[
Date Prev][
Date Next][
Thread Prev][
Thread Next][
Date Index][
Thread Index]
[
List Home]
| Re: [keyple-dev] Issue towards using UseCase4 & 10 with SAM-S1 E1 | 
  
  
    Dear Jean-Pierre,
    I did the change and now the `DIGEST_INIT [6A83]` issue is
      resolved.
    
    Now I have the `6988 ` issue. Log attached for Use Case 4. Once
      this is solved, I will check with Use Case 10.
    
    Best regards,
    Thillai Elayaraja S
    
    
    
      
        
          
            | ![]()  ![]()  ![]()  | Thillai
              Elayaraja S | 
          
            | CTO | 
          
            | +91 72593 34534 | 
          
            | thillaielayaraja.s@xxxxxxxxxxx | 
          
            |  | 
          
            | ELYCTIS
                India Pte Ltd | 
          
            | Level 7, Mfar Greenheart | 
          
            | Manyata Tech Park | 
          
            | Bengaluru
              560045 | 
          
            | INDIA | 
        
      
      
     
    On 04-07-2025 08:13 pm, Jean-Pierre
      Fortune wrote:
    
    
      
      
        
          Hi Thillai,
          
            The error `6A83` in response to `DIGEST_INIT` indicates that
            the SAM, which is being requested to perform calculations
            with the key (KIF=FF, KVC=41), does not possess this
            specific key. 
            
            My advice to use `FF` as a KIF was a misinterpretation, as
            this value is actually reserved to indicate an *unknown* KIF
            and should not be used as a valid key reference. Instead, I
            suggest retrying Use Case 4 with the following
            configuration, which corresponds to the values commonly used
            for the three standard KIFs:
            
            .assignDefaultKif(PERSONALIZATION,
              (byte) 0x21)
              .assignDefaultKif(LOAD, (byte) 0x27)
              .assignDefaultKif(DEBIT, (byte) 0x30)
            
            I will also check with other members of the Calypso team to
            better understand the content of the JSON file describing
            the card’s structure and keys.
          
          Best regards,
          
          
          Jean-Pierre Fortune
            Keyple-Dev Team
            
          
         
        
        
          
          
            
              Dear Jean-Pierre,
              I did the change and the issue "Unauthorized key error"
                is resolved.
              Now I have DIGEST_INIT [6A83] issue.
              Logs attached. Enabled DEBUG traces for Use Case 10
                too.
              Best regards,
              Thillai Elayaraja S
              
              
                
                  
                    
                      | ![]()  ![]()  ![]()  | Thillai
                        Elayaraja S | 
                    
                      | CTO | 
                    
                      | +91 72593 34534 | 
                    
                      | thillaielayaraja.s@xxxxxxxxxxx | 
                    
                      |  | 
                    
                      | ELYCTIS
                          India Pte Ltd | 
                    
                      | Level 7, Mfar
                        Greenheart | 
                    
                      | Manyata Tech Park | 
                    
                      | Bengaluru
                        560045 | 
                    
                      | INDIA | 
                  
                
                
               
              On 04-07-2025 06:29 pm, Jean-Pierre Fortune wrote:
              
              
                
                  Hi Thillai,
                  
                  
                  Upon closer examination of the logs you sent, it
                    appears that the code execution flow in both cases
                    is not the same, and the errors encountered are of a
                    different nature.
                  
                  
                  My previous message was based on Use Case 10,
                    which seems to correspond to a transaction involving
                    two readings of the SFI=14h file. However, the log
                    for this case does not display DEBUG level traces,
                    which would be very helpful for a more in-depth
                    analysis.
                  
                  
                  On the other hand, the log for Use Case 4 does
                    show DEBUG traces, but here the transaction
                    concludes with an "Unauthorized key error." This
                    specific error suggests that the card you are using
                    requires a particular configuration to specify the
                    key KIF value that is not provided by this
                    particular card.
                  
