Logging display requested on 2025/04/08 13:16:16 (BRT) for Hostname: [CW02RSA], Model: [C9800-40-K9 ], Version: [17.09.05], SN: [JAE26331W2R], MD_SN: [TTM2542014R] 2025/04/08 12:50:07.547835556 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 Public IP learnt is FALSE, public IP discovery is FALSE, private IP discovery is TRUE. 2025/04/08 12:50:07.547921536 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 IP:10.135.148.191[5256], Discovery Response sent 2025/04/08 12:50:17.048597634 {wncd_x_R0-2}{2}: [capwapac-smgr-srvr] [16528]: (note): MAC: 4006.d5cb.d440 DTLS session create callback received. 2025/04/08 12:50:17.137862409 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3af8) Session started - identity not specified 2025/04/08 12:50:17.137927310 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3af8) Adding peer certificate 2025/04/08 12:50:17.138206032 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 12:50:17.138224742 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Added x509 peer certificate - (971) bytes 2025/04/08 12:50:17.138254338 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: ip-ext-val: IP extension validation not required 2025/04/08 12:50:17.138426059 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::Incrementing refcount for context id-2160 to 1 2025/04/08 12:50:17.138436661 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: create new ca_req_context type PKI_VERIFY_CHAIN_CONTEXT,ident 2160 2025/04/08 12:50:17.138448393 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3af8)validation path has 1 certs 2025/04/08 12:50:17.138457645 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3af8) Check for identical certs 2025/04/08 12:50:17.138471453 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: Cert record not found for issuer serial. 2025/04/08 12:50:17.138472373 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI : (a3af8) Validating non-trusted cert 2025/04/08 12:50:17.138481113 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3af8) Create a list of suitable trustpoints 2025/04/08 12:50:17.138492931 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Found a issuer match 2025/04/08 12:50:17.138513167 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3af8) Suitable trustpoints are: 2025/04/08 12:50:17.138521953 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):Trustpool13, 2025/04/08 12:50:17.138527469 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):CISCO_IDEVID_SUDI, 2025/04/08 12:50:17.138533281 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3af8) Attempting to validate certificate using Trustpool13 policy 2025/04/08 12:50:17.138542952 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3af8) Using Trustpool13 to validate certificate 2025/04/08 12:50:17.139029986 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Added 1 certs to trusted chain. 2025/04/08 12:50:17.139043959 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Prepare session revocation service providers 2025/04/08 12:50:17.139099543 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: check if signed by sudi : issuer name of cert: o=Cisco,cn=High Assurance SUDI CA 2025/04/08 12:50:17.139639354 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): ../VIEW_ROOT/cisco.comp/pki_ssl/src/ca/provider/path/pkix/pkixpath.c(5787) : E_PATH_PROVIDER : path provider specific warning (BasicConstraints extension found in end entity cert) 2025/04/08 12:50:17.139741913 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Deleting cached key having key id 2670 2025/04/08 12:50:17.139773971 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Attempting to insert the peer's public key into cache 2025/04/08 12:50:17.139787295 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI:Peer's public inserted successfully with key id 2671 2025/04/08 12:50:17.140535127 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Expiring peer's cached key with key id 2671 2025/04/08 12:50:17.140555346 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3af8) Certificate is verified 2025/04/08 12:50:17.140566002 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Remove session revocation service providers 2025/04/08 12:50:17.140576864 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Remove session revocation service providers 2025/04/08 12:50:17.140590672 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):Trustpool13:validation status - CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 12:50:17.140597346 {iosrp_R0-0}{2}: [pki] [4200]: (note): Trustpool13:validation status - CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 12:50:17.140598082 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3af8) Certificate validated without revocation check 2025/04/08 12:50:17.140824107 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 12:50:17.140913882 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 12:50:17.140930692 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::cert refcount after increment = 1 2025/04/08 12:50:17.140938170 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Populate AAA auth data 2025/04/08 12:50:17.140955260 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Unable to get configured attribute for primary AAA list authorization. 2025/04/08 12:50:17.140963804 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: Unable to get configured attribute for primary AAA list authorization. 2025/04/08 12:50:17.140976090 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3af8)chain cert was anchored to trustpoint Trustpool13, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 12:50:17.140988008 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: (A3AF8)chain cert was anchored to trustpoint Trustpool13, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 12:50:17.140988978 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3af8) Removing verify context 2025/04/08 12:50:17.140997162 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: (A3AF8) Removing verify context 2025/04/08 12:50:17.141112027 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: destroying ca_req_context type PKI_VERIFY_CHAIN_CONTEXT,ident 2160, ref count 1 2025/04/08 12:50:17.141124481 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::Decrementing refcount for context id-2160 to 0 2025/04/08 12:50:17.141130813 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: ca_req_context released 2025/04/08 12:50:17.141139939 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3af8) Validation TP is Trustpool13 2025/04/08 12:50:17.141149505 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3af8) Certificate validation succeeded 2025/04/08 12:50:17.141218893 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Rcvd request to end PKI session a3af8. 2025/04/08 12:50:17.141230890 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: PKI session a3af8 has ended. Freeing all resources. 2025/04/08 12:50:17.141241504 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::cert refcount after decrement = 0 2025/04/08 12:50:17.141299580 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: PKI session a0000 has ended. Freeing all resources completed 2025/04/08 12:50:18.740644384 {wncd_x_R0-2}{2}: [capwapac-smgr-sess-fsm] [16528]: (note): Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5256] 10.201.233.81[5246] Last Control Packet received 0 seconds ago. 2025/04/08 12:50:18.740644806 {wncd_x_R0-2}{2}: [capwapac-smgr-sess-fsm] [16528]: (note): Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5256] 10.201.233.81[5246] Last Data Keep Alive Packet information not available. Data session was not established 2025/04/08 12:50:18.740673830 {wncd_x_R0-2}{2}: [errmsg] [16528]: (note): %CAPWAPAC_SMGR_TRACE_MESSAGE-5-AP_JOIN_DISJOIN: R0/2: wncd: AP Event: AP Name: AP4006.D5E0.2180 Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5256] 10.201.233.81[5246] Disjoined AP Auth Failure 2025/04/08 12:50:18.740882543 {wncd_x_R0-2}{2}: [ewlc-dtls-sess] [16528]: (note): Remote Host: 10.135.148.191[5256] MAC: 4006.d5cb.d440 DTLS session destroy 2025/04/08 12:50:18.740951174 {wncd_x_R0-2}{2}: [rrm-client] [16528]: (ERR): 4006.d5cb.d440 AP Delete processing failed ap ctxt handle is Invalid 2025/04/08 12:50:18.740968334 {wncd_x_R0-2}{2}: [apmgr-db] [16528]: (ERR): 4006.d5cb.d440 Failed to get session handle id during cleanup of AP records. Err:0 2025/04/08 12:51:28.879065083 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 Public IP learnt is FALSE, public IP discovery is FALSE, private IP discovery is TRUE. 2025/04/08 12:51:28.879174452 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 IP:10.135.148.191[5256], Discovery Response sent 2025/04/08 12:51:38.389590131 {wncd_x_R0-2}{2}: [capwapac-smgr-srvr] [16528]: (note): MAC: 4006.d5cb.d440 DTLS session create callback received. 