1
|
init 2018.06.05 15:01:43.681 printInfo(main.cpp:101) : Logging to "C:/Users/Stefan/AppData/Local/Temp/AusweisApp2.Hp4444.log"
|
2
|
init 2018.06.05 15:01:43.684 I printInfo(main.cpp:103) : ##################################################
|
3
|
init 2018.06.05 15:01:43.684 I printInfo(main.cpp:104) : ### ApplicationName: "AusweisApp2"
|
4
|
init 2018.06.05 15:01:43.684 I printInfo(main.cpp:105) : ### ApplicationVersion: "1.14.0"
|
5
|
init 2018.06.05 15:01:43.684 I printInfo(main.cpp:106) : ### OrganizationName: "Governikus GmbH & Co. KG"
|
6
|
init 2018.06.05 15:01:43.685 I printInfo(main.cpp:107) : ### OrganizationDomain: "governikus.com"
|
7
|
init 2018.06.05 15:01:43.685 I printInfo(main.cpp:108) : ### Build: Dec 15 2017 / 09:13:24
|
8
|
init 2018.06.05 15:01:43.685 I printInfo(main.cpp:109) : ### System: "Windows 10 (10.0)"
|
9
|
init 2018.06.05 15:01:43.685 I printInfo(main.cpp:110) : ### Kernel: "10.0.17134"
|
10
|
init 2018.06.05 15:01:43.685 I printInfo(main.cpp:111) : ### Architecture: "x86_64"
|
11
|
init 2018.06.05 15:01:43.688 I printInfo(main.cpp:116) : ### Devicename: "Bascha-Laptop"
|
12
|
init 2018.06.05 15:01:43.688 I printInfo(main.cpp:118) : ### Qt Version: 5.9.3
|
13
|
init 2018.06.05 15:01:43.883 I printInfo(main.cpp:119) : ### OpenSSL Version: "OpenSSL 1.0.2n 7 Dec 2017"
|
14
|
init 2018.06.05 15:01:43.883 I printInfo(main.cpp:120) : ##################################################
|
15
|
init 2018.06.05 15:01:43.883 printInfo(main.cpp:130) : Library path: "C:/Program Files (x86)/AusweisApp2 1.14.0"
|
16
|
language 2018.06.05 15:01:43.885 LanguageLoader::load(global/LanguageLoader.cpp:135) : Use path: "C:/Program Files (x86)/AusweisApp2 1.14.0/translations"
|
17
|
language 2018.06.05 15:01:43.886 LanguageLoader::load(global/LanguageLoader.cpp:141) : UI language: "de-DE"
|
18
|
language 2018.06.05 15:01:43.886 LanguageLoader::loadTranslationFiles(global/LanguageLoader.cpp:196) : Try to load translation: QLocale(German, Latin, Germany)
|
19
|
language 2018.06.05 15:01:43.886 LanguageLoader::createTranslator(global/LanguageLoader.cpp:81) : Load translation: "ausweisapp2" | true
|
20
|
language 2018.06.05 15:01:43.886 LanguageLoader::createTranslator(global/LanguageLoader.cpp:81) : Load translation: "qtbase" | true
|
21
|
language 2018.06.05 15:01:43.887 LanguageLoader::load(global/LanguageLoader.cpp:141) : UI language: "en-US"
|
22
|
default 2018.06.05 15:01:43.889 ResourceLoader::init(global/ResourceLoader.cpp:56) : Register resource: "C:/Program Files (x86)/AusweisApp2 1.14.0/AusweisApp2.rcc" | true
|
23
|
network 2018.06.05 15:01:43.889 NetworkManager::setApplicationProxyFactory(network/NetworkManager.cpp:280) : proxy -> system
|
24
|
default 2018.06.05 15:01:43.890 Env::storeSingleton(global/Env.cpp:35) : Add instance: governikus::NetworkManager
|
25
|
gui 2018.06.05 15:01:43.890 UILoader::load(core/view/UILoader.cpp:67) : Try to load UI plugin: "UIPlugInWidgets"
|
26
|
gui 2018.06.05 15:01:43.890 UILoader::load(core/view/UILoader.cpp:75) : Load plugin: QJsonObject({"IID":"governikus.UIPlugIn","MetaData":{"dependencies":[],"name":"UIPlugInWidgets"},"className":"UIPlugInWidgets","debug":false,"version":329987})
|
27
|
card 2018.06.05 15:01:43.890 ReaderManagerWorker::onThreadStarted(card/base/ReaderManagerWorker.cpp:48) : Thread started
|
28
|
card 2018.06.05 15:01:43.890 ReaderManagerWorker::registerPlugIns(card/base/ReaderManagerWorker.cpp:57) : Try to register plugins
|
29
|
card 2018.06.05 15:01:43.890 ReaderManagerWorker::registerPlugIns(card/base/ReaderManagerWorker.cpp:63) : Register and initialize plugin: QJsonObject({"IID":"governikus.ReaderManagerPlugIn","MetaData":{"dependencies":[],"name":"RemoteReaderManagerPlugIn"},"className":"RemoteReaderManagerPlugIn","debug":false,"version":329987})
|
30
|