                  
                  Based on the JSON file generated by the card
                    analysis tool, the KIF value to be used for this
                    AID  is 0xFF. In the context of the Use Case 4 code,
                    this would translate to an adjustment within the
                    `initSecuritySetting()` method, similar to the
                    following:
                  
                  
                  private static void
                      initSecuritySetting() {
                  
                     LegacySam sam =
                        selectSam(samReader);
                    
                        symmetricCryptoSecuritySetting =
                  
                  
                    
                       calypsoCardApiFactory
                    
                  
                  
                    
                      
                        
                            .createSymmetricCryptoSecuritySetting(
                      
                    
                  
                  
                    
                      
                        
                          
                              LegacySamExtensionService.getInstance()
                        
                      
                    
                  
                  
                    
                      
                        
                          
                            
                                .getLegacySamApiFactory()
                          
                        
                      
                    
                    
                      
                        
                          
                            
                                .createSymmetricCryptoCardTransactionManagerFactory(samReader,
                                sam))
                          
                        
                      
                    
                  
                  
                    
                      
                        
                            .assignDefaultKif(PERSONALIZATION, (byte)
                            0xFF)
                      
                    
                    
                      
                        
                            .assignDefaultKif(LOAD, (byte) 0xFF)
                      
                    
                    
                      
                        
                            .assignDefaultKif(DEBIT, (byte) 0xFF);
                      
                    
                  
                   }
                  
                  
                  Could you please try implementing this change in
                    your Use Case 4 code and observe if it resolves the
                    "Unauthorized key error"? 
                  Regarding use case 10, I would need more logs to
                    help you. But the previous configuration with 0xFF
                    should also apply here!
                  
                  
                  Best regards,
                  
                  
                  Jean-Pierre Fortune
                  Keyple-Dev Team
                  
                 
                
                
                  
                  
                    
                      Dear Jean-Pierre,
                      I tried that and the status (logs shared in
                        previous email) remains the same:
                      C:\Windows\System32>sc
                          query ScDeviceEnum
                          
                          SERVICE_NAME: ScDeviceEnum
                                  TYPE               : 30  WIN32
                                  STATE              : 1  STOPPED
                                  WIN32_EXIT_CODE    : 0  (0x0)
                                  SERVICE_EXIT_CODE  : 0  (0x0)
                                  CHECKPOINT         : 0x0
                                  WAIT_HINT          : 0x0
                          
                          C:\Windows\System32>sc query CertPropSvc
                          
                          SERVICE_NAME: CertPropSvc
                                  TYPE               : 20 
                          WIN32_SHARE_PROCESS
                                  STATE              : 1  STOPPED
                                  WIN32_EXIT_CODE    : 1077  (0x435)
                                  SERVICE_EXIT_CODE  : 0  (0x0)
                                  CHECKPOINT         : 0x0
                                  WAIT_HINT          : 0x0
                          
                          C:\Windows\System32>sc config ScDeviceEnum
                          start= disabled
                          [SC] ChangeServiceConfig SUCCESS
                          
                          C:\Windows\System32>sc config CertPropSvc
                          start= disabled
                          [SC] ChangeServiceConfig SUCCESS
                      
                      Best regards,
                      Thillai Elayaraja S
                        
                      
                      
                        
                          
                            
                              | ![]()  ![]()  ![]()  | Thillai
                                Elayaraja S | 
                            
                              | CTO | 
                            
                              | +91 72593
                                34534 | 
                            
                              | thillaielayaraja.s@xxxxxxxxxxx | 
                            
                              |  | 
                            
                              | ELYCTIS
                                  India Pte Ltd | 
                            
                              | Level 7,
                                Mfar Greenheart | 
                            
                              | Manyata Tech
                                Park | 
                            
                              | Bengaluru 560045 | 
                            
                              | INDIA | 
                          
                        
                        
                       
                      On 04-07-2025 05:33 pm, Jean-Pierre Fortune
                        wrote:
                      
                      
                        
                          Hi Thillai,
                          
                            This is a significant step forward! The fact
                            that the secure transaction now goes all the
                            way through is excellent news, as it
                            confirms good communication between your
                            reader, the card, and the SAM.
                          
