Results

By type

          2022-02-07 02:42:58,638 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-02-07 02:43:03,552 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-02-07 02:43:06.633  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Feb 07, 2022 2:43:15 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Feb 07, 2022 2:43:15 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Feb 07, 2022 2:43:15 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Feb 07, 2022 2:43:15 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-02-07 02:43:17.754 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-02-07 02:43:19.046  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-02-07 02:43:19.734  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-02-07 02:43:22.647 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-02-07 02:43:22.649 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-02-07 02:43:22.650 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-02-07 02:43:22.652 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-02-07 02:43:22.934 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-02-07 02:43:22.939 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-02-07 02:43:23.534 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-02-07 02:43:28.145 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Feb 07, 2022 2:43:31 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-02-07 02:43:32.656  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 37.317 seconds (JVM running for 45.359)
Feb 07, 2022 2:43:41 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-02-07 02:44:49.151  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-07 02:44:49.233 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-07 02:44:49.437 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-02-07 02:44:49.441 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-07 02:44:49.539  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-02-07 02:44:49.542  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-07 02:44:49.544  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-07 02:44:49.545 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-07 02:44:49.545 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-07 02:44:49.548 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-07 02:44:49.633 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-07 02:44:49.636 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-07 02:44:49.748 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-07 02:44:49.751 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-07 02:44:49.752 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-07 02:44:49.754 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-07 02:44:51.252  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-07 02:44:51.254  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-07 02:44:51.255 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-07 02:44:51.256 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-07 02:44:51.332  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-07 02:44:51.333  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-07 02:44:51.334 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 02:44:51.334 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 02:44:51.335 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 02:44:51.347 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 02:44:51.347 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 02:44:51.348 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 02:44:51.353 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 02:44:51.353 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 02:44:51.353 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 02:44:51.354 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-07 02:44:51.543 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 317405221814013758456971313266948421898681619760
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Feb 07 02:35:17 UTC 2022
           Final Date: Sat Feb 07 02:35:16 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7f:d9:0f:16:9b:56:bb:65:50:10:ed:aa:5a:f4:0f:dd:d3:5c:35:31]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad289fb08e670cdf6d417a2577866e358a7af8d8
                       068a1f052e1b1ff91022a7c1571bc5ed307a05b3
                       3d467896f45db0c57166d8879d81858890798cbf
                       51e8102630bec6c51f8357d6ab67f4b6071c571f
                       32a4b41e73134ac5fe355815434d02e61f7a0b00
                       163393d9ceffc1f44291e939965658586191e842
                       a82e854cf301b7781e2f3afa10a6eec12745062f
                       9026404771eda91d941a8b3d10569c6f030f4f71
                       263870d1e63405db047b737582603dcc562097fb
                       f9d0f242a9d8c4c3bb5365d9f0077d9c5a4882da
                       098f3d0ff585e73bf56415f60e0bce05f54d96f0
                       8bea6012aeee7bec09a4d04fbabb2d094de9e623
                       daa19dc007249ce420fbf27f3dc8d22a8f725d3f
                       cf98576cfb504005271d9bc985cf56ee3abd9eaf
                       9bbebfa6c0f3e7114ab4b565adf610d43db40e9c
                       0de105ed4844b57cd5ff487b4e9bb1c4812f8181
                       2755dc9416c55b797937d348f51d88938b28d1ea
                       ef0265c487202cf8c20dfa4ac94f038c99817611
                       edd554cf7faaeec75b7158685e29726fc720c2c2
                       43cd78c6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:33:16:00:fe:54:5e:d1:46:eb:4a:9e:38:f6:21:db:a8:4f:e3:68]
            modulus: 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
    public exponent: 10001

] 
