Hi Thillai,
Upon closer
examination of the
logs you sent, it
appears that the
code execution flow
in both cases is not
the same, and the
errors encountered
are of a different
nature.
My previous
message was based on
Use Case 10, which
seems to correspond
to a transaction
involving two
readings of the
SFI=14h file.
However, the log for
this case does not
display DEBUG level
traces, which would
be very helpful for
a more in-depth
analysis.
On the other
hand, the log for
Use Case 4 does show
DEBUG traces, but
here the transaction
concludes with an
"Unauthorized key
error." This
specific error
suggests that the
card you are using
requires a
particular
configuration to
specify the key KIF
value that is not
provided by this
particular card.
Based on the JSON
file generated by
the card analysis
tool, the KIF value
to be used for this
AID is 0xFF. In the
context of the Use
Case 4 code, this
would translate to
an adjustment within
the
`initSecuritySetting()`
method, similar to
the following:
private
static void
initSecuritySetting()
{
LegacySam sam =
selectSam(samReader);
symmetricCryptoSecuritySetting =
calypsoCardApiFactory
.createSymmetricCryptoSecuritySetting(
LegacySamExtensionService.getInstance()
.getLegacySamApiFactory()
.createSymmetricCryptoCardTransactionManagerFactory(samReader, sam))
.assignDefaultKif(PERSONALIZATION,
(byte) 0xFF)
.assignDefaultKif(LOAD, (byte) 0xFF)
.assignDefaultKif(DEBIT, (byte) 0xFF);
}
Could you please
try implementing
this change in your
Use Case 4 code and
observe if it
resolves the
"Unauthorized key
error"?
Regarding use
case 10, I would
need more logs to
help you. But the
previous
configuration with
0xFF should also
apply here!
Best regards,
Jean-Pierre
Fortune
Keyple-Dev Team