                            The final error you're encountering,
                              related to the card's verification of the
                              signature calculated by the SAM, isn't
                              necessarily directly related to the
                              software you're running.
                            Most frequently, this problem is linked
                              to interference from Windows smart card
                              services. Specifically, these are the
                              "Smart Card Device Enumeration Service" (ScDeviceEnum)
                              and the "Certificate Propagation Service"
                              (CertPropSvc). These services
                              can unfortunately insert invisible
                              exchanges with the card or the SAM,
                              causing the cryptographic calculations to
                              fail.
                            Could you please try disabling these
                              services and let us know if this resolves
                              the issue?
                            To check their status before disabling
                              them, you can run the following commands
                              in an elevated Command Prompt
                              (Run as Administrator):
                            sc query ScDeviceEnum
sc query CertPropSvc
                            This will tell you whether the services
                              are currently running. You can also check
                              their startup configuration using:
                            sc qc ScDeviceEnum
sc qc CertPropSvc
                            To stop and disable the services (again,
                              in an elevated Command Prompt), use:
                            sc stop ScDeviceEnum
sc config ScDeviceEnum start= disabled
sc stop CertPropSvc
sc config CertPropSvc start= disabled
                            We remain at your disposal for any further assistance.
                            Best regards,
                            Jean-Pierre Fortune
                            Keyple-Dev Team
                           
                         
                        
                        
                          
                          
                            
                              Dear Jean-Pierre,
                              I tried to adapt both of the examples
                                and attached the Console log received.
                              The adaptation I made was to change
                                the AID
                                to "304554502E494341" and the SFI_ENVIRONMENT_AND_HOLDER
                                to 0x14
                                (with UseCase10 used SFI_CONTRACTS
                                as 0x15 but unsure about SFI_EVENTS_LOG
                                and SFI_CONTRACT_LIST)
                              
                              With that it seems it has progressed a
                                bit more in either of the examples but I
                                can't make it work to see it complete
                                gracefully.
                              It seems to me that the card is not
                                personalized on my side.
                              Could you confirm and guide me on the
                                right example to start with ?
                              By the way, it is my first few days
                                working with Calypso:
                                I see that although a bit of learning
                                curve is required (atleast for me),
                                Keyple is making it far more easier than
                                I thought. Kudos to all of you.
                              Best regards,
                              Thillai Elayaraja S
                                
                              
                              
                                
                                  
                                    
                                      | ![]()  ![]()  ![]()  | Thillai
                                        Elayaraja S | 
                                    
                                      | CTO | 
                                    
                                      | +91
                                        72593 34534 | 
                                    
                                      | thillaielayaraja.s@xxxxxxxxxxx | 
                                    
                                      |  | 
                                    
                                      | ELYCTIS
                                          India Pte Ltd | 
                                    
                                      | Level
                                        7, Mfar Greenheart | 
                                    
                                      | Manyata
                                        Tech Park | 
                                    
                                      | Bengaluru 560045 | 
                                    
                                      | INDIA | 
                                  
                                
                                
                               
                              On 04-07-2025 01:27 pm, Jean-Pierre
                                Fortune wrote:
                              
                              
                                