2025/04/08 12:51:38.483009778 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afb) Session started - identity not specified 2025/04/08 12:51:38.483071016 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afb) Adding peer certificate 2025/04/08 12:51:38.483365084 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 12:51:38.483385610 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Added x509 peer certificate - (971) bytes 2025/04/08 12:51:38.483415258 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: ip-ext-val: IP extension validation not required 2025/04/08 12:51:38.483584753 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::Incrementing refcount for context id-2163 to 1 2025/04/08 12:51:38.483595839 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: create new ca_req_context type PKI_VERIFY_CHAIN_CONTEXT,ident 2163 2025/04/08 12:51:38.483606821 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afb)validation path has 1 certs 2025/04/08 12:51:38.483616265 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afb) Check for identical certs 2025/04/08 12:51:38.483632663 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: Cert record not found for issuer serial. 2025/04/08 12:51:38.483633555 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI : (a3afb) Validating non-trusted cert 2025/04/08 12:51:38.483642963 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afb) Create a list of suitable trustpoints 2025/04/08 12:51:38.483655033 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Found a issuer match 2025/04/08 12:51:38.483675013 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afb) Suitable trustpoints are: 2025/04/08 12:51:38.483683800 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):Trustpool13, 2025/04/08 12:51:38.483689948 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):CISCO_IDEVID_SUDI, 2025/04/08 12:51:38.483696286 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afb) Attempting to validate certificate using Trustpool13 policy 2025/04/08 12:51:38.483705874 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afb) Using Trustpool13 to validate certificate 2025/04/08 12:51:38.484190199 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Added 1 certs to trusted chain. 2025/04/08 12:51:38.484204201 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Prepare session revocation service providers 2025/04/08 12:51:38.484258929 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: check if signed by sudi : issuer name of cert: o=Cisco,cn=High Assurance SUDI CA 2025/04/08 12:51:38.484797528 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): ../VIEW_ROOT/cisco.comp/pki_ssl/src/ca/provider/path/pkix/pkixpath.c(5787) : E_PATH_PROVIDER : path provider specific warning (BasicConstraints extension found in end entity cert) 2025/04/08 12:51:38.484897257 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Deleting cached key having key id 2673 2025/04/08 12:51:38.484913811 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Attempting to insert the peer's public key into cache 2025/04/08 12:51:38.484926735 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI:Peer's public inserted successfully with key id 2674 2025/04/08 12:51:38.485689921 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Expiring peer's cached key with key id 2674 2025/04/08 12:51:38.485722576 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afb) Certificate is verified 2025/04/08 12:51:38.485733288 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Remove session revocation service providers 2025/04/08 12:51:38.485743956 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Remove session revocation service providers 2025/04/08 12:51:38.485757856 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):Trustpool13:validation status - CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 12:51:38.485764746 {iosrp_R0-0}{2}: [pki] [4200]: (note): Trustpool13:validation status - CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 12:51:38.485765576 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afb) Certificate validated without revocation check 2025/04/08 12:51:38.485991485 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 12:51:38.486081276 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 12:51:38.486098206 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::cert refcount after increment = 1 2025/04/08 12:51:38.486105510 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Populate AAA auth data 2025/04/08 12:51:38.486123036 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Unable to get configured attribute for primary AAA list authorization. 2025/04/08 12:51:38.486131588 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: Unable to get configured attribute for primary AAA list authorization. 2025/04/08 12:51:38.486143110 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afb)chain cert was anchored to trustpoint Trustpool13, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 12:51:38.486154242 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: (A3AFB)chain cert was anchored to trustpoint Trustpool13, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 12:51:38.486155206 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afb) Removing verify context 2025/04/08 12:51:38.486163176 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: (A3AFB) Removing verify context 2025/04/08 12:51:38.486277739 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: destroying ca_req_context type PKI_VERIFY_CHAIN_CONTEXT,ident 2163, ref count 1 2025/04/08 12:51:38.486290775 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::Decrementing refcount for context id-2163 to 0 2025/04/08 12:51:38.486296889 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: ca_req_context released 2025/04/08 12:51:38.486306099 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afb) Validation TP is Trustpool13 2025/04/08 12:51:38.486315659 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afb) Certificate validation succeeded 2025/04/08 12:51:38.486395258 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Rcvd request to end PKI session a3afb. 2025/04/08 12:51:38.486408668 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: PKI session a3afb has ended. Freeing all resources. 2025/04/08 12:51:38.486418598 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::cert refcount after decrement = 0 2025/04/08 12:51:38.486476146 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: PKI session a0000 has ended. Freeing all resources completed 2025/04/08 12:51:40.087507950 {wncd_x_R0-2}{2}: [capwapac-smgr-sess-fsm] [16528]: (note): Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5256] 10.201.233.81[5246] Last Control Packet received 0 seconds ago. 2025/04/08 12:51:40.087508442 {wncd_x_R0-2}{2}: [capwapac-smgr-sess-fsm] [16528]: (note): Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5256] 10.201.233.81[5246] Last Data Keep Alive Packet information not available. Data session was not established 2025/04/08 12:51:40.087538640 {wncd_x_R0-2}{2}: [errmsg] [16528]: (note): %CAPWAPAC_SMGR_TRACE_MESSAGE-5-AP_JOIN_DISJOIN: R0/2: wncd: AP Event: AP Name: AP4006.D5E0.2180 Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5256] 10.201.233.81[5246] Disjoined AP Auth Failure 2025/04/08 12:51:40.087755122 {wncd_x_R0-2}{2}: [ewlc-dtls-sess] [16528]: (note): Remote Host: 10.135.148.191[5256] MAC: 4006.d5cb.d440 DTLS session destroy 2025/04/08 12:51:40.087826224 {wncd_x_R0-2}{2}: [rrm-client] [16528]: (ERR): 4006.d5cb.d440 AP Delete processing failed ap ctxt handle is Invalid 2025/04/08 12:51:40.087832058 {wncd_x_R0-2}{2}: [apmgr-db] [16528]: (ERR): 4006.d5cb.d440 Failed to get session handle id during cleanup of AP records. Err:0 2025/04/08 12:52:50.227862979 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 Public IP learnt is FALSE, public IP discovery is FALSE, private IP discovery is TRUE. 2025/04/08 12:52:50.227951929 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 IP:10.135.148.191[5256], Discovery Response sent 2025/04/08 12:52:59.750697330 {wncd_x_R0-2}{2}: [capwapac-smgr-srvr] [16528]: (note): MAC: 4006.d5cb.d440 DTLS session create callback received. 2025/04/08 12:52:59.839098845 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afe) Session started - identity not specified 2025/04/08 12:52:59.839163321 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afe) Adding peer certificate 2025/04/08 12:52:59.839451829 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 12:52:59.839471619 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Added x509 peer certificate - (971) bytes 2025/04/08 12:52:59.839501811 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: ip-ext-val: IP extension validation not required 2025/04/08 12:52:59.839669204 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::Incrementing refcount for context id-2166 to 1 2025/04/08 12:52:59.839679882 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: create new ca_req_context type PKI_VERIFY_CHAIN_CONTEXT,ident 2166 2025/04/08 12:52:59.839691162 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afe)validation path has 1 certs 2025/04/08 12:52:59.839700486 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afe) Check for identical certs 2025/04/08 12:52:59.839716558 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: Cert record not found for issuer serial. 