Hi Thillai,
Upon closer examination
of the logs you sent, it
appears that the code
execution flow in both cases
is not the same, and the
errors encountered are of a
different nature.
My previous message was
based on Use Case 10, which
seems to correspond to a
transaction involving two
readings of the SFI=14h
file. However, the log for
this case does not display
DEBUG level traces, which
would be very helpful for a
more in-depth analysis.
On the other hand, the
log for Use Case 4 does show
DEBUG traces, but here the
transaction concludes with
an "Unauthorized key error."
This specific error suggests
that the card you are using
requires a particular
configuration to specify the
key KIF value that is not
provided by this particular
card.
Based on the JSON file
generated by the card
analysis tool, the KIF value
to be used for this AID is
0xFF. In the context of the
Use Case 4 code, this would
translate to an adjustment
within the
`initSecuritySetting()`
method, similar to the
following:
private
static void
initSecuritySetting() {
LegacySam sam =
selectSam(samReader);
symmetricCryptoSecuritySetting =
calypsoCardApiFactory
.createSymmetricCryptoSecuritySetting(
LegacySamExtensionService.getInstance()
.getLegacySamApiFactory()
.createSymmetricCryptoCardTransactionManagerFactory(samReader, sam))
.assignDefaultKif(PERSONALIZATION,
(byte) 0xFF)
.assignDefaultKif(LOAD,
(byte) 0xFF)
.assignDefaultKif(DEBIT,
(byte) 0xFF);
}
Could you please try
implementing this change in
your Use Case 4 code and
observe if it resolves the
"Unauthorized key error"?
Regarding use case 10, I
would need more logs to help
you. But the previous
configuration with 0xFF
should also apply here!
Best regards,
Jean-Pierre Fortune
Keyple-Dev
Team