Results

By type

          2022-02-15 02:51:44,440 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-02-15 02:51:49,421 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-02-15 02:51:52.321  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Feb 15, 2022 2:52:01 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Feb 15, 2022 2:52:01 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Feb 15, 2022 2:52:01 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Feb 15, 2022 2:52:01 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-02-15 02:52:04.030 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-02-15 02:52:05.221  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-02-15 02:52:05.843  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-02-15 02:52:08.729 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-02-15 02:52:08.733 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-02-15 02:52:08.734 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-02-15 02:52:08.737 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-02-15 02:52:08.926 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-02-15 02:52:08.930 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-02-15 02:52:09.442 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-02-15 02:52:14.329 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Feb 15, 2022 2:52:17 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-02-15 02:52:18.342  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 37.503 seconds (JVM running for 45.272)
Feb 15, 2022 2:52:24 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-02-15 02:53:02.053  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-15 02:53:02.132 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-15 02:53:02.325 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-02-15 02:53:02.330 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-15 02:53:02.340  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-02-15 02:53:02.342  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-15 02:53:02.422  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-15 02:53:02.424 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-15 02:53:02.425 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-15 02:53:02.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-15 02:53:02.434 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-15 02:53:02.437 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-15 02:53:02.635 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-15 02:53:02.640 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-15 02:53:02.641 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-15 02:53:02.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-15 02:53:04.379  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-15 02:53:04.381  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-15 02:53:04.381 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-15 02:53:04.382 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-15 02:53:04.389  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-15 02:53:04.390  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-15 02:53:04.391 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 02:53:04.391 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 02:53:04.391 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 02:53:04.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 02:53:04.431 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 02:53:04.431 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 02:53:04.436 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 02:53:04.437 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 02:53:04.437 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 02:53:04.438 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-15 02:53:04.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 324472902021752919516323716349938730107372121564
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Feb 15 02:48:34 UTC 2022
           Final Date: Sun Feb 15 02:48:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [56:6b:2c:7d:84:ee:c0:ab:9d:ec:ea:9c:de:07:58:bb:4a:de:9d:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 438df857549c4b412f0162b547a02d1a416fcbae
                       14b9112bef095c81d061a4304720746fc2a204e3
                       24b5a39d75469934c484b5f317d7c93090912748
                       9e4b4ff88dd7fbc1322f3f9795cf49fa656b791e
                       13692787cd283546ff05171b610cdcabd5f084b5
                       70082afef30aa6faf63f0d0d07311e16816f0981
                       2d1f96a482416bb5c7093892fe4378efe68e1e09
                       6c2546602ac53bd15a05bdbee22d341751277052
                       5d905e9fd9f1f8f56e750e03a597da5342bb517a
                       7b507864f27bf488176802bb1fba7bce8b3a0f1f
                       0d98082ac331708643ee2207ebd103c5499b4ddf
                       08ff0f00d746e0edc5db62948708cf1eda736148
                       3a4e6abce02753a7e77e5581b5258677cbd45995
                       8132a171bfa6bc1610ab2c815dfc0f4c88d76b33
                       b579bfc7da0bb17767f283657110fa9257905e77
                       4502ea76e7ac7b4a29faad361f48fcb0e1168abb
                       a59020385cec24219bccc9cf33c6a2a80111d54e
                       8398e25ae53a8ebfe3d757f96dbdaca90ccb3e4e
                       5800e2dbd9e148b7bb0b7cb14471112e873ff68b
                       899a2945
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [17:38:0e:58:f7:da:96:c8:67:29:13:ea:f1:57:83:81:c8:6a:93:63]
            modulus: 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
    public exponent: 10001

] 