                                  Hi Thillai,
                                  Thanks for reaching out to the
                                    Keyple-Dev community and for
                                    providing these detailed logs.
                                  Based on our analysis of the logs,
                                    the issue doesn't seem to be at the
                                    physical communication level. The
                                    exchanges between your reader and
                                    the card appear to be correct. The
                                    errors you're encountering are
                                    happening at a higher, application
                                    command level.
                                  Specifically, in the log for UseCase10,
                                    the OPEN_SECURE_SESSION
                                    command fails with a 6A82
                                    status word, which means "File not
                                    found". This command is trying to
                                    read record 1 of the file located by
                                    SFI (Short File Identifier) 0x06.
                                  However, the JSON file generated by
                                    the card analysis tool shows that a
                                    file with SFI=0x06 does not actually
                                    exist on your card sample. This
                                    mismatch is the direct cause of the
                                    error.
                                  This leads us to the main question:
                                    have you adapted the APDU
                                      commands in the examples to match
                                      the specific file structure of the
                                      card you are using?
                                  It seems likely that adapting the
                                    SFI and record parameters within the
                                    commands to align with your card's
                                    actual file system should resolve
                                    the issue. The good news is that
                                    this suggests your reader is indeed
                                    capable of handling the low-level
                                    Calypso protocol correctly.
                                  Let us know if adjusting the
                                    commands solves the problem.
                                  Best regards,
                                  Jean-Pierre Fortune
                                  Keyple-Dev Team
                                 
                                
                                
                                  
                                  
                                    
                                      Dear Keyple-Dev team,
                                      Good day! I'm Thillai
                                        Elayaraja, CTO of ELYCTIS.
                                        Currently I'm evaluating Calypso
                                        support with our PC/SC readers
                                        with a Calypso card sample + SAM
                                        acquired from ISRA.
                                      
                                      The Calypso card sample is
                                        labelled as ST23ZR08 Calypso
                                          CD21 Rev 3.1 and
                                        The SAM sample is labelled as INTEROP
                                          vFF.E0.42 SAM-S1 E1.
                                      With them I tried the examples
                                        UseCase4 and UseCase10 from
                                        Keyple but encounter issues
                                        detailed below. I tried to adapt
                                        those examples to use the reader
                                        regex, Card AID (taken from the
                                        Card Configuration Audit tool)
                                        and also changed the LegacySamUtil.buildPowerOnDataFilter()
                                        to use LegacySam.ProductType.SAM_S1E1,
                                        with vain. I got to know from
                                        one of the CNA contacts to seek
                                        help from the Keyple-Dev
                                        community and that's where here
                                        I'am with the details given
                                        below:
                                      
                                      Regarding the examples:
                                      
                                      
                                        - UseCase4_CardAuthentication:
 
 Attached the UseCase4_CardAuthentication.log
                                          for reference.
 
 For info, the code stopped at
                                          processCommands
                                          as below:
 
  
 
                                        - UseCase10_SessionTrace_TN313:
 
 Attached the UseCase10_SessionTrace_TN313.log
                                          for reference.
 
 For info, the log ends with
                                          the following error:
 
 [11:01:01:138]
                                            [pool-1-thread-1] [ERROR]
                                            CardReaderObserver - [Transaction
                                              failed with exception: A
                                              card command error
                                              occurred while processing
                                              responses to card
                                              commands:
                                              OPEN_SECURE_SESSION
 Transaction audit JSON
                                              data:
{"targetSmartCard":{"selectApplicationResponse":{"apdu":"6F228408334D54522E494341A516BF0C13C70800000000750D264E53070A2D20021010019000","statusWord":"9000"},"isExtendedModeSupported":false,"isRatificationOnDeselectSupported":true,"isSvFeatureAvailable":false,"isPinFeatureAvailable":false,"isPkiModeSupported":false,"isDfInvalidated":false,"calypsoCardClass":"ISO","calypsoSerialNumber":"00000000750D264E","startupInfo":"0A2D2002101001","productType":"PRIME_REVISION_3","dfName":"334D54522E494341","modificationsCounterMax":"01AE","isModificationCounterInBytes":true,"files":[],"filesBackup":[],"svLastTNum":"00","svLastTNumBackup":"00","isHce":false,"svKvc":"00","applicationSubType":"02","applicationType":"20","sessionModification":"0A","payloadCapacity":"FA","isCounterValuePostponed":false,"isLegacyCase1":false},"apdus":["008A0B3904AF711A9400","6A82"]}
 [11:01:01:138]
                                            [pool-1-thread-1] [INFO]
                                            ObservableLocalReaderAdapter
                                            - Reader [ELYCTIS CL reader
                                            FFFFFFFF0000 0] starts card
                                            removal sequence
 