2022-02-07 04:14:29.575  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-07 04:14:29.578 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-07 04:14:29.581 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-07 04:14:29.582 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-07 04:14:29.583  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-07 04:14:29.584  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-07 04:14:29.584  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-07 04:14:29.584 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-07 04:14:29.584 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-07 04:14:29.585 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-07 04:14:29.633 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-07 04:14:29.633 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-07 04:14:29.634 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-07 04:14:29.634 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-07 04:14:29.762  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-07 04:14:29.763  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-07 04:14:29.763 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-07 04:14:29.763 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-07 04:14:29.766  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-07 04:14:29.767  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-07 04:14:29.767 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:14:29.767 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:14:29.767 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:14:29.833 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:14:29.833 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:14:29.834 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:14:29.835 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:14:29.835 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:14:29.836 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:14:29.838 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-07 04:14:29.842 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 317405221814013758456971313266948421898681619760
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Feb 07 02:35:17 UTC 2022
           Final Date: Sat Feb 07 02:35:16 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7f:d9:0f:16:9b:56:bb:65:50:10:ed:aa:5a:f4:0f:dd:d3:5c:35:31]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad289fb08e670cdf6d417a2577866e358a7af8d8
                       068a1f052e1b1ff91022a7c1571bc5ed307a05b3
                       3d467896f45db0c57166d8879d81858890798cbf
                       51e8102630bec6c51f8357d6ab67f4b6071c571f
                       32a4b41e73134ac5fe355815434d02e61f7a0b00
                       163393d9ceffc1f44291e939965658586191e842
                       a82e854cf301b7781e2f3afa10a6eec12745062f
                       9026404771eda91d941a8b3d10569c6f030f4f71
                       263870d1e63405db047b737582603dcc562097fb
                       f9d0f242a9d8c4c3bb5365d9f0077d9c5a4882da
                       098f3d0ff585e73bf56415f60e0bce05f54d96f0
                       8bea6012aeee7bec09a4d04fbabb2d094de9e623
                       daa19dc007249ce420fbf27f3dc8d22a8f725d3f
                       cf98576cfb504005271d9bc985cf56ee3abd9eaf
                       9bbebfa6c0f3e7114ab4b565adf610d43db40e9c
                       0de105ed4844b57cd5ff487b4e9bb1c4812f8181
                       2755dc9416c55b797937d348f51d88938b28d1ea
                       ef0265c487202cf8c20dfa4ac94f038c99817611
                       edd554cf7faaeec75b7158685e29726fc720c2c2
                       43cd78c6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a4:00:31:5c:30:25:71:42:ce:37:cb:d7:99:3a:0d:ef:b9:72:f3:b3]
            modulus: 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
    public exponent: 10001

] 
2022-02-07 04:17:56.027  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-07 04:17:56.028 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-07 04:17:56.030 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-07 04:17:56.031 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-07 04:17:56.031  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-07 04:17:56.032  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-07 04:17:56.032  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-07 04:17:56.032 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-07 04:17:56.032 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-07 04:17:56.033 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-07 04:17:56.038 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-07 04:17:56.039 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-07 04:17:56.039 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-07 04:17:56.039 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-07 04:17:56.137  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-07 04:17:56.138  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-07 04:17:56.138 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-07 04:17:56.138 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-07 04:17:56.140  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-07 04:17:56.141  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-07 04:17:56.142 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:17:56.142 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:17:56.142 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:17:56.143 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:17:56.143 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:17:56.144 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:17:56.145 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:17:56.145 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:17:56.145 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:17:56.147 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-07 04:17:56.151 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 317405221814013758456971313266948421898681619760