2022-02-15 04:43:25.029  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-15 04:43:25.031 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-15 04:43:25.033 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-15 04:43:25.033 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-15 04:43:25.034  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-15 04:43:25.035  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-15 04:43:25.035  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-15 04:43:25.035 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-15 04:43:25.036 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-15 04:43:25.036 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-15 04:43:25.044 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-15 04:43:25.044 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-15 04:43:25.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-15 04:43:25.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-15 04:43:25.225  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-15 04:43:25.226  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-15 04:43:25.227 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-15 04:43:25.227 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-15 04:43:25.231  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-15 04:43:25.232  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-15 04:43:25.232 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 04:43:25.232 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 04:43:25.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 04:43:25.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 04:43:25.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 04:43:25.235 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 04:43:25.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 04:43:25.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 04:43:25.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 04:43:25.238 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-15 04:43:25.241 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 324472902021752919516323716349938730107372121564
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Feb 15 02:48:34 UTC 2022
           Final Date: Sun Feb 15 02:48:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [56:6b:2c:7d:84:ee:c0:ab:9d:ec:ea:9c:de:07:58:bb:4a:de:9d:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 438df857549c4b412f0162b547a02d1a416fcbae
                       14b9112bef095c81d061a4304720746fc2a204e3
                       24b5a39d75469934c484b5f317d7c93090912748
                       9e4b4ff88dd7fbc1322f3f9795cf49fa656b791e
                       13692787cd283546ff05171b610cdcabd5f084b5
                       70082afef30aa6faf63f0d0d07311e16816f0981
                       2d1f96a482416bb5c7093892fe4378efe68e1e09
                       6c2546602ac53bd15a05bdbee22d341751277052
                       5d905e9fd9f1f8f56e750e03a597da5342bb517a
                       7b507864f27bf488176802bb1fba7bce8b3a0f1f
                       0d98082ac331708643ee2207ebd103c5499b4ddf
                       08ff0f00d746e0edc5db62948708cf1eda736148
                       3a4e6abce02753a7e77e5581b5258677cbd45995
                       8132a171bfa6bc1610ab2c815dfc0f4c88d76b33
                       b579bfc7da0bb17767f283657110fa9257905e77
                       4502ea76e7ac7b4a29faad361f48fcb0e1168abb
                       a59020385cec24219bccc9cf33c6a2a80111d54e
                       8398e25ae53a8ebfe3d757f96dbdaca90ccb3e4e
                       5800e2dbd9e148b7bb0b7cb14471112e873ff68b
                       899a2945
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c6:7e:6d:f8:ff:0c:e7:3f:37:64:08:56:1a:1a:37:9b:52:90:bb:f3]
            modulus: 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
    public exponent: 10001

] 
2022-02-15 04:47:51.294  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-15 04:47:51.296 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-15 04:47:51.297 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-15 04:47:51.297 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-15 04:47:51.298  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-15 04:47:51.299  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-15 04:47:51.299  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-15 04:47:51.299 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-15 04:47:51.299 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-15 04:47:51.300 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-15 04:47:51.304 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-15 04:47:51.305 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-15 04:47:51.305 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-15 04:47:51.305 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-15 04:47:51.420  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-15 04:47:51.420  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-15 04:47:51.421 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-15 04:47:51.421 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-15 04:47:51.424  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-15 04:47:51.424  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-15 04:47:51.425 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 04:47:51.426 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 04:47:51.426 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 04:47:51.427 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 04:47:51.427 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 04:47:51.428 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 04:47:51.428 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 04:47:51.428 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 04:47:51.429 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 04:47:51.429 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-15 04:47:51.431 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 324472902021752919516323716349938730107372121564