card 2018.06.05 15:01:43.890 ReaderManagerWorker::registerPlugIns(card/base/ReaderManagerWorker.cpp:63) : Register and initialize plugin: QJsonObject({"IID":"governikus.ReaderManagerPlugIn","MetaData":{"dependencies":[],"name":"PcscReaderManagerPlugIn"},"className":"PcscReaderManagerPlugIn","debug":false,"version":329987})
|
31
|
card_pcsc 2018.06.05 15:01:43.893 PcscReaderManagerPlugIn::init(card/pcsc/PcscReaderManagerPlugIn.cpp:57) : SCardEstablishContext: "Scard_S_Success"
|
32
|
gui 2018.06.05 15:01:43.996 AppQtGui::loadStyleSheet(widget/AppQtGui.cpp:352) : loading style sheet ":/stylesheets/windows.qss"
|
33
|
default 2018.06.05 15:01:44.016 Env::storeSingleton(global/Env.cpp:35) : Add instance: governikus::FileProvider
|
34
|
secures... 2018.06.05 15:01:44.029 I SecureStorage::load(secure_storage/SecureStorage.cpp:187) : SecureStorage successfully loaded
|
35
|
default 2018.06.05 15:01:44.030 Env::storeSingleton(global/Env.cpp:35) : Add instance: governikus::ProviderConfiguration
|
36
|
default 2018.06.05 15:01:44.031 ProviderWidget::fill(widget/ProviderWidget.cpp:56) : add provider for desktop widgets.
|
37
|
card_dr... 2018.06.05 15:01:44.392 ReaderDetector::ReaderDetector(card/drivers/ReaderDetector.cpp:38) : initNativeEvents() = true
|
38
|
default 2018.06.05 15:01:44.393 Env::storeSingleton(global/Env.cpp:51) : Add owned instance: governikus::ReaderDetector
|
39
|
default 2018.06.05 15:01:44.393 Env::storeSingleton(global/Env.cpp:35) : Add instance: governikus::ReaderConfiguration
|
40
|
card_dr... 2018.06.05 15:01:44.397 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
|
41
|
card_pcsc 2018.06.05 15:01:44.397 PcscReaderFeature::PcscReaderFeature(card/pcsc/PcscReaderFeature.cpp:22) : features: null
|
42
|
card_pcsc 2018.06.05 15:01:44.397 ...ty::PcscReaderPaceCapability(card/pcsc/PcscReaderPaceCapability.cpp:22) : capabilities: null
|
43
|
card_pcsc 2018.06.05 15:01:44.397 PcscReader::PcscReader(card/pcsc/PcscReader.cpp:23) : "Alcor Micro USB Smart Card Reader 0"
|
44
|
card_pcsc 2018.06.05 15:01:44.399 PcscReader::PcscReader(card/pcsc/PcscReader.cpp:27) : SCardEstablishContext: "Scard_S_Success"
|
45
|
card_pcsc 2018.06.05 15:01:44.399 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:251) : "SCardConnect(cd010001, Alcor Micro USB Smart Card Reader 0, 3, 0, 0, 0)"
|
46
|
card_pcsc 2018.06.05 15:01:44.399 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:253) : SCardConnect for "Alcor Micro USB Smart Card Reader 0" : "Scard_S_Success"
|
47
|
card_pcsc 2018.06.05 15:01:44.401 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:273) : SCardControl for "Alcor Micro USB Smart Card Reader 0" : "UNKNOWN_STATE (00000001)"
|
48
|
card_pcsc 2018.06.05 15:01:44.401 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:292) : FEATURES: ""
|
49
|
card_pcsc 2018.06.05 15:01:44.401 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:294) : FEATURES: ()
|
50
|
card_pcsc 2018.06.05 15:01:44.401 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:337) : SCardDisconnect for "Alcor Micro USB Smart Card Reader 0" : "Scard_S_Success"
|
51
|
card_pcsc 2018.06.05 15:01:44.402 PcscReader::updateCard(card/pcsc/PcscReader.cpp:194) : old state: "(0x0) UNAWARE" | new state: "(0x50012) CHANGED EMPTY"
|
52
|
card_pcsc 2018.06.05 15:01:44.402 ...ManagerPlugIn::updateReaders(card/pcsc/PcscReaderManagerPlugIn.cpp:183) : fireReaderAdded "Alcor Micro USB Smart Card Reader 0"
|
53
|
card_dr... 2018.06.05 15:01:44.406 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
|
54
|
card_pcsc 2018.06.05 15:01:44.406 PcscReaderFeature::PcscReaderFeature(card/pcsc/PcscReaderFeature.cpp:22) : features: null
|
55
|
card_pcsc 2018.06.05 15:01:44.406 ...ty::PcscReaderPaceCapability(card/pcsc/PcscReaderPaceCapability.cpp:22) : capabilities: null
|
56
|
card_pcsc 2018.06.05 15:01:44.406 PcscReader::PcscReader(card/pcsc/PcscReader.cpp:23) : "REINER SCT cyberJack RFID basis 0"
|
57
|