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Feb 07 02:35:17 UTC 2022
           Final Date: Sat Feb 07 02:35:16 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7f:d9:0f:16:9b:56:bb:65:50:10:ed:aa:5a:f4:0f:dd:d3:5c:35:31]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad289fb08e670cdf6d417a2577866e358a7af8d8
                       068a1f052e1b1ff91022a7c1571bc5ed307a05b3
                       3d467896f45db0c57166d8879d81858890798cbf
                       51e8102630bec6c51f8357d6ab67f4b6071c571f
                       32a4b41e73134ac5fe355815434d02e61f7a0b00
                       163393d9ceffc1f44291e939965658586191e842
                       a82e854cf301b7781e2f3afa10a6eec12745062f
                       9026404771eda91d941a8b3d10569c6f030f4f71
                       263870d1e63405db047b737582603dcc562097fb
                       f9d0f242a9d8c4c3bb5365d9f0077d9c5a4882da
                       098f3d0ff585e73bf56415f60e0bce05f54d96f0
                       8bea6012aeee7bec09a4d04fbabb2d094de9e623
                       daa19dc007249ce420fbf27f3dc8d22a8f725d3f
                       cf98576cfb504005271d9bc985cf56ee3abd9eaf
                       9bbebfa6c0f3e7114ab4b565adf610d43db40e9c
                       0de105ed4844b57cd5ff487b4e9bb1c4812f8181
                       2755dc9416c55b797937d348f51d88938b28d1ea
                       ef0265c487202cf8c20dfa4ac94f038c99817611
                       edd554cf7faaeec75b7158685e29726fc720c2c2
                       43cd78c6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [25:ec:4c:a1:77:5f:27:99:a3:b1:52:37:58:e1:19:d1:c8:9c:65:5b]
            modulus: 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
    public exponent: 10001

] 
2022-02-07 04:20:02.179  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-07 04:20:02.181 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-07 04:20:02.182 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-07 04:20:02.183 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-07 04:20:02.184  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-07 04:20:02.184  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-07 04:20:02.184  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-07 04:20:02.184 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-07 04:20:02.185 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-07 04:20:02.185 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-07 04:20:02.188 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-07 04:20:02.189 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-07 04:20:02.189 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-07 04:20:02.189 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-07 04:20:02.302  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-07 04:20:02.303  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-07 04:20:02.304 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-07 04:20:02.304 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-07 04:20:02.306  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-07 04:20:02.307  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-07 04:20:02.308 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:20:02.308 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:20:02.309 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:20:02.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:20:02.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:20:02.311 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:20:02.311 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:20:02.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:20:02.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:20:02.313 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-07 04:20:02.332 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 317405221814013758456971313266948421898681619760
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Feb 07 02:35:17 UTC 2022
           Final Date: Sat Feb 07 02:35:16 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7f:d9:0f:16:9b:56:bb:65:50:10:ed:aa:5a:f4:0f:dd:d3:5c:35:31]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad289fb08e670cdf6d417a2577866e358a7af8d8
                       068a1f052e1b1ff91022a7c1571bc5ed307a05b3
                       3d467896f45db0c57166d8879d81858890798cbf
                       51e8102630bec6c51f8357d6ab67f4b6071c571f
                       32a4b41e73134ac5fe355815434d02e61f7a0b00
                       163393d9ceffc1f44291e939965658586191e842
                       a82e854cf301b7781e2f3afa10a6eec12745062f
                       9026404771eda91d941a8b3d10569c6f030f4f71
                       263870d1e63405db047b737582603dcc562097fb
                       f9d0f242a9d8c4c3bb5365d9f0077d9c5a4882da
                       098f3d0ff585e73bf56415f60e0bce05f54d96f0
                       8bea6012aeee7bec09a4d04fbabb2d094de9e623
                       daa19dc007249ce420fbf27f3dc8d22a8f725d3f
                       cf98576cfb504005271d9bc985cf56ee3abd9eaf
                       9bbebfa6c0f3e7114ab4b565adf610d43db40e9c
                       0de105ed4844b57cd5ff487b4e9bb1c4812f8181
                       2755dc9416c55b797937d348f51d88938b28d1ea
                       ef0265c487202cf8c20dfa4ac94f038c99817611
                       edd554cf7faaeec75b7158685e29726fc720c2c2
                       43cd78c6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [71:84:41:00:83:83:a1:e3:9d:f6:91:50:ec:8e:37:73:73:59:3e:04]