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Feb 15 02:48:34 UTC 2022
           Final Date: Sun Feb 15 02:48:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [56:6b:2c:7d:84:ee:c0:ab:9d:ec:ea:9c:de:07:58:bb:4a:de:9d:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 438df857549c4b412f0162b547a02d1a416fcbae
                       14b9112bef095c81d061a4304720746fc2a204e3
                       24b5a39d75469934c484b5f317d7c93090912748
                       9e4b4ff88dd7fbc1322f3f9795cf49fa656b791e
                       13692787cd283546ff05171b610cdcabd5f084b5
                       70082afef30aa6faf63f0d0d07311e16816f0981
                       2d1f96a482416bb5c7093892fe4378efe68e1e09
                       6c2546602ac53bd15a05bdbee22d341751277052
                       5d905e9fd9f1f8f56e750e03a597da5342bb517a
                       7b507864f27bf488176802bb1fba7bce8b3a0f1f
                       0d98082ac331708643ee2207ebd103c5499b4ddf
                       08ff0f00d746e0edc5db62948708cf1eda736148
                       3a4e6abce02753a7e77e5581b5258677cbd45995
                       8132a171bfa6bc1610ab2c815dfc0f4c88d76b33
                       b579bfc7da0bb17767f283657110fa9257905e77
                       4502ea76e7ac7b4a29faad361f48fcb0e1168abb
                       a59020385cec24219bccc9cf33c6a2a80111d54e
                       8398e25ae53a8ebfe3d757f96dbdaca90ccb3e4e
                       5800e2dbd9e148b7bb0b7cb14471112e873ff68b
                       899a2945
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:08:9a:05:24:a9:f5:c7:b5:4e:d6:80:ec:b8:8b:2d:16:7d:26:b8]
            modulus: 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
    public exponent: 10001

] 
2022-02-15 04:50:24.045  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-15 04:50:24.045 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-15 04:50:24.046 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-15 04:50:24.047 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-15 04:50:24.047  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-15 04:50:24.048  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-15 04:50:24.048  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-15 04:50:24.048 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-15 04:50:24.049 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-15 04:50:24.049 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-15 04:50:24.053 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-15 04:50:24.053 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-15 04:50:24.054 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-15 04:50:24.054 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-15 04:50:24.144  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-15 04:50:24.145  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-15 04:50:24.145 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-15 04:50:24.146 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-15 04:50:24.147  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-15 04:50:24.148  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-15 04:50:24.148 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 04:50:24.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 04:50:24.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 04:50:24.150 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 04:50:24.150 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 04:50:24.150 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 04:50:24.151 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 04:50:24.152 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 04:50:24.152 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 04:50:24.153 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-15 04:50:24.156 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 324472902021752919516323716349938730107372121564
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Feb 15 02:48:34 UTC 2022
           Final Date: Sun Feb 15 02:48:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [56:6b:2c:7d:84:ee:c0:ab:9d:ec:ea:9c:de:07:58:bb:4a:de:9d:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 438df857549c4b412f0162b547a02d1a416fcbae
                       14b9112bef095c81d061a4304720746fc2a204e3
                       24b5a39d75469934c484b5f317d7c93090912748
                       9e4b4ff88dd7fbc1322f3f9795cf49fa656b791e
                       13692787cd283546ff05171b610cdcabd5f084b5
                       70082afef30aa6faf63f0d0d07311e16816f0981
                       2d1f96a482416bb5c7093892fe4378efe68e1e09
                       6c2546602ac53bd15a05bdbee22d341751277052
                       5d905e9fd9f1f8f56e750e03a597da5342bb517a
                       7b507864f27bf488176802bb1fba7bce8b3a0f1f
                       0d98082ac331708643ee2207ebd103c5499b4ddf
                       08ff0f00d746e0edc5db62948708cf1eda736148
                       3a4e6abce02753a7e77e5581b5258677cbd45995
                       8132a171bfa6bc1610ab2c815dfc0f4c88d76b33
                       b579bfc7da0bb17767f283657110fa9257905e77
                       4502ea76e7ac7b4a29faad361f48fcb0e1168abb
                       a59020385cec24219bccc9cf33c6a2a80111d54e
                       8398e25ae53a8ebfe3d757f96dbdaca90ccb3e4e
                       5800e2dbd9e148b7bb0b7cb14471112e873ff68b
                       899a2945