Regarding Card Configuration
                                        Audit tools:
                                      
                                        - Attached the Tool_AnalyzeCardFileStructure-2.0.3.log
                                          and the generated 20250626_CardData_1963796046.json
                                          for reference.
 
 
- Attached the Tool_CheckCardFileStructure-2.0.3.log
                                          for reference.
 With these logs and info,
                                        could you help if I need to
                                        adapt the examples further to
                                        verify the intended use-cases ?
                                        And can we "tentatively" say if
                                        our reader is capable to support
                                        Calypso transactions ?
                                      
                                      Thanking you.
                                      
 With best regards,
                                      Thillai Elayaraja S
                                      P S : Soon we will try to
                                        procure the test kits from CNA
                                        to validate our readers with all
                                        usecases and with the
                                        demonstrator app.
                                      
                                     
_______________________________________________
                                    keyple-dev mailing list
                                    keyple-dev@xxxxxxxxxxx
                                    To unsubscribe from this list, visit
                                    https://www.eclipse.org/mailman/listinfo/keyple-dev
                                  
                                 
                              
                             
                          
                         
                      
                     
                  
                 
              
             
          
         
       
    
  
[20:16:28:416] [main] [INFO] Main_CardAuthentication_Pcsc - = UseCase Calypso #4: Calypso card authentication ==================
[20:16:28:499] [main] [INFO] SmartCardServiceAdapter - Register plugin [PcscPlugin]
[20:16:28:531] [main] [INFO] PcscPluginAdapter - Plugin [PcscPlugin]: use default protocol identification rules
[20:16:28:537] [main] [INFO] PcscPluginAdapter - Plugin [PcscPlugin]: search available readers
[20:16:29:419] [main] [INFO] PcscPluginAdapter - Plugin [PcscPlugin]: reader found: [ELYCTIS CL reader FFFFFFFF0000 0]
[20:16:29:419] [main] [INFO] PcscPluginAdapter - Plugin [PcscPlugin]: reader found: [ELYCTIS CNT reader FFFFFFFF0000 0]
[20:16:29:438] [main] [INFO] PcscReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0]: set contactless type to [true]
[20:16:29:438] [main] [INFO] PcscReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0]: set ISO protocol to [T1] (T=1)
[20:16:29:438] [main] [INFO] PcscReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0]: set sharing mode to [SHARED]
[20:16:29:438] [main] [INFO] PcscReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0]: set contactless type to [false]
[20:16:29:438] [main] [INFO] PcscReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0]: set ISO protocol to [ANY] (*)
[20:16:29:439] [main] [INFO] PcscReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0]: set sharing mode to [SHARED]
[20:16:29:453] [main] [DEBUG] PcscReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0]: open card physical channel for protocol [*]
[20:16:29:463] [main] [DEBUG] PcscReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0]: open card physical channel in shared mode
