[
Date Prev][
Date Next][
Thread Prev][
Thread Next][
Date Index][
Thread Index]
[
List Home]
Re: [keyple-dev] Issue towards using UseCase4 & 10 with SAM-S1 E1
|
Dear Jean-Pierre,
I did the change and the issue "Unauthorized key error" is
resolved.
Now I have DIGEST_INIT [6A83] issue.
Logs attached. Enabled DEBUG traces for Use Case 10 too.
Best regards,
Thillai Elayaraja S
|
Thillai
Elayaraja S |
CTO |
+91 72593 34534 |
thillaielayaraja.s@xxxxxxxxxxx |
|
ELYCTIS
India Pte Ltd |
Level 7, Mfar Greenheart |
Manyata Tech Park |
Bengaluru
560045 |
INDIA |
On 04-07-2025 06:29 pm, Jean-Pierre
Fortune wrote:
Hi Thillai,
Upon closer examination of the logs you sent, it appears
that the code execution flow in both cases is not the same,
and the errors encountered are of a different nature.
My previous message was based on Use Case 10, which seems
to correspond to a transaction involving two readings of the
SFI=14h file. However, the log for this case does not display
DEBUG level traces, which would be very helpful for a more
in-depth analysis.
On the other hand, the log for Use Case 4 does show DEBUG
traces, but here the transaction concludes with an
"Unauthorized key error." This specific error suggests that
the card you are using requires a particular configuration to
specify the key KIF value that is not provided by this
particular card.
Based on the JSON file generated by the card analysis tool,
the KIF value to be used for this AID is 0xFF. In the context
of the Use Case 4 code, this would translate to an adjustment
within the `initSecuritySetting()` method, similar to the
following:
private static void
initSecuritySetting() {
LegacySam sam =
selectSam(samReader);
symmetricCryptoSecuritySetting =
calypsoCardApiFactory
.createSymmetricCryptoSecuritySetting(
LegacySamExtensionService.getInstance()
.getLegacySamApiFactory()
.createSymmetricCryptoCardTransactionManagerFactory(samReader,
sam))
.assignDefaultKif(PERSONALIZATION, (byte) 0xFF)
.assignDefaultKif(LOAD, (byte) 0xFF)
.assignDefaultKif(DEBIT, (byte) 0xFF);
}
Could you please try implementing this change in your Use
Case 4 code and observe if it resolves the "Unauthorized key
error"?
Regarding use case 10, I would need more logs to help you.
But the previous configuration with 0xFF should also apply
here!
Best regards,
Jean-Pierre Fortune
Keyple-Dev Team
Dear Jean-Pierre,
I tried that and the status (logs shared in previous
email) remains the same:
C:\Windows\System32>sc query
ScDeviceEnum
SERVICE_NAME: ScDeviceEnum
TYPE : 30 WIN32
STATE : 1 STOPPED
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
C:\Windows\System32>sc query CertPropSvc
SERVICE_NAME: CertPropSvc
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 1 STOPPED
WIN32_EXIT_CODE : 1077 (0x435)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
C:\Windows\System32>sc config ScDeviceEnum start=
disabled
[SC] ChangeServiceConfig SUCCESS
C:\Windows\System32>sc config CertPropSvc start=
disabled
[SC] ChangeServiceConfig SUCCESS
Best regards,
Thillai Elayaraja S
|
Thillai
Elayaraja S |
CTO |
+91 72593 34534 |
thillaielayaraja.s@xxxxxxxxxxx |
|
ELYCTIS
India Pte Ltd |
Level 7, Mfar
Greenheart |
Manyata Tech Park |
Bengaluru
560045 |
INDIA |
On 04-07-2025 05:33 pm, Jean-Pierre Fortune wrote:
Hi Thillai,
This is a significant step forward! The fact that the
secure transaction now goes all the way through is
excellent news, as it confirms good communication
between your reader, the card, and the SAM.
The final error you're encountering, related to the
card's verification of the signature calculated by
the SAM, isn't necessarily directly related to the
software you're running.
Most frequently, this problem is linked to
interference from Windows smart card services.
Specifically, these are the "Smart Card Device
Enumeration Service" (ScDeviceEnum
) and
the "Certificate Propagation Service" (CertPropSvc
).