2025/04/08 12:52:59.839717460 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI : (a3afe) Validating non-trusted cert 2025/04/08 12:52:59.839726707 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afe) Create a list of suitable trustpoints 2025/04/08 12:52:59.839738731 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Found a issuer match 2025/04/08 12:52:59.839759053 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afe) Suitable trustpoints are: 2025/04/08 12:52:59.839767627 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):Trustpool13, 2025/04/08 12:52:59.839773673 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):CISCO_IDEVID_SUDI, 2025/04/08 12:52:59.839779591 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afe) Attempting to validate certificate using Trustpool13 policy 2025/04/08 12:52:59.839789635 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afe) Using Trustpool13 to validate certificate 2025/04/08 12:52:59.840299570 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Added 1 certs to trusted chain. 2025/04/08 12:52:59.840315786 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Prepare session revocation service providers 2025/04/08 12:52:59.840384482 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: check if signed by sudi : issuer name of cert: o=Cisco,cn=High Assurance SUDI CA 2025/04/08 12:52:59.840917478 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): ../VIEW_ROOT/cisco.comp/pki_ssl/src/ca/provider/path/pkix/pkixpath.c(5787) : E_PATH_PROVIDER : path provider specific warning (BasicConstraints extension found in end entity cert) 2025/04/08 12:52:59.841016960 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Deleting cached key having key id 2676 2025/04/08 12:52:59.841033968 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Attempting to insert the peer's public key into cache 2025/04/08 12:52:59.841061916 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI:Peer's public inserted successfully with key id 2677 2025/04/08 12:52:59.841813869 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Expiring peer's cached key with key id 2677 2025/04/08 12:52:59.841834713 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afe) Certificate is verified 2025/04/08 12:52:59.841845607 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Remove session revocation service providers 2025/04/08 12:52:59.841856499 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Remove session revocation service providers 2025/04/08 12:52:59.841869931 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):Trustpool13:validation status - CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 12:52:59.841877067 {iosrp_R0-0}{2}: [pki] [4200]: (note): Trustpool13:validation status - CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 12:52:59.841877815 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afe) Certificate validated without revocation check 2025/04/08 12:52:59.842103403 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 12:52:59.842192069 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 12:52:59.842208929 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::cert refcount after increment = 1 2025/04/08 12:52:59.842216273 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Populate AAA auth data 2025/04/08 12:52:59.842233765 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Unable to get configured attribute for primary AAA list authorization. 2025/04/08 12:52:59.842242306 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: Unable to get configured attribute for primary AAA list authorization. 2025/04/08 12:52:59.842253890 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afe)chain cert was anchored to trustpoint Trustpool13, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 12:52:59.842267134 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: (A3AFE)chain cert was anchored to trustpoint Trustpool13, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 12:52:59.842268408 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afe) Removing verify context 2025/04/08 12:52:59.842284154 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: (A3AFE) Removing verify context 2025/04/08 12:52:59.842418689 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: destroying ca_req_context type PKI_VERIFY_CHAIN_CONTEXT,ident 2166, ref count 1 2025/04/08 12:52:59.842433487 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::Decrementing refcount for context id-2166 to 0 2025/04/08 12:52:59.842439829 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: ca_req_context released 2025/04/08 12:52:59.842449239 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afe) Validation TP is Trustpool13 2025/04/08 12:52:59.842458513 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3afe) Certificate validation succeeded 2025/04/08 12:52:59.842527487 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Rcvd request to end PKI session a3afe. 2025/04/08 12:52:59.842539879 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: PKI session a3afe has ended. Freeing all resources. 2025/04/08 12:52:59.842549619 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::cert refcount after decrement = 0 2025/04/08 12:52:59.842608758 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: PKI session a0000 has ended. Freeing all resources completed 2025/04/08 12:53:01.438491487 {wncd_x_R0-2}{2}: [capwapac-smgr-sess-fsm] [16528]: (note): Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5256] 10.201.233.81[5246] Last Control Packet received 0 seconds ago. 2025/04/08 12:53:01.438491989 {wncd_x_R0-2}{2}: [capwapac-smgr-sess-fsm] [16528]: (note): Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5256] 10.201.233.81[5246] Last Data Keep Alive Packet information not available. Data session was not established 2025/04/08 12:53:01.438588761 {wncd_x_R0-2}{2}: [errmsg] [16528]: (note): %CAPWAPAC_SMGR_TRACE_MESSAGE-5-AP_JOIN_DISJOIN: R0/2: wncd: AP Event: AP Name: AP4006.D5E0.2180 Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5256] 10.201.233.81[5246] Disjoined AP Auth Failure 2025/04/08 12:53:01.438800737 {wncd_x_R0-2}{2}: [ewlc-dtls-sess] [16528]: (note): Remote Host: 10.135.148.191[5256] MAC: 4006.d5cb.d440 DTLS session destroy 2025/04/08 12:53:01.438872073 {wncd_x_R0-2}{2}: [rrm-client] [16528]: (ERR): 4006.d5cb.d440 AP Delete processing failed ap ctxt handle is Invalid 2025/04/08 12:53:01.438877281 {wncd_x_R0-2}{2}: [apmgr-db] [16528]: (ERR): 4006.d5cb.d440 Failed to get session handle id during cleanup of AP records. Err:0 2025/04/08 12:59:15.854493638 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 Public IP learnt is FALSE, public IP discovery is FALSE, private IP discovery is TRUE. 2025/04/08 12:59:15.854583053 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 IP:10.135.148.191[5256], Discovery Response sent 2025/04/08 12:59:25.290930779 {wncd_x_R0-2}{2}: [capwapac-smgr-srvr] [16528]: (note): MAC: 4006.d5cb.d440 DTLS session create callback received. 2025/04/08 12:59:25.380506875 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c26) Session started - identity not specified 2025/04/08 12:59:25.380598963 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c26) Adding peer certificate 2025/04/08 12:59:25.381060272 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 12:59:25.381095368 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Added x509 peer certificate - (971) bytes 2025/04/08 12:59:25.381142983 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: ip-ext-val: IP extension validation not required 2025/04/08 12:59:25.381414080 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::Incrementing refcount for context id-2177 to 1 2025/04/08 12:59:25.381433014 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: create new ca_req_context type PKI_VERIFY_CHAIN_CONTEXT,ident 2177 2025/04/08 12:59:25.381451532 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c26)validation path has 1 certs 2025/04/08 12:59:25.381467687 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c26) Check for identical certs 2025/04/08 12:59:25.381489637 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: Cert record not found for issuer serial. 2025/04/08 12:59:25.381491173 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI : (a3c26) Validating non-trusted cert 2025/04/08 12:59:25.381506365 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c26) Create a list of suitable trustpoints 2025/04/08 12:59:25.381527089 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Found a issuer match 2025/04/08 12:59:25.381578913 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c26) Suitable trustpoints are: 2025/04/08 12:59:25.381595017 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):Trustpool13, 2025/04/08 12:59:25.381604427 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):CISCO_IDEVID_SUDI, 2025/04/08 12:59:25.381614177 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c26) Attempting to validate certificate using Trustpool13 policy 2025/04/08 12:59:25.381631432 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c26) Using Trustpool13 to validate certificate 2025/04/08 12:59:25.382278335 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Added 1 certs to trusted chain. 