[20:16:29:473] [main] [DEBUG] PcscReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0]: open card physical channel for protocol [T=1]
[20:16:29:477] [main] [DEBUG] PcscReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0]: open card physical channel in shared mode
[20:16:29:478] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] selects application with AID [304554502E494341]
[20:16:29:488] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"00A4040008304554502E49434100","successfulStatusWords":["9000"],"info":"Internal Select Application"}, elapsed 3.091106145E8 ms
[20:16:29:501] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"6F228408304554502E494341A516BF0C13C70800000000750D264E53070A2D20021010019000","statusWord":"9000"}, elapsed 21.7 ms
[20:16:29:512] [main] [DEBUG] CommandGetDataFci - DF name: 304554502E494341
[20:16:29:512] [main] [DEBUG] CommandGetDataFci - Application serial number: 00000000750D264Eh
[20:16:29:512] [main] [DEBUG] CommandGetDataFci - Discretionary data: 0A2D2002101001
[20:16:29:528] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"8084000004","successfulStatusWords":["9000"],"info":"Get Challenge"}, elapsed 3.091106633E8 ms
[20:16:29:538] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"4491CFB49000","statusWord":"9000"}, elapsed 10.2 ms
[20:16:29:540] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"008A0BA1044491CFB400","successfulStatusWords":["9000"],"info":"Open Secure Session - key index: 3, sfi: 14h, rec: 1"}, elapsed 38.9 ms
[20:16:29:556] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"030CEC9300FF411D00000000000000000000000000000000000000000000000000000000009000","statusWord":"9000"}, elapsed 15.7 ms
[20:16:29:560] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"801400000800000000750D264E","successfulStatusWords":["9000"],"info":"Select Diversifier"}, elapsed 21.9 ms
[20:16:29:567] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"9000","statusWord":"9000"}, elapsed 6.4 ms
[20:16:29:567] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"808A00FF273041030CEC9300FF411D0000000000000000000000000000000000000000000000000000000000","successfulStatusWords":["9000"],"info":"Digest Init"}, elapsed 0.2 ms
[20:16:29:579] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"9000","statusWord":"9000"}, elapsed 12.2 ms
[20:16:29:579] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"808E000004","successfulStatusWords":["9000"],"info":"Digest Close"}, elapsed 0.2 ms
[20:16:29:585] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CNT reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"685C76D39000","statusWord":"9000"}, elapsed 5.7 ms
[20:16:29:585] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"008E800004685C76D300","successfulStatusWords":["9000"],"info":"Close Secure Session"}, elapsed 29.7 ms
[20:16:29:591] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] <-- apduResponse: APDU_RESPONSE = {"apdu":"6988","statusWord":"6988"}, elapsed 5.8 ms
[20:16:29:636] [main] [DEBUG] LocalReaderAdapter - Reader [ELYCTIS CL reader FFFFFFFF0000 0] --> apduRequest: APDU_REQUEST = {"apdu":"008E000000","successfulStatusWords":["9000"],"info":"Close Secure Session"}, elapsed 45.6 ms
[20:16:29:637] [main] [WARN] SecureSymmetricCryptoTransactionManagerAdapter - Failed to abort secure session: A communication error with the card occurred while transmitting commands