These services can unfortunately insert invisible
exchanges with the card or the SAM, causing the
cryptographic calculations to fail.
Could you please try disabling these services and
let us know if this resolves the issue?
To check their status before disabling them, you
can run the following commands in an elevated
Command Prompt (Run as Administrator):
sc query ScDeviceEnum
sc query CertPropSvc
This will tell you whether the services are
currently running. You can also check their startup
configuration using:
sc qc ScDeviceEnum
sc qc CertPropSvc
To stop and disable the services (again, in an
elevated Command Prompt), use:
sc stop ScDeviceEnum
sc config ScDeviceEnum start= disabled
sc stop CertPropSvc
sc config CertPropSvc start= disabled
We remain at your disposal for any further assistance.
Best regards,
Jean-Pierre Fortune
Keyple-Dev Team
Dear Jean-Pierre,
I tried to adapt both of the examples and
attached the Console log received.
The adaptation I made was to change the AID
to "304554502E494341" and the SFI_ENVIRONMENT_AND_HOLDER
to 0x14
(with UseCase10 used SFI_CONTRACTS
as 0x15 but unsure about SFI_EVENTS_LOG
and SFI_CONTRACT_LIST)
With that it seems it has progressed a bit more
in either of the examples but I can't make it work
to see it complete gracefully.
It seems to me that the card is not personalized
on my side.
Could you confirm and guide me on the right
example to start with ?
By the way, it is my first few days working with
Calypso:
I see that although a bit of learning curve is
required (atleast for me), Keyple is making it far
more easier than I thought. Kudos to all of you.
Best regards,
Thillai Elayaraja S
|
Thillai
Elayaraja S |
CTO |
+91 72593
34534 |
thillaielayaraja.s@xxxxxxxxxxx |
|
ELYCTIS
India Pte Ltd |
Level 7, Mfar
Greenheart |
Manyata Tech
Park |
Bengaluru 560045 |
INDIA |
On 04-07-2025 01:27 pm, Jean-Pierre Fortune
wrote:
Hi Thillai,
Thanks for reaching out to the Keyple-Dev
community and for providing these detailed
logs.
Based on our analysis of the logs, the issue
doesn't seem to be at the physical
communication level. The exchanges between
your reader and the card appear to be correct.
The errors you're encountering are happening
at a higher, application command level.
Specifically, in the log for UseCase10
,
the OPEN_SECURE_SESSION
command
fails with a 6A82
status
word, which means "File not found". This
command is trying to read record 1 of the file
located by SFI (Short File Identifier) 0x06.
However, the JSON file generated by the card
analysis tool shows that a file with SFI=0x06
does not actually exist on your card sample.
This mismatch is the direct cause of the
error.
This leads us to the main question: have
you adapted the APDU commands in the
examples to match the specific file
structure of the card you are using?
It seems likely that adapting the SFI and
record parameters within the commands to align
with your card's actual file system should
resolve the issue. The good news is that this
suggests your reader is indeed capable of
handling the low-level Calypso protocol
correctly.
Let us know if adjusting the commands solves
the problem.
Best regards,
Jean-Pierre Fortune
Keyple-Dev Team
Dear Keyple-Dev team,
Good day! I'm Thillai Elayaraja, CTO of
ELYCTIS. Currently I'm evaluating Calypso
support with our PC/SC readers with a
Calypso card sample + SAM acquired from
ISRA.
The Calypso card sample is labelled as ST23ZR08
Calypso CD21 Rev 3.1 and
The SAM sample is labelled as INTEROP
vFF.E0.42 SAM-S1 E1.
With them I tried the examples UseCase4
and UseCase10 from Keyple but encounter
issues detailed below. I tried to adapt
those examples to use the reader regex,
Card AID (taken from the Card
Configuration Audit tool) and also changed
the LegacySamUtil.buildPowerOnDataFilter()
to use LegacySam.ProductType.SAM_S1E1,
with vain. I got to know from one of the
CNA contacts to seek help from the
Keyple-Dev community and that's where here
I'am with the details given below:
Regarding the examples:
- UseCase4_CardAuthentication:
Attached the UseCase4_CardAuthentication.log
for reference.
For info, the code stopped at processCommands
as below:

- UseCase10_SessionTrace_TN313:
Attached the UseCase10_SessionTrace_TN313.log
for reference.