card_pcsc 2018.06.05 15:01:44.407 PcscReader::PcscReader(card/pcsc/PcscReader.cpp:27) : SCardEstablishContext: "Scard_S_Success"
|
58
|
card_pcsc 2018.06.05 15:01:44.407 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:251) : "SCardConnect(cd010002, REINER SCT cyberJack RFID basis 0, 3, 0, 0, 0)"
|
59
|
card_pcsc 2018.06.05 15:01:44.408 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:253) : SCardConnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
60
|
card_pcsc 2018.06.05 15:01:44.409 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:273) : SCardControl for "REINER SCT cyberJack RFID basis 0" : "UNKNOWN_STATE (00000032)"
|
61
|
card_pcsc 2018.06.05 15:01:44.409 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:292) : FEATURES: ""
|
62
|
card_pcsc 2018.06.05 15:01:44.409 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:294) : FEATURES: ()
|
63
|
card_pcsc 2018.06.05 15:01:44.412 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:337) : SCardDisconnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
64
|
card_pcsc 2018.06.05 15:01:44.412 PcscReader::updateCard(card/pcsc/PcscReader.cpp:194) : old state: "(0x0) UNAWARE" | new state: "(0x20022) CHANGED PRESENT"
|
65
|
card_pcsc 2018.06.05 15:01:44.413 PcscCard::PcscCard(card/pcsc/PcscCard.cpp:59) : SCardEstablishContext for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
66
|
card_pcsc 2018.06.05 15:01:44.415 PcscCard::connect(card/pcsc/PcscCard.cpp:111) : SCardConnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" | cardHandle: 3926065152 | protocol: "SCARD_PROTOCOL_T1"
|
67
|
card_pcsc 2018.06.05 15:01:44.416 PcscCard::connect(card/pcsc/PcscCard.cpp:118) : SCardBeginTransaction for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
68
|
card_pcsc 2018.06.05 15:01:44.416 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4000c023f00"
|
69
|
card_pcsc 2018.06.05 15:01:44.448 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
70
|
card_pcsc 2018.06.05 15:01:44.448 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000"
|
71
|
card_pcsc 2018.06.05 15:01:44.448 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4020c022f00"
|
72
|
card_pcsc 2018.06.05 15:01:44.456 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
73
|
card_pcsc 2018.06.05 15:01:44.456 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000"
|
74
|
card_pcsc 2018.06.05 15:01:44.456 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00b000005a"
|
75
|
card_pcsc 2018.06.05 15:01:44.467 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
76
|
card_pcsc 2018.06.05 15:01:44.468 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "61324f0fe828bd080fa000000167455349474e500f434941207a752044462e655369676e5100730c4f0aa000000167455349474e61094f07a0000002471001610b4f09e80704007f00070302610c4f0aa000000167455349474e9000"
|
77
|
card_pcsc 2018.06.05 15:01:44.468 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4020c02011c"
|
78
|
card_pcsc 2018.06.05 15:01:44.477 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
79
|
card_pcsc 2018.06.05 15:01:44.477 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000"
|
80
|
card_pcsc 2018.06.05 15:01:44.477 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00b00000ff"
|
81
|
card_pcsc 2018.06.05 15:01:44.495 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
82
|
card_pcsc 2018.06.05 15:01:44.495 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "3181c1300d060804007f00070202020201023012060a04007f000702020302020201020201483012060a04007f0007020204020202010202010d301c060904007f000702020302300c060704007f0007010202010d020148302a060804007f0007020206161e687474703a2f2f6273692e62756e642e64652f6369662f6e70612e786d6c303e060804007f000702020831323012060a04007f00070202030202020102020149301c060904007f000702020302300c060704007f0007010202010d02014900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000"
|
83
|
card_pcsc 2018.06.05 15:01:44.495 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00b000ffff"