2025/04/08 12:59:25.382302924 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Prepare session revocation service providers 2025/04/08 12:59:25.382374338 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: check if signed by sudi : issuer name of cert: o=Cisco,cn=High Assurance SUDI CA 2025/04/08 12:59:25.382912075 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): ../VIEW_ROOT/cisco.comp/pki_ssl/src/ca/provider/path/pkix/pkixpath.c(5787) : E_PATH_PROVIDER : path provider specific warning (BasicConstraints extension found in end entity cert) 2025/04/08 12:59:25.383010888 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Deleting cached key having key id 2687 2025/04/08 12:59:25.383027748 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Attempting to insert the peer's public key into cache 2025/04/08 12:59:25.383040798 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI:Peer's public inserted successfully with key id 2688 2025/04/08 12:59:25.383790512 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Expiring peer's cached key with key id 2688 2025/04/08 12:59:25.383811238 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c26) Certificate is verified 2025/04/08 12:59:25.383822011 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Remove session revocation service providers 2025/04/08 12:59:25.383833117 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Remove session revocation service providers 2025/04/08 12:59:25.383847419 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):Trustpool13:validation status - CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 12:59:25.383854549 {iosrp_R0-0}{2}: [pki] [4200]: (note): Trustpool13:validation status - CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 12:59:25.383855277 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c26) Certificate validated without revocation check 2025/04/08 12:59:25.384080594 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 12:59:25.384169195 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 12:59:25.384185923 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::cert refcount after increment = 1 2025/04/08 12:59:25.384193251 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Populate AAA auth data 2025/04/08 12:59:25.384210687 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Unable to get configured attribute for primary AAA list authorization. 2025/04/08 12:59:25.384219087 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: Unable to get configured attribute for primary AAA list authorization. 2025/04/08 12:59:25.384231231 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c26)chain cert was anchored to trustpoint Trustpool13, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 12:59:25.384243261 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: (A3C26)chain cert was anchored to trustpoint Trustpool13, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 12:59:25.384256113 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c26) Removing verify context 2025/04/08 12:59:25.384265117 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: (A3C26) Removing verify context 2025/04/08 12:59:25.384391250 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: destroying ca_req_context type PKI_VERIFY_CHAIN_CONTEXT,ident 2177, ref count 1 2025/04/08 12:59:25.384405544 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::Decrementing refcount for context id-2177 to 0 2025/04/08 12:59:25.384412132 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: ca_req_context released 2025/04/08 12:59:25.384421618 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c26) Validation TP is Trustpool13 2025/04/08 12:59:25.384431384 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c26) Certificate validation succeeded 2025/04/08 12:59:25.384504067 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Rcvd request to end PKI session a3c26. 2025/04/08 12:59:25.384516939 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: PKI session a3c26 has ended. Freeing all resources. 2025/04/08 12:59:25.384526999 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::cert refcount after decrement = 0 2025/04/08 12:59:25.384587101 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: PKI session a0000 has ended. Freeing all resources completed 2025/04/08 12:59:27.001511870 {wncd_x_R0-2}{2}: [capwapac-smgr-sess-fsm] [16528]: (note): Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5256] 10.201.233.81[5246] Last Control Packet received 0 seconds ago. 2025/04/08 12:59:27.001523488 {wncd_x_R0-2}{2}: [capwapac-smgr-sess-fsm] [16528]: (note): Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5256] 10.201.233.81[5246] Last Data Keep Alive Packet information not available. Data session was not established 2025/04/08 12:59:27.001552688 {wncd_x_R0-2}{2}: [errmsg] [16528]: (note): %CAPWAPAC_SMGR_TRACE_MESSAGE-5-AP_JOIN_DISJOIN: R0/2: wncd: AP Event: AP Name: AP4006.D5E0.2180 Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5256] 10.201.233.81[5246] Disjoined AP Auth Failure 2025/04/08 12:59:27.001767181 {wncd_x_R0-2}{2}: [ewlc-dtls-sess] [16528]: (note): Remote Host: 10.135.148.191[5256] MAC: 4006.d5cb.d440 DTLS session destroy 2025/04/08 12:59:27.001834208 {wncd_x_R0-2}{2}: [rrm-client] [16528]: (ERR): 4006.d5cb.d440 AP Delete processing failed ap ctxt handle is Invalid 2025/04/08 12:59:27.001839700 {wncd_x_R0-2}{2}: [apmgr-db] [16528]: (ERR): 4006.d5cb.d440 Failed to get session handle id during cleanup of AP records. Err:0 2025/04/08 13:00:37.161874611 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 Public IP learnt is FALSE, public IP discovery is FALSE, private IP discovery is TRUE. 2025/04/08 13:00:37.161959058 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 IP:10.135.148.191[5256], Discovery Response sent 2025/04/08 13:00:46.500546013 {wncd_x_R0-2}{2}: [capwapac-smgr-srvr] [16528]: (note): MAC: 4006.d5cb.d440 DTLS session create callback received. 2025/04/08 13:00:46.589632211 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c29) Session started - identity not specified 2025/04/08 13:00:46.589690113 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c29) Adding peer certificate 2025/04/08 13:00:46.589965503 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 13:00:46.589983083 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Added x509 peer certificate - (971) bytes 2025/04/08 13:00:46.590013941 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: ip-ext-val: IP extension validation not required 2025/04/08 13:00:46.590172522 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::Incrementing refcount for context id-2180 to 1 2025/04/08 13:00:46.590182690 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: create new ca_req_context type PKI_VERIFY_CHAIN_CONTEXT,ident 2180 2025/04/08 13:00:46.590193476 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c29)validation path has 1 certs 2025/04/08 13:00:46.590202780 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c29) Check for identical certs 2025/04/08 13:00:46.590218973 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: Cert record not found for issuer serial. 2025/04/08 13:00:46.590219879 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI : (a3c29) Validating non-trusted cert 2025/04/08 13:00:46.590228859 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c29) Create a list of suitable trustpoints 2025/04/08 13:00:46.590241291 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Found a issuer match 2025/04/08 13:00:46.590261119 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c29) Suitable trustpoints are: 2025/04/08 13:00:46.590269569 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):Trustpool13, 2025/04/08 13:00:46.590275231 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):CISCO_IDEVID_SUDI, 2025/04/08 13:00:46.590280835 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c29) Attempting to validate certificate using Trustpool13 policy 2025/04/08 13:00:46.590290367 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c29) Using Trustpool13 to validate certificate 2025/04/08 13:00:46.590786816 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Added 1 certs to trusted chain. 2025/04/08 13:00:46.590802604 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Prepare session revocation service providers 2025/04/08 13:00:46.590859232 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: check if signed by sudi : issuer name of cert: o=Cisco,cn=High Assurance SUDI CA 2025/04/08 13:00:46.591397986 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): ../VIEW_ROOT/cisco.comp/pki_ssl/src/ca/provider/path/pkix/pkixpath.c(5787) : E_PATH_PROVIDER : path provider specific warning (BasicConstraints extension found in end entity cert) 2025/04/08 13:00:46.591497522 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Deleting cached key having key id 2690 2025/04/08 13:00:46.591527952 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Attempting to insert the peer's public key into cache 2025/04/08 13:00:46.591541710 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI:Peer's public inserted successfully with key id 2691 2025/04/08 13:00:46.592284629 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Expiring peer's cached key with key id 2691 2025/04/08 13:00:46.592304387 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c29) Certificate is verified 2025/04/08 13:00:46.592315013 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Remove session revocation service providers 2025/04/08 13:00:46.592335135 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Remove session revocation service providers 2025/04/08 13:00:46.592350055 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):Trustpool13:validation status - CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:00:46.592356795 {iosrp_R0-0}{2}: [pki] [4200]: (note): Trustpool13:validation status - CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:00:46.592357593 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c29) Certificate validated without revocation check 2025/04/08 13:00:46.592584945 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 13:00:46.592673477 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 13:00:46.592690613 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::cert refcount after increment = 1 2025/04/08 13:00:46.592697965 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Populate AAA auth data 2025/04/08 13:00:46.592715831 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Unable to get configured attribute for primary AAA list authorization. 