For info, the log ends with the
following error:
[11:01:01:138]
[pool-1-thread-1] [ERROR]
CardReaderObserver - [Transaction failed
with exception: A card command error
occurred while processing responses
to card commands:
OPEN_SECURE_SESSION
Transaction audit JSON data:
{"targetSmartCard":{"selectApplicationResponse":{"apdu":"6F228408334D54522E494341A516BF0C13C70800000000750D264E53070A2D20021010019000","statusWord":"9000"},"isExtendedModeSupported":false,"isRatificationOnDeselectSupported":true,"isSvFeatureAvailable":false,"isPinFeatureAvailable":false,"isPkiModeSupported":false,"isDfInvalidated":false,"calypsoCardClass":"ISO","calypsoSerialNumber":"00000000750D264E","startupInfo":"0A2D2002101001","productType":"PRIME_REVISION_3","dfName":"334D54522E494341","modificationsCounterMax":"01AE","isModificationCounterInBytes":true,"files":[],"filesBackup":[],"svLastTNum":"00","svLastTNumBackup":"00","isHce":false,"svKvc":"00","applicationSubType":"02","applicationType":"20","sessionModification":"0A","payloadCapacity":"FA","isCounterValuePostponed":false,"isLegacyCase1":false},"apdus":["008A0B3904AF711A9400","6A82"]}
[11:01:01:138] [pool-1-thread-1]
[INFO] ObservableLocalReaderAdapter -
Reader [ELYCTIS CL reader FFFFFFFF0000
0] starts card removal sequence
Regarding Card Configuration Audit tools:
- Attached the Tool_AnalyzeCardFileStructure-2.0.3.log
and the generated 20250626_CardData_1963796046.json
for reference.
- Attached the Tool_CheckCardFileStructure-2.0.3.log
for reference.
With these logs and info, could you help
if I need to adapt the examples further to
verify the intended use-cases ? And can we
"tentatively" say if our reader is capable
to support Calypso transactions ?
Thanking you.
With best regards,
Thillai Elayaraja S
P S : Soon we will try to procure the
test kits from CNA to validate our readers
with all usecases and with the
demonstrator app.
_______________________________________________
keyple-dev mailing list
keyple-dev@xxxxxxxxxxx
To unsubscribe from this list, visit https://www.eclipse.org/mailman/listinfo/keyple-dev
[19:03:33:103] [main] [INFO] Main_CardAuthentication_Pcsc - = UseCase Calypso #4: Calypso card authentication ==================
[19:03:33:184] [main] [INFO] SmartCardServiceAdapter - Register plugin [PcscPlugin]
[19:03:33:216] [main] [INFO] PcscPluginAdapter - Plugin [PcscPlugin]: use default protocol identification rules
[19:03:33:222] [main] [INFO] PcscPluginAdapter - Plugin [PcscPlugin]: search available readers
[19:03:34:093] [main] [INFO] PcscPluginAdapter - Plugin [PcscPlugin]: reader found: [ELYCTIS CL reader FFFFFFFF0000 0]
[19:03:34:094] [main] [INFO] PcscPluginAdapter - Plugin [PcscPlugin]: reader found: [ELYCTIS CNT reader FFFFFFFF0000 0]
[19:03:34:111] [main] [INFO] PcscReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0]: set contactless type to [true]
[19:03:34:111] [main] [INFO] PcscReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0]: set ISO protocol to [T1] (T=1)
[19:03:34:111] [main] [INFO] PcscReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0]: set sharing mode to [SHARED]
[19:03:34:111] [main] [INFO] PcscReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0]: set contactless type to [false]
[19:03:34:111] [main] [INFO] PcscReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0]: set ISO protocol to [ANY] (*)
[19:03:34:111] [main] [INFO] PcscReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0]: set sharing mode to [SHARED]
[19:03:34:125] [main] [DEBUG] PcscReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0]: open card physical channel for protocol [*]
[19:03:34:331] [main] [DEBUG] PcscReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0]: open card physical channel in shared mode
[19:03:34:341] [main] [DEBUG] PcscReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0]: open card physical channel for protocol [T=1]
[19:03:34:375] [main] [DEBUG] PcscReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0]: open card physical channel in shared mode
[19:03:34:376] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] selects application with AID [304554502E494341]