|
84
|
card_pcsc 2018.06.05 15:01:44.513 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
85
|
card_pcsc 2018.06.05 15:01:44.513 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000"
|
86
|
card_pcsc 2018.06.05 15:01:44.513 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00b001feff"
|
87
|
card_pcsc 2018.06.05 15:01:44.531 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
88
|
card_pcsc 2018.06.05 15:01:44.531 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000"
|
89
|
card_pcsc 2018.06.05 15:01:44.531 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00b002fdff"
|
90
|
card_pcsc 2018.06.05 15:01:44.549 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
91
|
card_pcsc 2018.06.05 15:01:44.549 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000"
|
92
|
card_pcsc 2018.06.05 15:01:44.549 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00b003fcff"
|
93
|
card_pcsc 2018.06.05 15:01:44.557 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
94
|
card_pcsc 2018.06.05 15:01:44.557 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "000000006282"
|
95
|
card 2018.06.05 15:01:44.557 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.2"
|
96
|
card 2018.06.05 15:01:44.557 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:67) : Parsed ChipAuthenticationInfo
|
97
|
card 2018.06.05 15:01:44.557 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:61) : Parsed PACEInfo
|
98
|
card 2018.06.05 15:01:44.557 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.3.2"
|
99
|
card 2018.06.05 15:01:44.557 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.6"
|
100
|
card 2018.06.05 15:01:44.557 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.8"
|
101
|
card_pcsc 2018.06.05 15:01:44.557 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4020c02011c"
|
102
|
card_pcsc 2018.06.05 15:01:44.565 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
103
|
card_pcsc 2018.06.05 15:01:44.565 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000"
|
104
|
card_pcsc 2018.06.05 15:01:44.565 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0022c1a412800a04007f0007020204020283010384010d"
|
105
|
card_pcsc 2018.06.05 15:01:44.593 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
106
|
card_pcsc 2018.06.05 15:01:44.593 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000"
|
107
|
card 2018.06.05 15:01:44.593 Reader::getRetryCounter(card/base/Reader.cpp:151) : StatusCode: SUCCESS
|
108
|
support 2018.06.05 15:01:44.593 I Reader::updateRetryCounter(card/base/Reader.cpp:103) : retrieved retry counter: 3 , was: -1 , PIN deactivated: false
|
109
|
card_pcsc 2018.06.05 15:01:44.593 PcscReader::updateCard(card/pcsc/PcscReader.cpp:212) : Card detected: {Type: EID_CARD, Retry counter: 3, Pin deactivated: false}
|
110
|
support 2018.06.05 15:01:44.593 I Reader::fireUpdateSignal(card/base/Reader.cpp:167) : Card inserted: {Type: EID_CARD, Retry counter: 3, Pin deactivated: false}
|
111
|
card_pcsc 2018.06.05 15:01:44.593 ...ManagerPlugIn::updateReaders(card/pcsc/PcscReaderManagerPlugIn.cpp:183) : fireReaderAdded "REINER SCT cyberJack RFID basis 0"
|
112
|
card_pcsc 2018.06.05 15:01:44.593 PcscCard::disconnect(card/pcsc/PcscCard.cpp:143) : SCardEndTransaction for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
113
|
card_pcsc 2018.06.05 15:01:44.657 PcscCard::disconnect(card/pcsc/PcscCard.cpp:148) : SCardDisconnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
114
|
default 2018.06.05 15:01:44.997 Env::storeSingleton(global/Env.cpp:35) : Add instance: governikus::ReaderManager
|
115
|
default 2018.06.05 15:01:44.997 Env::storeSingleton(global/Env.cpp:35) : Add instance: governikus::AppSettings
|
116
|
card_dr... 2018.06.05 15:01:45.000 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
|
117
|
default 2018.06.05 15:01:45.244 W unknown(unknown:0) : QMainWindowLayout::count: ?