2025/04/08 13:00:46.592724421 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: Unable to get configured attribute for primary AAA list authorization. 2025/04/08 13:00:46.592736008 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c29)chain cert was anchored to trustpoint Trustpool13, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:00:46.592747704 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: (A3C29)chain cert was anchored to trustpoint Trustpool13, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:00:46.592748720 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c29) Removing verify context 2025/04/08 13:00:46.592757094 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: (A3C29) Removing verify context 2025/04/08 13:00:46.592871094 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: destroying ca_req_context type PKI_VERIFY_CHAIN_CONTEXT,ident 2180, ref count 1 2025/04/08 13:00:46.592883490 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::Decrementing refcount for context id-2180 to 0 2025/04/08 13:00:46.592889794 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: ca_req_context released 2025/04/08 13:00:46.592899507 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c29) Validation TP is Trustpool13 2025/04/08 13:00:46.592908923 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3c29) Certificate validation succeeded 2025/04/08 13:00:46.592977897 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Rcvd request to end PKI session a3c29. 2025/04/08 13:00:46.592990489 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: PKI session a3c29 has ended. Freeing all resources. 2025/04/08 13:00:46.593000313 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::cert refcount after decrement = 0 2025/04/08 13:00:46.593058067 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: PKI session a0000 has ended. Freeing all resources completed 2025/04/08 13:00:48.192640603 {wncd_x_R0-2}{2}: [capwapac-smgr-sess-fsm] [16528]: (note): Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5256] 10.201.233.81[5246] Last Control Packet received 0 seconds ago. 2025/04/08 13:00:48.192641181 {wncd_x_R0-2}{2}: [capwapac-smgr-sess-fsm] [16528]: (note): Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5256] 10.201.233.81[5246] Last Data Keep Alive Packet information not available. Data session was not established 2025/04/08 13:00:48.192670361 {wncd_x_R0-2}{2}: [errmsg] [16528]: (note): %CAPWAPAC_SMGR_TRACE_MESSAGE-5-AP_JOIN_DISJOIN: R0/2: wncd: AP Event: AP Name: AP4006.D5E0.2180 Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5256] 10.201.233.81[5246] Disjoined AP Auth Failure 2025/04/08 13:00:48.192884158 {wncd_x_R0-2}{2}: [ewlc-dtls-sess] [16528]: (note): Remote Host: 10.135.148.191[5256] MAC: 4006.d5cb.d440 DTLS session destroy 2025/04/08 13:00:48.192954955 {wncd_x_R0-2}{2}: [rrm-client] [16528]: (ERR): 4006.d5cb.d440 AP Delete processing failed ap ctxt handle is Invalid 2025/04/08 13:00:48.192959913 {wncd_x_R0-2}{2}: [apmgr-db] [16528]: (ERR): 4006.d5cb.d440 Failed to get session handle id during cleanup of AP records. Err:0 2025/04/08 13:01:58.312720255 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 Public IP learnt is FALSE, public IP discovery is FALSE, private IP discovery is TRUE. 2025/04/08 13:01:58.312807415 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 IP:10.135.148.191[5256], Discovery Response sent 2025/04/08 13:06:29.206092815 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 Public IP learnt is FALSE, public IP discovery is FALSE, private IP discovery is TRUE. 2025/04/08 13:06:29.206177910 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 IP:10.135.148.191[5264], Discovery Response sent 2025/04/08 13:06:38.554591195 {wncd_x_R0-2}{2}: [capwapac-smgr-srvr] [16528]: (note): MAC: 4006.d5cb.d440 DTLS session create callback received. 2025/04/08 13:06:39.328489338 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf4) Session started - identity not specified 2025/04/08 13:06:39.328555157 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf4) Adding peer certificate 2025/04/08 13:06:39.328835123 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 13:06:39.328854127 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Added x509 peer certificate - (971) bytes 2025/04/08 13:06:39.328884399 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: ip-ext-val: IP extension validation not required 2025/04/08 13:06:39.329059958 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::Incrementing refcount for context id-2190 to 1 2025/04/08 13:06:39.329070638 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: create new ca_req_context type PKI_VERIFY_CHAIN_CONTEXT,ident 2190 2025/04/08 13:06:39.329081612 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf4)validation path has 1 certs 2025/04/08 13:06:39.329105008 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf4) Check for identical certs 2025/04/08 13:06:39.329121058 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: Cert record not found for issuer serial. 2025/04/08 13:06:39.329122034 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI : (a3cf4) Validating non-trusted cert 2025/04/08 13:06:39.329130660 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf4) Create a list of suitable trustpoints 2025/04/08 13:06:39.329142290 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Found a issuer match 2025/04/08 13:06:39.329162262 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf4) Suitable trustpoints are: 2025/04/08 13:06:39.329171067 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):Trustpool13, 2025/04/08 13:06:39.329176961 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):CISCO_IDEVID_SUDI, 2025/04/08 13:06:39.329182877 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf4) Attempting to validate certificate using Trustpool13 policy 2025/04/08 13:06:39.329192703 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf4) Using Trustpool13 to validate certificate 2025/04/08 13:06:39.329707128 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Added 1 certs to trusted chain. 2025/04/08 13:06:39.329724046 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Prepare session revocation service providers 2025/04/08 13:06:39.329781180 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: check if signed by sudi : issuer name of cert: o=Cisco,cn=High Assurance SUDI CA 2025/04/08 13:06:39.330309323 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): ../VIEW_ROOT/cisco.comp/pki_ssl/src/ca/provider/path/pkix/pkixpath.c(5787) : E_PATH_PROVIDER : path provider specific warning (BasicConstraints extension found in end entity cert) 2025/04/08 13:06:39.330419802 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Deleting cached key having key id 2700 2025/04/08 13:06:39.330437824 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Attempting to insert the peer's public key into cache 2025/04/08 13:06:39.330451362 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI:Peer's public inserted successfully with key id 2701 2025/04/08 13:06:39.331190957 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Expiring peer's cached key with key id 2701 2025/04/08 13:06:39.331210095 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf4) Certificate is verified 2025/04/08 13:06:39.331221081 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Remove session revocation service providers 2025/04/08 13:06:39.331231859 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Remove session revocation service providers 2025/04/08 13:06:39.331244947 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):Trustpool13:validation status - CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:06:39.331251781 {iosrp_R0-0}{2}: [pki] [4200]: (note): Trustpool13:validation status - CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:06:39.331252537 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf4) Certificate validated without revocation check 2025/04/08 13:06:39.331487334 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 13:06:39.331578245 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 13:06:39.331594841 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::cert refcount after increment = 1 2025/04/08 13:06:39.331602541 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Populate AAA auth data 2025/04/08 13:06:39.331619593 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Unable to get configured attribute for primary AAA list authorization. 2025/04/08 13:06:39.331641259 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: Unable to get configured attribute for primary AAA list authorization. 