[19:03:34:385] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"00A4040008304554502E49434100","successfulStatusWords":["9000"],"info":"Internal Select Application"}, elapsed 3.047355129E8 ms
[19:03:34:399] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"6F228408304554502E494341A516BF0C13C70800000000750D264E53070A2D20021010019000","statusWord":"9000"}, elapsed 21.4 ms
[19:03:34:408] [main] [DEBUG] CommandGetDataFci - DF name: 304554502E494341
[19:03:34:409] [main] [DEBUG] CommandGetDataFci - Application serial number: 00000000750D264Eh
[19:03:34:409] [main] [DEBUG] CommandGetDataFci - Discretionary data: 0A2D2002101001
[19:03:34:426] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"8084000004","successfulStatusWords":["9000"],"info":"Get Challenge"}, elapsed 3.047355609E8 ms
[19:03:34:436] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"97E644709000","statusWord":"9000"}, elapsed 10.2 ms
[19:03:34:438] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"008A0BA10497E6447000","successfulStatusWords":["9000"],"info":"Open Secure Session - key index: 3, sfi: 14h, rec: 1"}, elapsed 38.6 ms
[19:03:34:453] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"030CF3B600FF411D00000000000000000000000000000000000000000000000000000000009000","statusWord":"9000"}, elapsed 15.4 ms
[19:03:34:457] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"801400000800000000750D264E","successfulStatusWords":["9000"],"info":"Select Diversifier"}, elapsed 21.3 ms
[19:03:34:463] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"9000","statusWord":"9000"}, elapsed 7.0 ms
[19:03:34:464] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"808A00FF27FF41030CF3B600FF411D0000000000000000000000000000000000000000000000000000000000","successfulStatusWords":["9000"],"info":"Digest Init"}, elapsed 0.3 ms
[19:03:34:475] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"6A83","statusWord":"6A83"}, elapsed 11.0 ms
[19:03:34:481] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"008E000000","successfulStatusWords":["9000"],"info":"Close Secure Session"}, elapsed 28.7 ms
[19:03:34:487] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"9000","statusWord":"9000"}, elapsed 5.5 ms
[19:03:34:487] [main] [INFO] CommandCloseSecureSession - Secure session successfully aborted
Exception in thread "main" org.eclipse.keypop.calypso.card.transaction.CryptoException: A SAM command error occurred while processing responses to SAM commands: DIGEST_INIT [6A83]
at org.eclipse.keyple.card.calypso.CommandCloseSecureSession.finalizeRequest(CommandCloseSecureSession.java:162)
at org.eclipse.keyple.card.calypso.SecureSymmetricCryptoTransactionManagerAdapter.processCommands(SecureSymmetricCryptoTransactionManagerAdapter.java:305)
at org.eclipse.keyple.card.calypso.SecureSymmetricCryptoTransactionManagerAdapter.processCommands(SecureSymmetricCryptoTransactionManagerAdapter.java:39)
at org.eclipse.keyple.card.calypso.example.UseCase4_CardAuthentication.Main_CardAuthentication_Pcsc.main(Main_CardAuthentication_Pcsc.java:148)
Caused by: org.eclipse.keypop.calypso.crypto.symmetric.SymmetricCryptoException: A SAM command error occurred while processing responses to SAM commands: DIGEST_INIT [6A83]
at org.eclipse.keyple.card.calypso.crypto.legacysam.SymmetricCryptoCardTransactionManagerAdapter.processCommands(SymmetricCryptoCardTransactionManagerAdapter.java:448)
at org.eclipse.keyple.card.calypso.crypto.legacysam.SymmetricCryptoCardTransactionManagerAdapter.finalizeTerminalSessionMac(SymmetricCryptoCardTransactionManagerAdapter.java:183)
at org.eclipse.keyple.card.calypso.CommandCloseSecureSession.finalizeRequest(CommandCloseSecureSession.java:160)
... 3 more
Caused by: org.eclipse.keypop.calypso.crypto.legacysam.transaction.UnexpectedCommandStatusException: A SAM command error occurred while processing responses to SAM commands: DIGEST_INIT [6A83]