            modulus: 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
    public exponent: 10001

] 
2022-02-07 04:22:42.446  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-07 04:22:42.448 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-07 04:22:42.449 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-07 04:22:42.450 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-07 04:22:42.451  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-07 04:22:42.452  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-07 04:22:42.452  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-07 04:22:42.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-07 04:22:42.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-07 04:22:42.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-07 04:22:42.458 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-07 04:22:42.458 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-07 04:22:42.459 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-07 04:22:42.459 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-07 04:22:42.552  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-07 04:22:42.553  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-07 04:22:42.553 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-07 04:22:42.554 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-07 04:22:42.558  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-07 04:22:42.559  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-07 04:22:42.559 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:22:42.560 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:22:42.560 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:22:42.561 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:22:42.561 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:22:42.561 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:22:42.562 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:22:42.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:22:42.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:22:42.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-07 04:22:42.638 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 317405221814013758456971313266948421898681619760
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Feb 07 02:35:17 UTC 2022
           Final Date: Sat Feb 07 02:35:16 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7f:d9:0f:16:9b:56:bb:65:50:10:ed:aa:5a:f4:0f:dd:d3:5c:35:31]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad289fb08e670cdf6d417a2577866e358a7af8d8
                       068a1f052e1b1ff91022a7c1571bc5ed307a05b3
                       3d467896f45db0c57166d8879d81858890798cbf
                       51e8102630bec6c51f8357d6ab67f4b6071c571f
                       32a4b41e73134ac5fe355815434d02e61f7a0b00
                       163393d9ceffc1f44291e939965658586191e842
                       a82e854cf301b7781e2f3afa10a6eec12745062f
                       9026404771eda91d941a8b3d10569c6f030f4f71
                       263870d1e63405db047b737582603dcc562097fb
                       f9d0f242a9d8c4c3bb5365d9f0077d9c5a4882da
                       098f3d0ff585e73bf56415f60e0bce05f54d96f0
                       8bea6012aeee7bec09a4d04fbabb2d094de9e623
                       daa19dc007249ce420fbf27f3dc8d22a8f725d3f
                       cf98576cfb504005271d9bc985cf56ee3abd9eaf
                       9bbebfa6c0f3e7114ab4b565adf610d43db40e9c
                       0de105ed4844b57cd5ff487b4e9bb1c4812f8181
                       2755dc9416c55b797937d348f51d88938b28d1ea
                       ef0265c487202cf8c20dfa4ac94f038c99817611
                       edd554cf7faaeec75b7158685e29726fc720c2c2
                       43cd78c6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e1:77:9a:d9:67:b5:35:b6:b2:e5:40:d4:46:73:04:04:b8:ed:e9:ce]
            modulus: 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
    public exponent: 10001

] 
2022-02-07 04:25:33.793  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-07 04:25:33.794 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-07 04:25:33.795 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-07 04:25:33.796 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-07 04:25:33.796  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-07 04:25:33.797  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-07 04:25:33.798  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-07 04:25:33.798 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-07 04:25:33.798 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-07 04:25:33.799 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-07 04:25:33.804 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-07 04:25:33.804 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-07 04:25:33.804 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-07 04:25:33.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-07 04:25:33.905  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-07 04:25:33.906  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-07 04:25:33.906 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-07 04:25:33.907 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-07 04:25:33.909  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-07 04:25:33.909  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-07 04:25:33.910 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:25:33.910 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:25:33.911 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:25:33.912 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:25:33.912 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:25:33.913 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:25:33.914 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:25:33.915 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:25:33.915 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:25:33.916 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-07 04:25:33.934 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 317405221814013758456971313266948421898681619760
