490252d521af2032f586417cad23d91f6b
                       ff1b37c976b3e53cb506e2acb8e3ad9e3556766f
                       2474aafc46818d5cb8762eb2f25d3ed20f524b44
                       bca91916f2f50d89766c7bfe2a48fc4e77853882
                       04e78959d8c60cf4644147f5255d5ffc90a477f0
                       d271e02096d35403bdec0d86fafa0e0090200802
                       0c7dc3a776c3f08c470a6cbe092eb4b232918cfd
                       d14169693970f53474d574e0812bc5784a42fdbf
                       1d0bcfa5317b2644665cd4377b545b6284797256
                       ad224fcbb6eb167af3e2003e5bcf49ef07d248d1
                       0a7a444ccdc15d60ba39b6a65aaad4a76a32f641
                       c3ae7fc6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:88:1c:d7:a9:82:c3:0e:ff:5a:a0:9e:fb:ce:97:87:89:54:0c:4a]
            modulus: 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
    public exponent: 10001

] 
2022-02-06 04:44:02.566  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-06 04:44:02.568 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-06 04:44:02.569 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-06 04:44:02.569 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-06 04:44:02.570  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-06 04:44:02.570  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-06 04:44:02.570  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-06 04:44:02.570 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-06 04:44:02.571 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-06 04:44:02.571 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-06 04:44:02.577 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-06 04:44:02.577 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-06 04:44:02.577 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-06 04:44:02.578 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-06 04:44:02.722  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-06 04:44:02.723  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-06 04:44:02.746 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-06 04:44:02.747 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-06 04:44:02.748  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-06 04:44:02.748  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-06 04:44:02.748 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:44:02.749 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:44:02.749 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:44:02.749 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:44:02.750 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:44:02.750 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:44:02.750 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:44:02.750 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:44:02.751 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:44:02.751 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-06 04:44:02.754 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 327306651452967168171431762997721169221923337905
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Feb 06 02:47:04 UTC 2022
           Final Date: Fri Feb 06 02:47:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ac:d0:14:77:77:88:a1:77:a0:97:13:9a:5e:2f:a3:24:ce:f0:8a:0a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6287820d0f62db1067e36417fdb0bd5e2b05198a
                       0a1fd5de1dc5117da92b615d2f376906b026a21a
                       f86a3cd0c95799cf412afb92e01bda37b514fc21
                       218b7dc9968d533be2e8d4fdfa9809afeaaef860
                       765db0d70f031dfb3565c87cce6b5fb292e8af84
                       3a02645c93af180e55bd78a13a153c9cbe5e43d4
                       c6cf7e893257d8a21b50f239090b04ff2d0fdc00
                       0123363b0903396c61244ee1485e7f2ce6acd8b8
                       b532d7490252d521af2032f586417cad23d91f6b
                       ff1b37c976b3e53cb506e2acb8e3ad9e3556766f
                       2474aafc46818d5cb8762eb2f25d3ed20f524b44
                       bca91916f2f50d89766c7bfe2a48fc4e77853882
                       04e78959d8c60cf4644147f5255d5ffc90a477f0
                       d271e02096d35403bdec0d86fafa0e0090200802
                       0c7dc3a776c3f08c470a6cbe092eb4b232918cfd
                       d14169693970f53474d574e0812bc5784a42fdbf
                       1d0bcfa5317b2644665cd4377b545b6284797256
                       ad224fcbb6eb167af3e2003e5bcf49ef07d248d1
                       0a7a444ccdc15d60ba39b6a65aaad4a76a32f641
                       c3ae7fc6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:7f:c9:4c:b8:42:45:3c:bb:18:56:c1:00:77:a1:b9:dc:66:94:d8]
            modulus: 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
    public exponent: 10001