Transaction audit JSON data: {"sam":{"powerOnData":"3B3F9600805A2A80E1084025AE11E769829000","samProductType":"SAM_S1E1","serialNumber":"AE11E769","platform":"2A","applicationType":"80","applicationSubType":"E1","softwareIssuer":"08","softwareVersion":"40","softwareRevision":"25","classByte":"80","counters":{},"countersIncrementConfig":{},"counterCeilings":{},"systemKeyParameterMap":{},"workKeyParameterByRecordNumberMap":{},"workKeyParameterByKifKvcMap":{}},"apdus":["8084000004","97E644709000","008A0BA10497E6447000","030CF3B600FF411D00000000000000000000000000000000000000000000000000000000009000","801400000800000000750D264E","9000","808A00FF27FF41030CF3B600FF411D0000000000000000000000000000000000000000000000000000000000","6A83"]}
... 6 more
Caused by: org.eclipse.keyple.card.calypso.crypto.legacysam.DataAccessException: Record not found: signing key not found
at org.eclipse.keyple.card.calypso.crypto.legacysam.Command.buildCommandException(Command.java:271)
at org.eclipse.keyple.card.calypso.crypto.legacysam.Command.checkStatus(Command.java:252)
at org.eclipse.keyple.card.calypso.crypto.legacysam.Command.setResponseAndCheckStatus(Command.java:199)
at org.eclipse.keyple.card.calypso.crypto.legacysam.CommandDigestInit.parseResponse(CommandDigestInit.java:123)
at org.eclipse.keyple.card.calypso.crypto.legacysam.SymmetricCryptoCardTransactionManagerAdapter.processCommands(SymmetricCryptoCardTransactionManagerAdapter.java:418)
... 5 more
[19:17:50:580] [main] [INFO] Main_SessionTrace_TN313_Pcsc - =============== UseCase Calypso #10: session trace TN313 ==================
[19:17:50:581] [main] [INFO] Main_SessionTrace_TN313_Pcsc - Using parameters:
[19:17:50:585] [main] [INFO] Main_SessionTrace_TN313_Pcsc - AID=304554502E494341
[19:17:50:585] [main] [INFO] Main_SessionTrace_TN313_Pcsc - CARD_READER_REGEX=.*ASK LoGO.*|.*Contactless.*|.*ELYCTIS CL .*
[19:17:50:585] [main] [INFO] Main_SessionTrace_TN313_Pcsc - SAM_READER_REGEX=.*Identive.*|.*HID.*|.*SAM.*|.*ELYCTIS CNT .*
[19:17:50:662] [main] [INFO] SmartCardServiceAdapter - Register plugin [PcscPlugin]
[19:17:50:692] [main] [INFO] PcscPluginAdapter - Plugin [PcscPlugin]: use default protocol identification rules
[19:17:50:697] [main] [INFO] PcscPluginAdapter - Plugin [PcscPlugin]: search available readers
[19:17:51:542] [main] [INFO] PcscPluginAdapter - Plugin [PcscPlugin]: reader found: [ELYCTIS CL reader FFFFFFFF0000 0]
[19:17:51:542] [main] [INFO] PcscPluginAdapter - Plugin [PcscPlugin]: reader found: [ELYCTIS CNT reader FFFFFFFF0000 0]
[19:17:51:560] [main] [INFO] PcscReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0]: set contactless type to [true]
[19:17:51:561] [main] [INFO] PcscReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0]: set ISO protocol to [T1] (T=1)
[19:17:51:561] [main] [INFO] PcscReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0]: set sharing mode to [SHARED]
[19:17:51:561] [main] [INFO] PcscReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0]: set contactless type to [false]
[19:17:51:561] [main] [INFO] PcscReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0]: set ISO protocol to [ANY] (*)
[19:17:51:561] [main] [INFO] PcscReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0]: set sharing mode to [SHARED]
[19:17:51:573] [main] [DEBUG] PcscReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0]: open card physical channel for protocol [*]
[19:17:51:782] [main] [DEBUG] PcscReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0]: open card physical channel in shared mode
[19:17:51:800] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"8084000008","successfulStatusWords":["9000"],"info":"Get Challenge"}, elapsed 3.055929268E8 ms
[19:17:51:812] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"511608685EC95E9C9000","statusWord":"9000"}, elapsed 20.3 ms
[19:17:51:812] [main] [INFO] Main_SessionTrace_TN313_Pcsc - Select application with AID = '304554502E494341'
[19:17:51:815] [main] [INFO] ObservationManagerAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] adds observer [CardReaderObserver]
[19:17:51:816] [main] [INFO] ObservableLocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] starts card detection with polling mode [REPEATING]
[19:17:51:818] [main] [INFO] Main_SessionTrace_TN313_Pcsc - Wait for a card...