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [28:35:44:b1:2b:a5:f9:58:b5:fe:66:4b:49:21:bc:57:0b:c0:e2:2a]
            modulus: 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
    public exponent: 10001

] 
2022-02-15 04:53:27.977  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-15 04:53:27.979 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-15 04:53:27.981 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-15 04:53:27.982 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-15 04:53:27.983  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-15 04:53:27.986  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-15 04:53:27.986  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-15 04:53:27.987 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-15 04:53:27.987 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-15 04:53:27.988 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-15 04:53:28.021 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-15 04:53:28.021 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-15 04:53:28.022 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-15 04:53:28.022 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-15 04:53:28.121  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-15 04:53:28.123  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-15 04:53:28.124 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-15 04:53:28.125 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-15 04:53:28.132  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-15 04:53:28.133  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-15 04:53:28.134 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 04:53:28.134 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 04:53:28.135 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 04:53:28.135 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 04:53:28.136 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 04:53:28.140 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 04:53:28.144 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 04:53:28.145 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 04:53:28.146 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 04:53:28.146 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-15 04:53:28.227 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 324472902021752919516323716349938730107372121564
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Feb 15 02:48:34 UTC 2022
           Final Date: Sun Feb 15 02:48:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [56:6b:2c:7d:84:ee:c0:ab:9d:ec:ea:9c:de:07:58:bb:4a:de:9d:a8]
            modulus: a309fe03b12b4e89e59f329fcd38a078f4a581811db8804a9891f304c8931a2160b5c0c94851f49e1818cf8737fb1a200b9f0cdf7fb2d6d29b6619a3f016ddd6de2f7ab77f378ee6720411dc6f3bfdf620f99077e80df6d17a6705acf36bb410eb97fc52053821cb09977f0d51a39ba8abc1af75b567d420858676e592058ddaecc7b686cb7b62935fafc8d4765d17ea96a03bac7169c44e707f9624e1ae3370371749548a2fe9ba43b23ca39a476fc8f57ef6d9c3404d8e203cede414dcc2a0bb46a3507354809cbc90b97e4f4d916c8d5d7ecbc37f3d0dcdcc83f8d0d8e33fe82463b96b736c9466de527b1b49f4c2eac752a6d0cad9e4b8c088e0ba2a91acd13442fa0cb061fdce26e7447ee7543373fded1a14ce02d50f927bde9745adaac18ae59bdc8585279dd4fe1e85aaeefadbb6a70ee789e3b86544f1ec10b0f17e02c607361c7aa6b46cc469f2254d296457ab50328790b117dfc2df4d771eeeb625475ade6216d20f0afa92c6d3238bd5aa5810be07944dc219d47e27d7d589ed
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 438df857549c4b412f0162b547a02d1a416fcbae
                       14b9112bef095c81d061a4304720746fc2a204e3
                       24b5a39d75469934c484b5f317d7c93090912748
                       9e4b4ff88dd7fbc1322f3f9795cf49fa656b791e
                       13692787cd283546ff05171b610cdcabd5f084b5
                       70082afef30aa6faf63f0d0d07311e16816f0981
                       2d1f96a482416bb5c7093892fe4378efe68e1e09
                       6c2546602ac53bd15a05bdbee22d341751277052
                       5d905e9fd9f1f8f56e750e03a597da5342bb517a
                       7b507864f27bf488176802bb1fba7bce8b3a0f1f
                       0d98082ac331708643ee2207ebd103c5499b4ddf
                       08ff0f00d746e0edc5db62948708cf1eda736148
                       3a4e6abce02753a7e77e5581b5258677cbd45995
                       8132a171bfa6bc1610ab2c815dfc0f4c88d76b33
                       b579bfc7da0bb17767f283657110fa9257905e77
                       4502ea76e7ac7b4a29faad361f48fcb0e1168abb
                       a59020385cec24219bccc9cf33c6a2a80111d54e
                       8398e25ae53a8ebfe3d757f96dbdaca90ccb3e4e
                       5800e2dbd9e148b7bb0b7cb14471112e873ff68b
                       899a2945
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [aa:1f:51:d8:75:69:50:8e:de:0b:08:0d:87:53:04:c7:89:eb:02:20]
            modulus: ed55c4f4b91a2d9263e964b2e0d1bbe4af2ee2aa4c31873551c0d48520e26195af613bc6a1dfc21d9ae15f3f355100a9b7d6d6f0494c2f18e69fb4bb10dd1c315fa28ac418a48b91e94633b3f6d7ff604e020a1be91cbc39a610719df336747a87b8061e2c032a17f478a88ea3edf3f0f31584edb649b95ecd840ae087b7dd8f38aca9ba9f287d1b38af549231cc82571eabf95618975d8a087b9b403513bc4df0607e0f1f37f8af5ccfb25dde8379c756ad223de9f7ba818ca5485c10f57d6cb82a12bbb2164fa08e4ca39a5a2b7be4a6294dae669b34e56da324d03507ba06931c37e1d917e9d27c6f55e8846751fe3f85ecdf67a2189ca51d3ea6451501bb
    public exponent: 10001

] 