2025/04/08 13:06:39.331653629 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf4)chain cert was anchored to trustpoint Trustpool13, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:06:39.331665489 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: (A3CF4)chain cert was anchored to trustpoint Trustpool13, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:06:39.331666385 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf4) Removing verify context 2025/04/08 13:06:39.331674607 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: (A3CF4) Removing verify context 2025/04/08 13:06:39.331790356 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: destroying ca_req_context type PKI_VERIFY_CHAIN_CONTEXT,ident 2190, ref count 1 2025/04/08 13:06:39.331803040 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::Decrementing refcount for context id-2190 to 0 2025/04/08 13:06:39.331809948 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: ca_req_context released 2025/04/08 13:06:39.331819610 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf4) Validation TP is Trustpool13 2025/04/08 13:06:39.331829242 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf4) Certificate validation succeeded 2025/04/08 13:06:39.331899971 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Rcvd request to end PKI session a3cf4. 2025/04/08 13:06:39.331912443 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: PKI session a3cf4 has ended. Freeing all resources. 2025/04/08 13:06:39.331922525 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::cert refcount after decrement = 0 2025/04/08 13:06:39.331979935 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: PKI session a0000 has ended. Freeing all resources completed 2025/04/08 13:06:41.590219006 {wncd_x_R0-2}{2}: [capwapac-smgr-sess-fsm] [16528]: (note): Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5264] 10.201.233.81[5246] Last Control Packet received 0 seconds ago. 2025/04/08 13:06:41.590219512 {wncd_x_R0-2}{2}: [capwapac-smgr-sess-fsm] [16528]: (note): Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5264] 10.201.233.81[5246] Last Data Keep Alive Packet information not available. Data session was not established 2025/04/08 13:06:41.590248322 {wncd_x_R0-2}{2}: [errmsg] [16528]: (note): %CAPWAPAC_SMGR_TRACE_MESSAGE-5-AP_JOIN_DISJOIN: R0/2: wncd: AP Event: AP Name: AP4006.D5E0.2180 Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5264] 10.201.233.81[5246] Disjoined AP Auth Failure 2025/04/08 13:06:41.590474496 {wncd_x_R0-2}{2}: [ewlc-dtls-sess] [16528]: (note): Remote Host: 10.135.148.191[5264] MAC: 4006.d5cb.d440 DTLS session destroy 2025/04/08 13:06:41.590543580 {wncd_x_R0-2}{2}: [rrm-client] [16528]: (ERR): 4006.d5cb.d440 AP Delete processing failed ap ctxt handle is Invalid 2025/04/08 13:06:41.590548938 {wncd_x_R0-2}{2}: [apmgr-db] [16528]: (ERR): 4006.d5cb.d440 Failed to get session handle id during cleanup of AP records. Err:0 2025/04/08 13:07:50.364879126 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 Public IP learnt is FALSE, public IP discovery is FALSE, private IP discovery is TRUE. 2025/04/08 13:07:50.364965593 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 IP:10.135.148.191[5264], Discovery Response sent 2025/04/08 13:07:59.709885179 {wncd_x_R0-2}{2}: [capwapac-smgr-srvr] [16528]: (note): MAC: 4006.d5cb.d440 DTLS session create callback received. 2025/04/08 13:07:59.798241187 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf7) Session started - identity not specified 2025/04/08 13:07:59.798306417 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf7) Adding peer certificate 2025/04/08 13:07:59.798616565 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 13:07:59.798638129 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Added x509 peer certificate - (971) bytes 2025/04/08 13:07:59.798668575 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: ip-ext-val: IP extension validation not required 2025/04/08 13:07:59.798829130 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::Incrementing refcount for context id-2193 to 1 2025/04/08 13:07:59.798839854 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: create new ca_req_context type PKI_VERIFY_CHAIN_CONTEXT,ident 2193 2025/04/08 13:07:59.798850962 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf7)validation path has 1 certs 2025/04/08 13:07:59.798860268 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf7) Check for identical certs 2025/04/08 13:07:59.798877187 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: Cert record not found for issuer serial. 2025/04/08 13:07:59.798878219 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI : (a3cf7) Validating non-trusted cert 2025/04/08 13:07:59.798887301 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf7) Create a list of suitable trustpoints 2025/04/08 13:07:59.798899663 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Found a issuer match 2025/04/08 13:07:59.798919959 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf7) Suitable trustpoints are: 2025/04/08 13:07:59.798928883 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):Trustpool13, 2025/04/08 13:07:59.798934569 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):CISCO_IDEVID_SUDI, 2025/04/08 13:07:59.798941009 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf7) Attempting to validate certificate using Trustpool13 policy 2025/04/08 13:07:59.798950859 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf7) Using Trustpool13 to validate certificate 2025/04/08 13:07:59.799448798 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Added 1 certs to trusted chain. 2025/04/08 13:07:59.799464912 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Prepare session revocation service providers 2025/04/08 13:07:59.799520676 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: check if signed by sudi : issuer name of cert: o=Cisco,cn=High Assurance SUDI CA 2025/04/08 13:07:59.800047822 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): ../VIEW_ROOT/cisco.comp/pki_ssl/src/ca/provider/path/pkix/pkixpath.c(5787) : E_PATH_PROVIDER : path provider specific warning (BasicConstraints extension found in end entity cert) 2025/04/08 13:07:59.800148198 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Deleting cached key having key id 2703 2025/04/08 13:07:59.800164132 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Attempting to insert the peer's public key into cache 2025/04/08 13:07:59.800192906 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI:Peer's public inserted successfully with key id 2704 2025/04/08 13:07:59.800944857 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Expiring peer's cached key with key id 2704 2025/04/08 13:07:59.800965085 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf7) Certificate is verified 2025/04/08 13:07:59.800975583 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Remove session revocation service providers 2025/04/08 13:07:59.800986665 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Remove session revocation service providers 2025/04/08 13:07:59.801001097 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):Trustpool13:validation status - CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:07:59.801008199 {iosrp_R0-0}{2}: [pki] [4200]: (note): Trustpool13:validation status - CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:07:59.801008889 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf7) Certificate validated without revocation check 2025/04/08 13:07:59.801234073 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 13:07:59.801332031 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 13:07:59.801353871 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::cert refcount after increment = 1 2025/04/08 13:07:59.801361843 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Populate AAA auth data 2025/04/08 13:07:59.801379423 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Unable to get configured attribute for primary AAA list authorization. 2025/04/08 13:07:59.801388005 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: Unable to get configured attribute for primary AAA list authorization. 2025/04/08 13:07:59.801400438 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf7)chain cert was anchored to trustpoint Trustpool13, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:07:59.801411972 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: (A3CF7)chain cert was anchored to trustpoint Trustpool13, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:07:59.801413158 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf7) Removing verify context 2025/04/08 13:07:59.801421178 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: (A3CF7) Removing verify context 2025/04/08 13:07:59.801542292 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: destroying ca_req_context type PKI_VERIFY_CHAIN_CONTEXT,ident 2193, ref count 1 2025/04/08 13:07:59.801556295 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::Decrementing refcount for context id-2193 to 0 2025/04/08 13:07:59.801562713 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: ca_req_context released 2025/04/08 13:07:59.801572171 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf7) Validation TP is Trustpool13 2025/04/08 13:07:59.801581611 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cf7) Certificate validation succeeded 2025/04/08 13:07:59.801651071 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Rcvd request to end PKI session a3cf7. 