|
118
|
default 2018.06.05 15:01:45.262 Env::storeSingleton(global/Env.cpp:35) : Add instance: governikus::Service
|
119
|
default 2018.06.05 15:01:45.262 AppController::onUiPlugin(core/controller/AppController.cpp:368) : Register UI: governikus::UIPlugInWidgets
|
120
|
activation 2018.06.05 15:01:45.262 ActivationHandler::getInstances(activation/base/ActivationHandler.cpp:55) : Try to register plugin
|
121
|
activation 2018.06.05 15:01:45.263 ActivationHandler::getInstances(activation/base/ActivationHandler.cpp:61) : Load plugin: QJsonObject({"IID":"governikus.ActivationHandler","MetaData":{"dependencies":[],"name":"WebserviceActivationHandler"},"className":"WebserviceActivationHandler","debug":false,"version":329987})
|
122
|
activation 2018.06.05 15:01:45.263 ActivationHandler::getInstances(activation/base/ActivationHandler.cpp:61) : Load plugin: QJsonObject({"IID":"governikus.ActivationHandler","MetaData":{"dependencies":[],"name":"InternalActivationHandler"},"className":"InternalActivationHandler","debug":false,"version":329987})
|
123
|
network 2018.06.05 15:01:45.263 HttpServer::HttpServer(network/HttpServer.cpp:23) : Listening on port: 24727
|
124
|
default 2018.06.05 15:01:45.263 AppController::start(core/controller/AppController.cpp:135) : Successfully started activation handler: governikus::WebserviceActivationHandler(0x5c93230)
|
125
|
default 2018.06.05 15:01:45.263 AppController::start(core/controller/AppController.cpp:135) : Successfully started activation handler: governikus::InternalActivationHandler(0x5c3deb0)
|
126
|
card_dr... 2018.06.05 15:01:45.271 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
|
127
|
card_dr... 2018.06.05 15:01:45.279 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
|
128
|
filepro... 2018.06.05 15:01:46.791 UpdatableFile::update(file_provider/UpdatableFile.cpp:304) : Update Triggered for Name: "supported-readers.json" with URL: QUrl("https://appl.governikus-asp.de/ausweisapp2/updatable-files/supported-readers.json")
|
129
|
default 2018.06.05 15:01:46.791 Env::storeSingleton(global/Env.cpp:35) : Add instance: governikus::Downloader
|
130
|
filepro... 2018.06.05 15:01:46.792 Downloader::downloadIfNew(file_provider/Downloader.cpp:208) : Download: QUrl("https://appl.governikus-asp.de/ausweisapp2/updatable-files/supported-readers.json")
|
131
|
network 2018.06.05 15:01:46.792 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "appl.governikus-asp.de", localPort: -1, url: QUrl("https://appl.governikus-asp.de/ausweisapp2/updatable-files/supported-readers.json"))
|
132
|
network 2018.06.05 15:01:46.799 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
133
|
filepro... 2018.06.05 15:01:46.800 UpdatableFile::update(file_provider/UpdatableFile.cpp:304) : Update Triggered for Name: "supported-providers.json" with URL: QUrl("https://appl.governikus-asp.de/ausweisapp2/updatable-files/supported-providers.json")
|
134
|
filepro... 2018.06.05 15:01:46.800 Downloader::downloadIfNew(file_provider/Downloader.cpp:208) : Download: QUrl("https://appl.governikus-asp.de/ausweisapp2/updatable-files/supported-providers.json")
|
135
|
filepro... 2018.06.05 15:01:46.800 Downloader::startDownloadIfPending(file_provider/Downloader.cpp:44) : A download is already in progress... delaying.
|
136
|
filepro... 2018.06.05 15:01:46.800 Downloader::download(file_provider/Downloader.cpp:198) : Download: QUrl("https://appl.governikus-asp.de/ausweisapp2/Appcast.json")
|
137
|
filepro... 2018.06.05 15:01:46.800 Downloader::startDownloadIfPending(file_provider/Downloader.cpp:44) : A download is already in progress... delaying.