Transaction audit JSON data: {"targetSmartCard":{"selectApplicationResponse":{"apdu":"6F228408304554502E494341A516BF0C13C70800000000750D264E53070A2D20021010019000","statusWord":"9000"},"isExtendedModeSupported":false,"isRatificationOnDeselectSupported":true,"isSvFeatureAvailable":false,"isPinFeatureAvailable":false,"isPkiModeSupported":false,"isDfInvalidated":false,"calypsoCardClass":"ISO","calypsoSerialNumber":"00000000750D264E","startupInfo":"0A2D2002101001","productType":"PRIME_REVISION_3","dfName":"304554502E494341","modificationsCounterMax":"01AE","isModificationCounterInBytes":true,"files":[{"sfi":"14","data":{"records":{"01":"0000000000000000000000000000000000000000000000000000000000"}}}],"filesBackup":[],"currentEf":{"sfi":"14","data":{"records":{"01":"0000000000000000000000000000000000000000000000000000000000"}}},"isDfRatified":true,"transactionCounter":"030CEC","svLastTNum":"00","svLastTNumBackup":"00","isHce":false,"svKvc":"00","applicationSubType":"02","applicationType":"20","sessionModification":"0A","payloadCapacity":"FA","isCounterValuePostponed":false,"isLegacyCase1":false},"apdus":["8084000004","4491CFB49000","008A0BA1044491CFB400","030CEC9300FF411D00000000000000000000000000000000000000000000000000000000009000","801400000800000000750D264E","9000","808A00FF273041030CEC9300FF411D0000000000000000000000000000000000000000000000000000000000","9000","808E000004","685C76D39000","008E800004685C76D300","6988"]}
Exception in thread "main" org.eclipse.keypop.calypso.card.transaction.UnexpectedCommandStatusException: A card command error occurred while processing responses to card commands: CLOSE_SECURE_SESSION
Transaction audit JSON data: {"targetSmartCard":{"selectApplicationResponse":{"apdu":"6F228408304554502E494341A516BF0C13C70800000000750D264E53070A2D20021010019000","statusWord":"9000"},"isExtendedModeSupported":false,"isRatificationOnDeselectSupported":true,"isSvFeatureAvailable":false,"isPinFeatureAvailable":false,"isPkiModeSupported":false,"isDfInvalidated":false,"calypsoCardClass":"ISO","calypsoSerialNumber":"00000000750D264E","startupInfo":"0A2D2002101001","productType":"PRIME_REVISION_3","dfName":"304554502E494341","modificationsCounterMax":"01AE","isModificationCounterInBytes":true,"files":[{"sfi":"14","data":{"records":{"01":"0000000000000000000000000000000000000000000000000000000000"}}}],"filesBackup":[],"currentEf":{"sfi":"14","data":{"records":{"01":"0000000000000000000000000000000000000000000000000000000000"}}},"isDfRatified":true,"transactionCounter":"030CEC","svLastTNum":"00","svLastTNumBackup":"00","isHce":false,"svKvc":"00","applicationSubType":"02","applicationType":"20","sessionModification":"0A","payloadCapacity":"FA","isCounterValuePostponed":false,"isLegacyCase1":false},"apdus":["8084000004","4491CFB49000","008A0BA1044491CFB400","030CEC9300FF411D00000000000000000000000000000000000000000000000000000000009000","801400000800000000750D264E","9000","808A00FF273041030CEC9300FF411D0000000000000000000000000000000000000000000000000000000000","9000","808E000004","685C76D39000","008E800004685C76D300","6988"]}
	at org.eclipse.keyple.card.calypso.TransactionManagerAdapter.executeCardCommands(TransactionManagerAdapter.java:212)
	at org.eclipse.keyple.card.calypso.SecureSymmetricCryptoTransactionManagerAdapter.processCommands(SecureSymmetricCryptoTransactionManagerAdapter.java:308)
	at org.eclipse.keyple.card.calypso.SecureSymmetricCryptoTransactionManagerAdapter.processCommands(SecureSymmetricCryptoTransactionManagerAdapter.java:39)
	at org.eclipse.keyple.card.calypso.example.UseCase4_CardAuthentication.Main_CardAuthentication_Pcsc.main(Main_CardAuthentication_Pcsc.java:148)
Caused by: org.eclipse.keyple.card.calypso.CardSecurityDataException: incorrect signatureLo
	at org.eclipse.keyple.card.calypso.Command.buildCommandException(Command.java:504)
	at org.eclipse.keyple.card.calypso.Command.checkStatus(Command.java:475)
	at org.eclipse.keyple.card.calypso.Command.setApduResponseAndCheckStatus(Command.java:391)
	at org.eclipse.keyple.card.calypso.CommandCloseSecureSession.parseResponse(CommandCloseSecureSession.java:210)
	at org.eclipse.keyple.card.calypso.TransactionManagerAdapter.parseCommandResponse(TransactionManagerAdapter.java:239)
	at org.eclipse.keyple.card.calypso.TransactionManagerAdapter.executeCardCommands(TransactionManagerAdapter.java:206)
	... 3 more