Hi Thillai,
Upon closer examination of the logs you sent, it appears
that the code execution flow in both cases is not the same,
and the errors encountered are of a different nature.
My previous message was based on Use Case 10, which seems
to correspond to a transaction involving two readings of the
SFI=14h file. However, the log for this case does not display
DEBUG level traces, which would be very helpful for a more
in-depth analysis.
On the other hand, the log for Use Case 4 does show DEBUG
traces, but here the transaction concludes with an
"Unauthorized key error." This specific error suggests that
the card you are using requires a particular configuration to
specify the key KIF value that is not provided by this
particular card.
Based on the JSON file generated by the card analysis tool,
the KIF value to be used for this AID is 0xFF. In the context
of the Use Case 4 code, this would translate to an adjustment
within the `initSecuritySetting()` method, similar to the
following:
private static void
initSecuritySetting() {
LegacySam sam =
selectSam(samReader);
symmetricCryptoSecuritySetting =
calypsoCardApiFactory
.createSymmetricCryptoSecuritySetting(
LegacySamExtensionService.getInstance()
.getLegacySamApiFactory()
.createSymmetricCryptoCardTransactionManagerFactory(samReader,
sam))
.assignDefaultKif(PERSONALIZATION, (byte) 0xFF)
.assignDefaultKif(LOAD, (byte) 0xFF)
.assignDefaultKif(DEBIT, (byte) 0xFF);
}
Could you please try implementing this change in your Use
Case 4 code and observe if it resolves the "Unauthorized key
error"?
Regarding use case 10, I would need more logs to help you.
But the previous configuration with 0xFF should also apply
here!
Best regards,
Jean-Pierre Fortune
Keyple-Dev Team