|
138
|
network 2018.06.05 15:01:46.998 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
|
139
|
network 2018.06.05 15:01:46.998 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors
|
140
|
network 2018.06.05 15:01:46.998 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES128-GCM-SHA256, bits=128, proto=TLSv1.2)
|
141
|
network 2018.06.05 15:01:46.998 I (:0) : Used session protocol: "TlsV1_2"
|
142
|
network 2018.06.05 15:01:46.998 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 256)
|
143
|
network 2018.06.05 15:01:46.998 I (:0) : Used peer certificate: QSslCertificate("3", "d5:b6:a4:dc:1f:d8:85:4a", "OPEtmOf3NCEwD34R8sNgNQ==", ("T-Systems International GmbH"), ("Governikus GmbH & Co. KG"), QMap((1, "appl.governikus-asp.de")), QDateTime(2017-12-01 10:47:32.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-12-06 23:59:59.000 UTC Qt::TimeSpec(UTC)))
|
144
|
network 2018.06.05 15:01:46.998 I Downloader::onSslHandshakeDone(file_provider/Downloader.cpp:75) : Handshake of tls connection done!
|
145
|
filepro... 2018.06.05 15:01:47.035 Downloader::onMetadataChanged(file_provider/Downloader.cpp:96) : Abort request for "supported-readers.json" with status 304 - NOT_MODIFIED
|
146
|
filepro... 2018.06.05 15:01:47.036 Downloader::onNetworkReplyFinished(file_provider/Downloader.cpp:110) : Downloader::onNetworkReplyFinished()
|
147
|
filepro... 2018.06.05 15:01:47.036 W Downloader::onNetworkReplyFinished(file_provider/Downloader.cpp:139) : Server did not provide a valid LastModifiedHeader
|
148
|
network 2018.06.05 15:01:47.036 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "appl.governikus-asp.de", localPort: -1, url: QUrl("https://appl.governikus-asp.de/ausweisapp2/updatable-files/supported-providers.json"))
|
149
|
network 2018.06.05 15:01:47.036 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
150
|
filepro... 2018.06.05 15:01:47.072 Downloader::onMetadataChanged(file_provider/Downloader.cpp:96) : Abort request for "supported-providers.json" with status 304 - NOT_MODIFIED
|
151
|
filepro... 2018.06.05 15:01:47.072 Downloader::onNetworkReplyFinished(file_provider/Downloader.cpp:110) : Downloader::onNetworkReplyFinished()
|
152
|
filepro... 2018.06.05 15:01:47.072 W Downloader::onNetworkReplyFinished(file_provider/Downloader.cpp:139) : Server did not provide a valid LastModifiedHeader
|
153
|
network 2018.06.05 15:01:47.072 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "appl.governikus-asp.de", localPort: -1, url: QUrl("https://appl.governikus-asp.de/ausweisapp2/Appcast.json"))
|
154
|
network 2018.06.05 15:01:47.072 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
155
|
filepro... 2018.06.05 15:01:47.107 Downloader::onMetadataChanged(file_provider/Downloader.cpp:100) : Continue request for "Appcast.json" with status 200 - OK
|
156
|
filepro... 2018.06.05 15:01:47.107 Downloader::onNetworkReplyFinished(file_provider/Downloader.cpp:110) : Downloader::onNetworkReplyFinished()
|
157
|
appupdate 2018.06.05 15:01:47.108 AppUpdateData::checkPlatformObject(services/AppUpdateData.cpp:208) : Unused platform: "mac"
|
158
|
appupdate 2018.06.05 15:01:47.108 AppUpdateData::checkPlatformObject(services/AppUpdateData.cpp:212) : Found platform: "win"
|
159
|
appupdate 2018.06.05 15:01:47.108 I AppUpdater::onUpdateDownloadFinished(services/AppUpdater.cpp:83) : Found new version: "1.14.1" , greater than old version "1.14.0"
|
160
|
filepro... 2018.06.05 15:01:47.108 Downloader::download(file_provider/Downloader.cpp:198) : Download: QUrl("https://appl.governikus-asp.de/ausweisapp2/ReleaseNotes.html#1.14.1")
|
161
|
filepro... 2018.06.05 15:01:47.108 Downloader::startDownloadIfPending(file_provider/Downloader.cpp:44) : A download is already in progress... delaying.