2025/04/08 13:07:59.801663579 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: PKI session a3cf7 has ended. Freeing all resources. 2025/04/08 13:07:59.801673463 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::cert refcount after decrement = 0 2025/04/08 13:07:59.801731588 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: PKI session a0000 has ended. Freeing all resources completed 2025/04/08 13:08:01.399629787 {wncd_x_R0-2}{2}: [capwapac-smgr-sess-fsm] [16528]: (note): Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5264] 10.201.233.81[5246] Last Control Packet received 0 seconds ago. 2025/04/08 13:08:01.399630199 {wncd_x_R0-2}{2}: [capwapac-smgr-sess-fsm] [16528]: (note): Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5264] 10.201.233.81[5246] Last Data Keep Alive Packet information not available. Data session was not established 2025/04/08 13:08:01.399658349 {wncd_x_R0-2}{2}: [errmsg] [16528]: (note): %CAPWAPAC_SMGR_TRACE_MESSAGE-5-AP_JOIN_DISJOIN: R0/2: wncd: AP Event: AP Name: AP4006.D5E0.2180 Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5264] 10.201.233.81[5246] Disjoined AP Auth Failure 2025/04/08 13:08:01.399872054 {wncd_x_R0-2}{2}: [ewlc-dtls-sess] [16528]: (note): Remote Host: 10.135.148.191[5264] MAC: 4006.d5cb.d440 DTLS session destroy 2025/04/08 13:08:01.399943759 {wncd_x_R0-2}{2}: [rrm-client] [16528]: (ERR): 4006.d5cb.d440 AP Delete processing failed ap ctxt handle is Invalid 2025/04/08 13:08:01.399949811 {wncd_x_R0-2}{2}: [apmgr-db] [16528]: (ERR): 4006.d5cb.d440 Failed to get session handle id during cleanup of AP records. Err:0 2025/04/08 13:09:11.525236427 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 Public IP learnt is FALSE, public IP discovery is FALSE, private IP discovery is TRUE. 2025/04/08 13:09:11.525337426 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 IP:10.135.148.191[5264], Discovery Response sent 2025/04/08 13:09:21.048578966 {wncd_x_R0-2}{2}: [capwapac-smgr-srvr] [16528]: (note): MAC: 4006.d5cb.d440 DTLS session create callback received. 2025/04/08 13:09:21.140564477 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cfa) Session started - identity not specified 2025/04/08 13:09:21.140627356 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cfa) Adding peer certificate 2025/04/08 13:09:21.140905654 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 13:09:21.140924400 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Added x509 peer certificate - (971) bytes 2025/04/08 13:09:21.140954134 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: ip-ext-val: IP extension validation not required 2025/04/08 13:09:21.141113791 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::Incrementing refcount for context id-2196 to 1 2025/04/08 13:09:21.141124413 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: create new ca_req_context type PKI_VERIFY_CHAIN_CONTEXT,ident 2196 2025/04/08 13:09:21.141135233 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cfa)validation path has 1 certs 2025/04/08 13:09:21.141144599 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cfa) Check for identical certs 2025/04/08 13:09:21.141161299 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: Cert record not found for issuer serial. 2025/04/08 13:09:21.141162207 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI : (a3cfa) Validating non-trusted cert 2025/04/08 13:09:21.141171013 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cfa) Create a list of suitable trustpoints 2025/04/08 13:09:21.141183053 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Found a issuer match 2025/04/08 13:09:21.141203053 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cfa) Suitable trustpoints are: 2025/04/08 13:09:21.141211771 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):Trustpool13, 2025/04/08 13:09:21.141217817 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):CISCO_IDEVID_SUDI, 2025/04/08 13:09:21.141223685 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cfa) Attempting to validate certificate using Trustpool13 policy 2025/04/08 13:09:21.141233809 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cfa) Using Trustpool13 to validate certificate 2025/04/08 13:09:21.141730896 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Added 1 certs to trusted chain. 2025/04/08 13:09:21.141746577 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Prepare session revocation service providers 2025/04/08 13:09:21.141802921 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: check if signed by sudi : issuer name of cert: o=Cisco,cn=High Assurance SUDI CA 2025/04/08 13:09:21.142340390 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): ../VIEW_ROOT/cisco.comp/pki_ssl/src/ca/provider/path/pkix/pkixpath.c(5787) : E_PATH_PROVIDER : path provider specific warning (BasicConstraints extension found in end entity cert) 2025/04/08 13:09:21.142457289 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Deleting cached key having key id 2706 2025/04/08 13:09:21.142473653 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Attempting to insert the peer's public key into cache 2025/04/08 13:09:21.142486421 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI:Peer's public inserted successfully with key id 2707 2025/04/08 13:09:21.143220087 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Expiring peer's cached key with key id 2707 2025/04/08 13:09:21.143239403 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cfa) Certificate is verified 2025/04/08 13:09:21.143250105 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Remove session revocation service providers 2025/04/08 13:09:21.143261236 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Remove session revocation service providers 2025/04/08 13:09:21.143274532 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):Trustpool13:validation status - CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:09:21.143280998 {iosrp_R0-0}{2}: [pki] [4200]: (note): Trustpool13:validation status - CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:09:21.143281744 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cfa) Certificate validated without revocation check 2025/04/08 13:09:21.143518157 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 13:09:21.143608678 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 13:09:21.143625426 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::cert refcount after increment = 1 2025/04/08 13:09:21.143632934 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Populate AAA auth data 2025/04/08 13:09:21.143650248 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Unable to get configured attribute for primary AAA list authorization. 2025/04/08 13:09:21.143658866 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: Unable to get configured attribute for primary AAA list authorization. 2025/04/08 13:09:21.143670648 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cfa)chain cert was anchored to trustpoint Trustpool13, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:09:21.143681970 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: (A3CFA)chain cert was anchored to trustpoint Trustpool13, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:09:21.143682858 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cfa) Removing verify context 2025/04/08 13:09:21.143690710 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: (A3CFA) Removing verify context 2025/04/08 13:09:21.143803935 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: destroying ca_req_context type PKI_VERIFY_CHAIN_CONTEXT,ident 2196, ref count 1 2025/04/08 13:09:21.143816539 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::Decrementing refcount for context id-2196 to 0 2025/04/08 13:09:21.143822789 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: ca_req_context released 2025/04/08 13:09:21.143832307 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cfa) Validation TP is Trustpool13 2025/04/08 13:09:21.143841557 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3cfa) Certificate validation succeeded 2025/04/08 13:09:21.143911807 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Rcvd request to end PKI session a3cfa. 2025/04/08 13:09:21.143924308 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: PKI session a3cfa has ended. Freeing all resources. 