2022-02-15 04:56:21.911  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-15 04:56:21.913 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-15 04:56:21.914 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-15 04:56:21.915 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-15 04:56:21.915  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-15 04:56:21.915  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-15 04:56:21.916  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-15 04:56:21.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-15 04:56:21.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-15 04:56:21.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-15 04:56:21.925 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-15 04:56:21.925 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-15 04:56:21.925 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-15 04:56:21.926 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-15 04:56:22.008  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-15 04:56:22.009  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-15 04:56:22.009 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-15 04:56:22.009 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-15 04:56:22.021  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-15 04:56:22.021  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-15 04:56:22.021 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 04:56:22.021 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 04:56:22.022 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 04:56:22.022 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 04:56:22.022 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 04:56:22.022 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 04:56:22.023 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 04:56:22.023 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 04:56:22.023 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 04:56:22.024 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-15 04:56:22.026 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 324472902021752919516323716349938730107372121564
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Feb 15 02:48:34 UTC 2022
           Final Date: Sun Feb 15 02:48:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [56:6b:2c:7d:84:ee:c0:ab:9d:ec:ea:9c:de:07:58:bb:4a:de:9d:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 438df857549c4b412f0162b547a02d1a416fcbae
                       14b9112bef095c81d061a4304720746fc2a204e3
                       24b5a39d75469934c484b5f317d7c93090912748
                       9e4b4ff88dd7fbc1322f3f9795cf49fa656b791e
                       13692787cd283546ff05171b610cdcabd5f084b5
                       70082afef30aa6faf63f0d0d07311e16816f0981
                       2d1f96a482416bb5c7093892fe4378efe68e1e09
                       6c2546602ac53bd15a05bdbee22d341751277052
                       5d905e9fd9f1f8f56e750e03a597da5342bb517a
                       7b507864f27bf488176802bb1fba7bce8b3a0f1f
                       0d98082ac331708643ee2207ebd103c5499b4ddf
                       08ff0f00d746e0edc5db62948708cf1eda736148
                       3a4e6abce02753a7e77e5581b5258677cbd45995
                       8132a171bfa6bc1610ab2c815dfc0f4c88d76b33
                       b579bfc7da0bb17767f283657110fa9257905e77
                       4502ea76e7ac7b4a29faad361f48fcb0e1168abb
                       a59020385cec24219bccc9cf33c6a2a80111d54e
                       8398e25ae53a8ebfe3d757f96dbdaca90ccb3e4e
                       5800e2dbd9e148b7bb0b7cb14471112e873ff68b
                       899a2945
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [72:b3:70:96:0d:9e:82:04:56:61:3e:e8:ee:66:54:4c:72:f4:60:df]
            modulus: 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
    public exponent: 10001

] 
2022-02-15 04:59:24.499  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-15 04:59:24.500 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-15 04:59:24.501 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-15 04:59:24.502 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-15 04:59:24.502  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-15 04:59:24.502  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-15 04:59:24.503  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-15 04:59:24.503 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-15 04:59:24.503 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-15 04:59:24.503 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-15 04:59:24.507 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-15 04:59:24.507 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-15 04:59:24.507 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-15 04:59:24.508 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-15 04:59:24.589  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-15 04:59:24.589  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-15 04:59:24.590 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-15 04:59:24.620 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-15 04:59:24.622  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-15 04:59:24.623  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-15 04:59:24.623 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 04:59:24.624 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 04:59:24.624 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 04:59:24.625 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 04:59:24.626 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 04:59:24.626 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 04:59:24.627 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 04:59:24.627 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 04:59:24.628 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 04:59:24.628 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-15 04:59:24.631 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 324472902021752919516323716349938730107372121564