|
162
|
network 2018.06.05 15:01:47.108 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "appl.governikus-asp.de", localPort: -1, url: QUrl("https://appl.governikus-asp.de/ausweisapp2/ReleaseNotes.html#1.14.1"))
|
163
|
network 2018.06.05 15:01:47.108 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
164
|
filepro... 2018.06.05 15:01:47.146 Downloader::onMetadataChanged(file_provider/Downloader.cpp:100) : Continue request for "ReleaseNotes.html" with status 200 - OK
|
165
|
filepro... 2018.06.05 15:01:47.146 Downloader::onNetworkReplyFinished(file_provider/Downloader.cpp:110) : Downloader::onNetworkReplyFinished()
|
166
|
appupdate 2018.06.05 15:01:47.146 AppUpdater::onUpdateDownloadFinished(services/AppUpdater.cpp:102) : Release notes downloaded successfully
|
167
|
filepro... 2018.06.05 15:01:47.203 Downloader::startDownloadIfPending(file_provider/Downloader.cpp:51) : No pending requests to be started.
|
168
|
network 2018.06.05 15:01:53.704 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Host": "127.0.0.1:24727"
|
169
|
network 2018.06.05 15:01:53.704 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0"
|
170
|
network 2018.06.05 15:01:53.704 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8"
|
171
|
network 2018.06.05 15:01:53.704 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Accept-Language": "de,en-US;q=0.7,en;q=0.3"
|
172
|
network 2018.06.05 15:01:53.704 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Accept-Encoding": "gzip, deflate"
|
173
|
network 2018.06.05 15:01:53.704 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Connection": "keep-alive"
|
174
|
network 2018.06.05 15:01:53.704 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Upgrade-Insecure-Requests": "1"
|
175
|
network 2018.06.05 15:01:53.705 HttpRequest::onHeadersComplete(network/HttpRequest.cpp:153) : "GET" | QUrl("/eID-Client?tcTokenURL=https%3A%2F%2Feid-prod.connect.verwalt-berlin.de%2FBuergerKontoWeb%2FSAMLRequestServlet%3FsessionId%3D07b1c398-cc77-4b92-902a-eddfb96eb62f")
|
176
|
network 2018.06.05 15:01:53.705 HttpRequest::onHeadersComplete(network/HttpRequest.cpp:154) : Header completed
|
177
|
network 2018.06.05 15:01:53.705 HttpRequest::onMessageComplete(network/HttpRequest.cpp:144) : Message completed
|
178
|
activation 2018.06.05 15:01:53.705 ...onNewRequest(activation/webservice/WebserviceActivationHandler.cpp:101) : Request type: authentication
|
179
|
default 2018.06.05 15:01:53.705 ...troller::onAuthenticationRequest(core/controller/AppController.cpp:258) : authentication requested
|
180
|
card 2018.06.05 15:01:53.705 W ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:42) : No valid chains could be built
|
181
|
card 2018.06.05 15:01:53.705 W ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:42) : No valid chains could be built
|
182
|
support 2018.06.05 15:01:53.705 I EnumAction::Action](core/controller/AppController.cpp:399) : Starting new workflow AUTH
|
183
|
default 2018.06.05 15:01:53.706 EnumAction::Action](core/controller/AppController.cpp:405) : Start governikus::AuthController
|
184
|
statema... 2018.06.05 15:01:53.787 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateProcessing"
|
185
|
statema... 2018.06.05 15:01:53.787 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateProcessing"
|
186
|
statema... 2018.06.05 15:01:53.787 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateProcessing" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
187
|
statema... 2018.06.05 15:01:53.787 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateParseTcTokenUrl"
|
188
|
statema... 2018.06.05 15:01:53.787 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateParseTcTokenUrl"
|
189
|
statema... 2018.06.05 15:01:53.787 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateParseTcTokenUrl" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
190
|
statema... 2018.06.05 15:01:53.787 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateGetTcToken"
|
191
|
statema... 2018.06.05 15:01:53.787 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateGetTcToken"
|
192
|
default 2018.06.05 15:01:53.787 StateGetTcToken::run(core/states/StateGetTcToken.cpp:42) : Got TC Token URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLRequestServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f")
|
193
|
network 2018.06.05 15:01:53.788 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "eid-prod.connect.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLRequestServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f"))
|
194
|
network 2018.06.05 15:01:53.788 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
195
|
network 2018.06.05 15:01:53.938 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
|
196
|
network 2018.06.05 15:01:53.938 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors
|
197
|
network 2018.06.05 15:01:53.938 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-GCM-SHA384, bits=256, proto=TLSv1.2)
|
198
|
network 2018.06.05 15:01:53.938 I (:0) : Used session protocol: "TlsV1_2"
|
199
|
network 2018.06.05 15:01:53.938 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
|
200
|
network 2018.06.05 15:01:53.938 I (:0) : Used peer certificate: QSslCertificate("3", "e7:08:a6:d2:a3:00:be:42", "7d4jrw+Ie/197bX/lQTapw==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.connect.verwalt-berlin.de")), QDateTime(2016-07-20 04:59:12.000 UTC Qt::TimeSpec(UTC)), QDateTime(2019-07-25 23:59:59.000 UTC Qt::TimeSpec(UTC)))
|
201
|
network 2018.06.05 15:01:53.938 I StateGetTcToken::onSslHandshakeDone(core/states/StateGetTcToken.cpp:110) : Handshake of tls connection done!