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Feb 07 02:35:17 UTC 2022
           Final Date: Sat Feb 07 02:35:16 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7f:d9:0f:16:9b:56:bb:65:50:10:ed:aa:5a:f4:0f:dd:d3:5c:35:31]
            modulus: c2a17c8bc5baec84fe0c3610eb1c626cdcb3ba71a5f7e4988e721b15449327988b97ff56bf8e2cfa02a15791844867830d1df44df23c0285bad72fccbdbe9dde85f00e12d532a9dcdf539ea7554a935b78deb213193ab8380ed32406371715891060d65472ac6bfe5176e6ae5b56f1ffb16a48c204d9b3a0881e0e7babae73ce9c8e9bd8d990617ccbd491ba47ad057da4d078f235c28e4a3a259393e5f9c1d2ec917913cf2a473b109eaa8034e132f1cf7adc9ceb1a31bc6a803fe3b2dc9230493835fa5511cdd79e0776df3f8e8ada23830f1c683ce2da7eaa2b142160baca3e16e331c890a2a57ef4ca9bb4bf72dc7b8cfc6560244a76bf267ea20b957621aa7c73aeedc20062a907aa5aca54c6aea7604a55b325a6b8d8347bb09e25b513022b5c2db4423d3b8af428bbf1956946354e5e2574226cb5b3ec34f4a6133d68733b68913dc697f925b0dd7d47dbdce2baf33dc2e509aeaba433f12fe513d709256b252b6467d8d133f1847fc7bbd4e6074cf58d3f76720ade16ef3a112e0eab
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad289fb08e670cdf6d417a2577866e358a7af8d8
                       068a1f052e1b1ff91022a7c1571bc5ed307a05b3
                       3d467896f45db0c57166d8879d81858890798cbf
                       51e8102630bec6c51f8357d6ab67f4b6071c571f
                       32a4b41e73134ac5fe355815434d02e61f7a0b00
                       163393d9ceffc1f44291e939965658586191e842
                       a82e854cf301b7781e2f3afa10a6eec12745062f
                       9026404771eda91d941a8b3d10569c6f030f4f71
                       263870d1e63405db047b737582603dcc562097fb
                       f9d0f242a9d8c4c3bb5365d9f0077d9c5a4882da
                       098f3d0ff585e73bf56415f60e0bce05f54d96f0
                       8bea6012aeee7bec09a4d04fbabb2d094de9e623
                       daa19dc007249ce420fbf27f3dc8d22a8f725d3f
                       cf98576cfb504005271d9bc985cf56ee3abd9eaf
                       9bbebfa6c0f3e7114ab4b565adf610d43db40e9c
                       0de105ed4844b57cd5ff487b4e9bb1c4812f8181
                       2755dc9416c55b797937d348f51d88938b28d1ea
                       ef0265c487202cf8c20dfa4ac94f038c99817611
                       edd554cf7faaeec75b7158685e29726fc720c2c2
                       43cd78c6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ea:61:02:3c:2d:f4:b6:1a:9f:2d:62:c5:1b:0b:f2:0e:12:de:3d:11]
            modulus: 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
    public exponent: 10001

] 
2022-02-07 04:28:39.242  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-07 04:28:39.243 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-07 04:28:39.244 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-07 04:28:39.245 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-07 04:28:39.245  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-07 04:28:39.245  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-07 04:28:39.246  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-07 04:28:39.246 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-07 04:28:39.246 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-07 04:28:39.246 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-07 04:28:39.251 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-07 04:28:39.251 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-07 04:28:39.252 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-07 04:28:39.252 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-07 04:28:39.329  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-07 04:28:39.329  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-07 04:28:39.330 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-07 04:28:39.330 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-07 04:28:39.331  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-07 04:28:39.332  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-07 04:28:39.333 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:28:39.333 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:28:39.333 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:28:39.334 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:28:39.334 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:28:39.335 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:28:39.336 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:28:39.336 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:28:39.336 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:28:39.337 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-07 04:28:39.340 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 317405221814013758456971313266948421898681619760
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Feb 07 02:35:17 UTC 2022
           Final Date: Sat Feb 07 02:35:16 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7f:d9:0f:16:9b:56:bb:65:50:10:ed:aa:5a:f4:0f:dd:d3:5c:35:31]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad289fb08e670cdf6d417a2577866e358a7af8d8
                       068a1f052e1b1ff91022a7c1571bc5ed307a05b3
                       3d467896f45db0c57166d8879d81858890798cbf
                       51e8102630bec6c51f8357d6ab67f4b6071c571f
                       32a4b41e73134ac5fe355815434d02e61f7a0b00
                       163393d9ceffc1f44291e939965658586191e842