2025/04/08 13:09:21.143945824 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::cert refcount after decrement = 0 2025/04/08 13:09:21.144004176 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: PKI session a0000 has ended. Freeing all resources completed 2025/04/08 13:09:22.750744334 {wncd_x_R0-2}{2}: [capwapac-smgr-sess-fsm] [16528]: (note): Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5264] 10.201.233.81[5246] Last Control Packet received 0 seconds ago. 2025/04/08 13:09:22.750744790 {wncd_x_R0-2}{2}: [capwapac-smgr-sess-fsm] [16528]: (note): Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5264] 10.201.233.81[5246] Last Data Keep Alive Packet information not available. Data session was not established 2025/04/08 13:09:22.750774702 {wncd_x_R0-2}{2}: [errmsg] [16528]: (note): %CAPWAPAC_SMGR_TRACE_MESSAGE-5-AP_JOIN_DISJOIN: R0/2: wncd: AP Event: AP Name: AP4006.D5E0.2180 Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5264] 10.201.233.81[5246] Disjoined AP Auth Failure 2025/04/08 13:09:22.751045744 {wncd_x_R0-2}{2}: [ewlc-dtls-sess] [16528]: (note): Remote Host: 10.135.148.191[5264] MAC: 4006.d5cb.d440 DTLS session destroy 2025/04/08 13:09:22.751137660 {wncd_x_R0-2}{2}: [rrm-client] [16528]: (ERR): 4006.d5cb.d440 AP Delete processing failed ap ctxt handle is Invalid 2025/04/08 13:09:22.751144110 {wncd_x_R0-2}{2}: [apmgr-db] [16528]: (ERR): 4006.d5cb.d440 Failed to get session handle id during cleanup of AP records. Err:0 2025/04/08 13:10:36.918346616 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 Public IP learnt is FALSE, public IP discovery is FALSE, private IP discovery is TRUE. 2025/04/08 13:10:36.918432950 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 IP:10.135.148.191[5264], Discovery Response sent 2025/04/08 13:15:43.392494791 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 Public IP learnt is FALSE, public IP discovery is FALSE, private IP discovery is TRUE. 2025/04/08 13:15:43.392583688 {wncmgrd_R0-0}{2}: [capwapac-discovery] [16153]: (note): MAC: 4006.d5cb.d440 IP:10.135.148.191[5264], Discovery Response sent 2025/04/08 13:15:52.782026217 {wncd_x_R0-2}{2}: [capwapac-smgr-srvr] [16528]: (note): MAC: 4006.d5cb.d440 DTLS session create callback received. 2025/04/08 13:15:52.877166644 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3d58) Session started - identity not specified 2025/04/08 13:15:52.877238662 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3d58) Adding peer certificate 2025/04/08 13:15:52.877551726 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 13:15:52.877572582 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Added x509 peer certificate - (971) bytes 2025/04/08 13:15:52.877602272 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: ip-ext-val: IP extension validation not required 2025/04/08 13:15:52.877763745 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::Incrementing refcount for context id-2206 to 1 2025/04/08 13:15:52.877774309 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: create new ca_req_context type PKI_VERIFY_CHAIN_CONTEXT,ident 2206 2025/04/08 13:15:52.877785411 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3d58)validation path has 1 certs 2025/04/08 13:15:52.877794753 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3d58) Check for identical certs 2025/04/08 13:15:52.877826814 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: Cert record not found for issuer serial. 2025/04/08 13:15:52.877827766 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI : (a3d58) Validating non-trusted cert 2025/04/08 13:15:52.877836810 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3d58) Create a list of suitable trustpoints 2025/04/08 13:15:52.877849306 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Found a issuer match 2025/04/08 13:15:52.877869678 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3d58) Suitable trustpoints are: 2025/04/08 13:15:52.877878406 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):Trustpool13, 2025/04/08 13:15:52.877884574 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):CISCO_IDEVID_SUDI, 2025/04/08 13:15:52.877890362 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3d58) Attempting to validate certificate using Trustpool13 policy 2025/04/08 13:15:52.877900292 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3d58) Using Trustpool13 to validate certificate 2025/04/08 13:15:52.878568226 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Added 1 certs to trusted chain. 2025/04/08 13:15:52.878587352 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Prepare session revocation service providers 2025/04/08 13:15:52.878644624 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: check if signed by sudi : issuer name of cert: o=Cisco,cn=High Assurance SUDI CA 2025/04/08 13:15:52.879174074 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): ../VIEW_ROOT/cisco.comp/pki_ssl/src/ca/provider/path/pkix/pkixpath.c(5787) : E_PATH_PROVIDER : path provider specific warning (BasicConstraints extension found in end entity cert) 2025/04/08 13:15:52.879272048 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Deleting cached key having key id 2716 2025/04/08 13:15:52.879288568 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Attempting to insert the peer's public key into cache 2025/04/08 13:15:52.879301750 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI:Peer's public inserted successfully with key id 2717 2025/04/08 13:15:52.880040547 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Expiring peer's cached key with key id 2717 2025/04/08 13:15:52.880061177 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3d58) Certificate is verified 2025/04/08 13:15:52.880071685 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Remove session revocation service providers 2025/04/08 13:15:52.880082471 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Remove session revocation service providers 2025/04/08 13:15:52.880096669 {iosrp_R0-0}{2}: [buginf] [4200]: (debug):Trustpool13:validation status - CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:15:52.880103279 {iosrp_R0-0}{2}: [pki] [4200]: (note): Trustpool13:validation status - CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:15:52.880103999 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3d58) Certificate validated without revocation check 2025/04/08 13:15:52.880339490 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 13:15:52.880431533 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: found otherName as value data ChipID=UYJTRkhTFwodRnJpIE9jdCAgOCAxNzo0OTo0OCBeAIc= 2025/04/08 13:15:52.880448619 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::cert refcount after increment = 1 2025/04/08 13:15:52.880455851 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Populate AAA auth data 2025/04/08 13:15:52.880473153 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Unable to get configured attribute for primary AAA list authorization. 2025/04/08 13:15:52.880481751 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: Unable to get configured attribute for primary AAA list authorization. 2025/04/08 13:15:52.880505651 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3d58)chain cert was anchored to trustpoint Trustpool13, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:15:52.880518178 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: (A3D58)chain cert was anchored to trustpoint Trustpool13, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING 2025/04/08 13:15:52.880519228 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3d58) Removing verify context 2025/04/08 13:15:52.880527546 {iosrp_R0-0}{2}: [pki] [4200]: (note): CRYPTO_PKI: (A3D58) Removing verify context 2025/04/08 13:15:52.880642706 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: destroying ca_req_context type PKI_VERIFY_CHAIN_CONTEXT,ident 2206, ref count 1 2025/04/08 13:15:52.880655362 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::Decrementing refcount for context id-2206 to 0 2025/04/08 13:15:52.880661614 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: ca_req_context released 2025/04/08 13:15:52.880670904 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3d58) Validation TP is Trustpool13 2025/04/08 13:15:52.880680797 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: (a3d58) Certificate validation succeeded 2025/04/08 13:15:52.880750761 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: Rcvd request to end PKI session a3d58. 2025/04/08 13:15:52.880762613 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: PKI session a3d58 has ended. Freeing all resources. 2025/04/08 13:15:52.880772281 {iosrp_R0-0}{2}: [buginf] [4200]: (debug)::cert refcount after decrement = 0 2025/04/08 13:15:52.880830115 {iosrp_R0-0}{2}: [buginf] [4200]: (debug): CRYPTO_PKI: PKI session a0000 has ended. Freeing all resources completed 2025/04/08 13:15:54.474682346 {wncd_x_R0-2}{2}: [capwapac-smgr-sess-fsm] [16528]: (note): Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5264] 10.201.233.81[5246] Last Control Packet received 0 seconds ago. 2025/04/08 13:15:54.474682968 {wncd_x_R0-2}{2}: [capwapac-smgr-sess-fsm] [16528]: (note): Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5264] 10.201.233.81[5246] Last Data Keep Alive Packet information not available. Data session was not established 2025/04/08 13:15:54.474712953 {wncd_x_R0-2}{2}: [errmsg] [16528]: (note): %CAPWAPAC_SMGR_TRACE_MESSAGE-5-AP_JOIN_DISJOIN: R0/2: wncd: AP Event: AP Name: AP4006.D5E0.2180 Mac: 4006.d5cb.d440 Session-IP: 10.135.148.191[5264] 10.201.233.81[5246] Disjoined AP Auth Failure 2025/04/08 13:15:54.474928502 {wncd_x_R0-2}{2}: [ewlc-dtls-sess] [16528]: (note): Remote Host: 10.135.148.191[5264] MAC: 4006.d5cb.d440 DTLS session destroy 2025/04/08 13:15:54.474996292 {wncd_x_R0-2}{2}: [rrm-client] [16528]: (ERR): 4006.d5cb.d440 AP Delete processing failed ap ctxt handle is Invalid 2025/04/08 13:15:54.475001324 {wncd_x_R0-2}{2}: [apmgr-db] [16528]: (ERR): 4006.d5cb.d440 Failed to get session handle id during cleanup of AP records. Err:0