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Feb 15 02:48:34 UTC 2022
           Final Date: Sun Feb 15 02:48:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [56:6b:2c:7d:84:ee:c0:ab:9d:ec:ea:9c:de:07:58:bb:4a:de:9d:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 438df857549c4b412f0162b547a02d1a416fcbae
                       14b9112bef095c81d061a4304720746fc2a204e3
                       24b5a39d75469934c484b5f317d7c93090912748
                       9e4b4ff88dd7fbc1322f3f9795cf49fa656b791e
                       13692787cd283546ff05171b610cdcabd5f084b5
                       70082afef30aa6faf63f0d0d07311e16816f0981
                       2d1f96a482416bb5c7093892fe4378efe68e1e09
                       6c2546602ac53bd15a05bdbee22d341751277052
                       5d905e9fd9f1f8f56e750e03a597da5342bb517a
                       7b507864f27bf488176802bb1fba7bce8b3a0f1f
                       0d98082ac331708643ee2207ebd103c5499b4ddf
                       08ff0f00d746e0edc5db62948708cf1eda736148
                       3a4e6abce02753a7e77e5581b5258677cbd45995
                       8132a171bfa6bc1610ab2c815dfc0f4c88d76b33
                       b579bfc7da0bb17767f283657110fa9257905e77
                       4502ea76e7ac7b4a29faad361f48fcb0e1168abb
                       a59020385cec24219bccc9cf33c6a2a80111d54e
                       8398e25ae53a8ebfe3d757f96dbdaca90ccb3e4e
                       5800e2dbd9e148b7bb0b7cb14471112e873ff68b
                       899a2945
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [13:54:6c:ab:d3:8a:ad:7e:f6:b3:d1:6f:1d:6a:b6:70:35:63:4e:12]
            modulus: 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
    public exponent: 10001

] 
2022-02-15 05:03:37.362  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-02-15 05:03:37.363 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-02-15 05:03:37.365 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-15 05:03:37.365 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-02-15 05:03:37.366  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-02-15 05:03:37.367  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-02-15 05:03:37.367  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-02-15 05:03:37.367 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-02-15 05:03:37.367 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-02-15 05:03:37.368 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-02-15 05:03:37.373 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-02-15 05:03:37.373 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-15 05:03:37.373 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-02-15 05:03:37.373 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-15 05:03:37.500  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-02-15 05:03:37.501  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-02-15 05:03:37.501 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-02-15 05:03:37.501 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-02-15 05:03:37.502  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-02-15 05:03:37.503  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-02-15 05:03:37.503 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 05:03:37.503 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 05:03:37.503 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 05:03:37.504 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 05:03:37.504 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 05:03:37.504 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 05:03:37.505 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-02-15 05:03:37.505 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-02-15 05:03:37.505 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-02-15 05:03:37.506 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-02-15 05:03:37.520 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 324472902021752919516323716349938730107372121564
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Feb 15 02:48:34 UTC 2022
           Final Date: Sun Feb 15 02:48:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [56:6b:2c:7d:84:ee:c0:ab:9d:ec:ea:9c:de:07:58:bb:4a:de:9d:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 438df857549c4b412f0162b547a02d1a416fcbae
                       14b9112bef095c81d061a4304720746fc2a204e3
                       24b5a39d75469934c484b5f317d7c93090912748
                       9e4b4ff88dd7fbc1322f3f9795cf49fa656b791e
                       13692787cd283546ff05171b610cdcabd5f084b5
                       70082afef30aa6faf63f0d0d07311e16816f0981
                       2d1f96a482416bb5c7093892fe4378efe68e1e09
                       6c2546602ac53bd15a05bdbee22d341751277052
                       5d905e9fd9f1f8f56e750e03a597da5342bb517a
                       7b507864f27bf488176802bb1fba7bce8b3a0f1f
                       0d98082ac331708643ee2207ebd103c5499b4ddf
                       08ff0f00d746e0edc5db62948708cf1eda736148
                       3a4e6abce02753a7e77e5581b5258677cbd45995
                       8132a171bfa6bc1610ab2c815dfc0f4c88d76b33
                       b579bfc7da0bb17767f283657110fa9257905e77
                       4502ea76e7ac7b4a29faad361f48fcb0e1168abb
                       a59020385cec24219bccc9cf33c6a2a80111d54e
                       8398e25ae53a8ebfe3d757f96dbdaca90ccb3e4e
                       5800e2dbd9e148b7bb0b7cb14471112e873ff68b
                       899a2945
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [53:d1:12:05:84:52:e2:f1:b3:41:38:8f:7e:c5:b7:04:34:15:9f:75]
            modulus: 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
    public exponent: 10001

]