                       a82e854cf301b7781e2f3afa10a6eec12745062f
                       9026404771eda91d941a8b3d10569c6f030f4f71
                       263870d1e63405db047b737582603dcc562097fb
                       f9d0f242a9d8c4c3bb5365d9f0077d9c5a4882da
                       098f3d0ff585e73bf56415f60e0bce05f54d96f0
                       8bea6012aeee7bec09a4d04fbabb2d094de9e623
                       daa19dc007249ce420fbf27f3dc8d22a8f725d3f
                       cf98576cfb504005271d9bc985cf56ee3abd9eaf
                       9bbebfa6c0f3e7114ab4b565adf610d43db40e9c
                       0de105ed4844b57cd5ff487b4e9bb1c4812f8181
                       2755dc9416c55b797937d348f51d88938b28d1ea
                       ef0265c487202cf8c20dfa4ac94f038c99817611
                       edd554cf7faaeec75b7158685e29726fc720c2c2
                       43cd78c6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:e9:f4:69:c5:1f:09:8a:00:27:53:30:8b:6c:48:c0:39:c0:87:c3]
            modulus: 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
    public exponent: 10001

] 
2022-02-07 04:32:44.945  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-07 04:32:44.946 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-07 04:32:44.948 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-07 04:32:44.948 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-07 04:32:44.949  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-07 04:32:44.949  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-07 04:32:44.950  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-07 04:32:44.950 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-07 04:32:44.950 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-07 04:32:44.951 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-07 04:32:44.955 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-07 04:32:44.955 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-07 04:32:44.955 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-07 04:32:44.955 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-07 04:32:45.113  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-07 04:32:45.114  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-07 04:32:45.114 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-07 04:32:45.115 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-07 04:32:45.117  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-07 04:32:45.117  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-07 04:32:45.117 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:32:45.117 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:32:45.118 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:32:45.118 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:32:45.118 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:32:45.118 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:32:45.119 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-07 04:32:45.119 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-07 04:32:45.119 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-07 04:32:45.120 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-07 04:32:45.134 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 317405221814013758456971313266948421898681619760
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Feb 07 02:35:17 UTC 2022
           Final Date: Sat Feb 07 02:35:16 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7f:d9:0f:16:9b:56:bb:65:50:10:ed:aa:5a:f4:0f:dd:d3:5c:35:31]
            modulus: c2a17c8bc5baec84fe0c3610eb1c626cdcb3ba71a5f7e4988e721b15449327988b97ff56bf8e2cfa02a15791844867830d1df44df23c0285bad72fccbdbe9dde85f00e12d532a9dcdf539ea7554a935b78deb213193ab8380ed32406371715891060d65472ac6bfe5176e6ae5b56f1ffb16a48c204d9b3a0881e0e7babae73ce9c8e9bd8d990617ccbd491ba47ad057da4d078f235c28e4a3a259393e5f9c1d2ec917913cf2a473b109eaa8034e132f1cf7adc9ceb1a31bc6a803fe3b2dc9230493835fa5511cdd79e0776df3f8e8ada23830f1c683ce2da7eaa2b142160baca3e16e331c890a2a57ef4ca9bb4bf72dc7b8cfc6560244a76bf267ea20b957621aa7c73aeedc20062a907aa5aca54c6aea7604a55b325a6b8d8347bb09e25b513022b5c2db4423d3b8af428bbf1956946354e5e2574226cb5b3ec34f4a6133d68733b68913dc697f925b0dd7d47dbdce2baf33dc2e509aeaba433f12fe513d709256b252b6467d8d133f1847fc7bbd4e6074cf58d3f76720ade16ef3a112e0eab
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad289fb08e670cdf6d417a2577866e358a7af8d8
                       068a1f052e1b1ff91022a7c1571bc5ed307a05b3
                       3d467896f45db0c57166d8879d81858890798cbf
                       51e8102630bec6c51f8357d6ab67f4b6071c571f
                       32a4b41e73134ac5fe355815434d02e61f7a0b00
                       163393d9ceffc1f44291e939965658586191e842
                       a82e854cf301b7781e2f3afa10a6eec12745062f
                       9026404771eda91d941a8b3d10569c6f030f4f71
                       263870d1e63405db047b737582603dcc562097fb
                       f9d0f242a9d8c4c3bb5365d9f0077d9c5a4882da
                       098f3d0ff585e73bf56415f60e0bce05f54d96f0
                       8bea6012aeee7bec09a4d04fbabb2d094de9e623
                       daa19dc007249ce420fbf27f3dc8d22a8f725d3f
                       cf98576cfb504005271d9bc985cf56ee3abd9eaf
                       9bbebfa6c0f3e7114ab4b565adf610d43db40e9c
                       0de105ed4844b57cd5ff487b4e9bb1c4812f8181
                       2755dc9416c55b797937d348f51d88938b28d1ea
                       ef0265c487202cf8c20dfa4ac94f038c99817611
                       edd554cf7faaeec75b7158685e29726fc720c2c2
                       43cd78c6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:69:e7:7f:fc:36:86:07:dc:f4:14:20:22:ea:79:bd:63:30:e2:1b]
            modulus: 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
    public exponent: 10001

]