[19:17:51:819] [main] [INFO] Main_SessionTrace_TN313_Pcsc - Press ENTER to exit...
[19:17:51:820] [pool-1-thread-1] [DEBUG] PcscReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0]: open card physical channel for protocol [T=1]
[19:17:51:860] [pool-1-thread-1] [DEBUG] PcscReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0]: open card physical channel in shared mode
[19:17:51:861] [pool-1-thread-1] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] selects application with AID [304554502E494341]
[19:17:51:862] [pool-1-thread-1] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"00A4040008304554502E49434100","successfulStatusWords":["9000"],"info":"Internal Select Application"}, elapsed 3.055929974E8 ms
[19:17:51:874] [pool-1-thread-1] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"6F228408304554502E494341A516BF0C13C70800000000750D264E53070A2D20021010019000","statusWord":"9000"}, elapsed 11.8 ms
[19:17:51:875] [pool-1-thread-1] [DEBUG] ObservableLocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] notifies event [CARD_MATCHED] to 1 observer(s)
[19:17:51:882] [pool-1-thread-1] [DEBUG] CommandGetDataFci - DF name: 304554502E494341
[19:17:51:882] [pool-1-thread-1] [DEBUG] CommandGetDataFci - Application serial number: 00000000750D264Eh
[19:17:51:883] [pool-1-thread-1] [DEBUG] CommandGetDataFci - Discretionary data: 0A2D2002101001
[19:17:51:893] [pool-1-thread-1] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"008A0BA1045116086800","successfulStatusWords":["9000"],"info":"Open Secure Session - key index: 3, sfi: 14h, rec: 1"}, elapsed 18.8 ms
[19:17:51:909] [pool-1-thread-1] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"030CED8300FF411D00000000000000000000000000000000000000000000000000000000009000","statusWord":"9000"}, elapsed 15.8 ms
[19:17:51:913] [pool-1-thread-1] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"00B201AC1D","successfulStatusWords":["9000","6A82","6A83"],"info":"Read Records - sfi: 15h, rec: 1, read mode: ONE_RECORD, expected length: 29"}, elapsed 4.9 ms
[19:17:51:922] [pool-1-thread-1] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"00000000000000000000000000000000000000000000000000000000009000","statusWord":"9000"}, elapsed 8.5 ms
[19:17:51:925] [pool-1-thread-1] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"801400000800000000750D264E","successfulStatusWords":["9000"],"info":"Select Diversifier"}, elapsed 113.0 ms
[19:17:51:931] [pool-1-thread-1] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"9000","statusWord":"9000"}, elapsed 6.9 ms
[19:17:51:931] [pool-1-thread-1] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"808A00FF27FF41030CED8300FF411D0000000000000000000000000000000000000000000000000000000000","successfulStatusWords":["9000"],"info":"Digest Init"}, elapsed 0.1 ms
[19:17:51:942] [pool-1-thread-1] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"6A83","statusWord":"6A83"}, elapsed 11.1 ms
[19:17:51:948] [pool-1-thread-1] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"008E000000","successfulStatusWords":["9000"],"info":"Close Secure Session"}, elapsed 27.1 ms
[19:17:51:954] [pool-1-thread-1] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"9000","statusWord":"9000"}, elapsed 5.6 ms
[19:17:51:954] [pool-1-thread-1] [INFO] CommandCloseSecureSession - Secure session successfully aborted
[19:17:51:954] [pool-1-thread-1] [ERROR] CardReaderObserver - [31mTransaction failed with exception: A SAM command error occurred while processing responses to SAM commands: DIGEST_INIT [6A83][0m
[19:17:51:954] [pool-1-thread-1] [INFO] ObservableLocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] starts card removal sequence