Hi Thillai,
Upon closer examination of the logs you sent, it
appears that the code execution flow in both cases
is not the same, and the errors encountered are of a
different nature.
My previous message was based on Use Case 10,
which seems to correspond to a transaction involving
two readings of the SFI=14h file. However, the log
for this case does not display DEBUG level traces,
which would be very helpful for a more in-depth
analysis.
On the other hand, the log for Use Case 4 does
show DEBUG traces, but here the transaction
concludes with an "Unauthorized key error." This
specific error suggests that the card you are using
requires a particular configuration to specify the
key KIF value that is not provided by this
particular card.
Based on the JSON file generated by the card
analysis tool, the KIF value to be used for this
AID is 0xFF. In the context of the Use Case 4 code,
this would translate to an adjustment within the
`initSecuritySetting()` method, similar to the
following:
private static void
initSecuritySetting() {
LegacySam sam =
selectSam(samReader);
symmetricCryptoSecuritySetting =
calypsoCardApiFactory
.createSymmetricCryptoSecuritySetting(
LegacySamExtensionService.getInstance()
.getLegacySamApiFactory()
.createSymmetricCryptoCardTransactionManagerFactory(samReader,
sam))
.assignDefaultKif(PERSONALIZATION, (byte)
0xFF)
.assignDefaultKif(LOAD, (byte) 0xFF)
.assignDefaultKif(DEBIT, (byte) 0xFF);
}
Could you please try implementing this change in
your Use Case 4 code and observe if it resolves the
"Unauthorized key error"?
Regarding use case 10, I would need more logs to
help you. But the previous configuration with 0xFF
should also apply here!
Best regards,
Jean-Pierre Fortune
Keyple-Dev Team