] 
2022-02-06 04:47:22.987  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-06 04:47:22.988 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-06 04:47:22.990 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-06 04:47:22.991 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-06 04:47:22.991  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-06 04:47:22.992  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-06 04:47:22.992  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-06 04:47:22.992 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-06 04:47:22.992 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-06 04:47:22.993 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-06 04:47:22.997 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-06 04:47:22.997 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-06 04:47:22.998 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-06 04:47:22.998 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-06 04:47:23.146  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-06 04:47:23.147  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-06 04:47:23.148 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-06 04:47:23.148 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-06 04:47:23.149  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-06 04:47:23.150  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-06 04:47:23.151 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:47:23.151 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:47:23.151 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:47:23.152 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:47:23.153 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:47:23.153 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:47:23.154 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:47:23.154 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:47:23.155 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:47:23.155 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-06 04:47:23.158 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 327306651452967168171431762997721169221923337905
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Feb 06 02:47:04 UTC 2022
           Final Date: Fri Feb 06 02:47:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ac:d0:14:77:77:88:a1:77:a0:97:13:9a:5e:2f:a3:24:ce:f0:8a:0a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6287820d0f62db1067e36417fdb0bd5e2b05198a
                       0a1fd5de1dc5117da92b615d2f376906b026a21a
                       f86a3cd0c95799cf412afb92e01bda37b514fc21
                       218b7dc9968d533be2e8d4fdfa9809afeaaef860
                       765db0d70f031dfb3565c87cce6b5fb292e8af84
                       3a02645c93af180e55bd78a13a153c9cbe5e43d4
                       c6cf7e893257d8a21b50f239090b04ff2d0fdc00
                       0123363b0903396c61244ee1485e7f2ce6acd8b8
                       b532d7490252d521af2032f586417cad23d91f6b
                       ff1b37c976b3e53cb506e2acb8e3ad9e3556766f
                       2474aafc46818d5cb8762eb2f25d3ed20f524b44
                       bca91916f2f50d89766c7bfe2a48fc4e77853882
                       04e78959d8c60cf4644147f5255d5ffc90a477f0
                       d271e02096d35403bdec0d86fafa0e0090200802
                       0c7dc3a776c3f08c470a6cbe092eb4b232918cfd
                       d14169693970f53474d574e0812bc5784a42fdbf
                       1d0bcfa5317b2644665cd4377b545b6284797256
                       ad224fcbb6eb167af3e2003e5bcf49ef07d248d1
                       0a7a444ccdc15d60ba39b6a65aaad4a76a32f641
                       c3ae7fc6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7f:3c:b7:ba:45:ab:9a:59:c6:df:ac:d5:36:13:ef:90:0b:db:7a:6e]
            modulus: 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
    public exponent: 10001

] 
2022-02-06 04:51:27.411  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-06 04:51:27.412 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-06 04:51:27.414 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-06 04:51:27.414 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-06 04:51:27.415  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-06 04:51:27.415  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-06 04:51:27.415  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-06 04:51:27.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-06 04:51:27.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-06 04:51:27.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-06 04:51:27.420 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-06 04:51:27.421 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-06 04:51:27.421 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-06 04:51:27.421 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-06 04:51:27.521  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-06 04:51:27.522  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-06 04:51:27.522 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-06 04:51:27.522 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-06 04:51:27.546  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-06 04:51:27.547  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-06 04:51:27.547 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:51:27.547 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:51:27.548 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:51:27.548 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:51:27.549 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:51:27.549 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:51:27.549 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-06 04:51:27.549 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-06 04:51:27.550 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-06 04:51:27.550 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-06 04:51:27.553 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 327306651452967168171431762997721169221923337905
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Feb 06 02:47:04 UTC 2022
           Final Date: Fri Feb 06 02:47:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ac:d0:14:77:77:88:a1:77:a0:97:13:9a:5e:2f:a3:24:ce:f0:8a:0a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6287820d0f62db1067e36417fdb0bd5e2b05198a
                       0a1fd5de1dc5117da92b615d2f376906b026a21a
                       f86a3cd0c95799cf412afb92e01bda37b514fc21
                       218b7dc9968d533be2e8d4fdfa9809afeaaef860
                       765db0d70f031dfb3565c87cce6b5fb292e8af84
                       3a02645c93af180e55bd78a13a153c9cbe5e43d4
                       c6cf7e893257d8a21b50f239090b04ff2d0fdc00
                       0123363b0903396c61244ee1485e7f2ce6acd8b8
                       b532d7490252d521af2032f586417cad23d91f6b
                       ff1b37c976b3e53cb506e2acb8e3ad9e3556766f
                       2474aafc46818d5cb8762eb2f25d3ed20f524b44
                       bca91916f2f50d89766c7bfe2a48fc4e77853882
                       04e78959d8c60cf4644147f5255d5ffc90a477f0
                       d271e02096d35403bdec0d86fafa0e0090200802
                       0c7dc3a776c3f08c470a6cbe092eb4b232918cfd
                       d14169693970f53474d574e0812bc5784a42fdbf
                       1d0bcfa5317b2644665cd4377b545b6284797256
                       ad224fcbb6eb167af3e2003e5bcf49ef07d248d1
                       0a7a444ccdc15d60ba39b6a65aaad4a76a32f641
                       c3ae7fc6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a0:64:3e:4d:fb:b9:5e:c8:97:4e:fd:0f:36:68:43:63:c0:fd:5e:ef]
            modulus: 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
    public exponent: 10001

]