|
202
|
default 2018.06.05 15:01:53.938 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048
|
203
|
default 2018.06.05 15:01:53.938 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000
|
204
|
default 2018.06.05 15:01:53.938 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384
|
205
|
default 2018.06.05 15:01:53.939 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224
|
206
|
default 2018.06.05 15:01:53.939 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" for URL origin QUrl("https://eid-prod.connect.verwalt-berlin.de:443")
|
207
|
default 2018.06.05 15:01:53.995 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:139) : Status Code: 303 | RedirectUrl: QUrl("https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?SAMLRequest=nZLbbtswDEB%2FxdC7bFl2fBHiBOncAcG6YUh6AfZiyDKdGnCoTJK97e%2BrdCmwYkUfqjdBpHjIw%2BX693EMZjB20FiROGQkAFS6G%2FBQkbvbz7Qg69XSyuPIT2IzuUfcwc8JrAt8Ilrx96Uik0GhpR2sQHkEK5wS%2B83XG8FDJk5GO630SIKNtWCcL%2FVJo52OYPZg5kHB3e6mIo%2FOnayIIhg66lO6UGlEUC70eL%2Fk6GgLZhww7CC6msAcwHzR6PQDtNG51A4UDDOcfxzBrS3Yc0%2FbrmJ5G6ukLKhSeU7TtuS0ZFxS6Lq%2BLTNoM96ToPY9DSjPcG%2Bg%2FIcgijRNooOeGzk5QBdJ%2BwcVCbZ1RZoWkp73fUJjJjlNC1XSNskVzXhc5ixhvGfgQ62dYIvWSXQV4SwuKMsoW9zGiWCxWCThYlH8IMF3o%2BehA%2FPND7Yi9TXzJy3yZg%2B4Raz3jRxHqKWn6GH0cc19f0WZVxmHcUmztPAICU9TEty%2FePZWyMWqeMYw%2F%2Bp836Z8cUhWH2dZRs%2BLcym%2Bulxfb9jqCQ%3D%3D&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=hr9RBbyvfdUFJyCJefbC%2FcCIE4A4fTl5RtDwuPutCmqlcBuOECnrTKCLZ%2F3zLpCt0kFtiHmjk6RHParFwC%2F36hvbYIuKcGcDasWknJIUANY8%2FlRLqadT6B2Q42TuElDsjkgrQom%2BGARlaPjJmabFKVYdNpxhWa1z3TlgU9iRxZPHX4XLAm0JSmDABdZpuZg0KUvXRr2MPlYESE3HCaHs2uf2rpIzt1svmNvfeb73im2FawiDzthAIvTM1QatjnsZ1tsdNHunm0jXY0dUY57jIjh0tetU%2BJG9Veqk%2FMCLIQDN4p8i3pprrpyaGZD3cdr22C2FXmcjVDNSN77cj2n0TA%3D%3D")
|
208
|
network 2018.06.05 15:01:53.995 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Cache-Control": "no-cache, no-store"
|
209
|
network 2018.06.05 15:01:53.995 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Pragma": "no-cache"
|
210
|
network 2018.06.05 15:01:53.995 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Location": "https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?SAMLRequest=nZLbbtswDEB%2FxdC7bFl2fBHiBOncAcG6YUh6AfZiyDKdGnCoTJK97e%2BrdCmwYkUfqjdBpHjIw%2BX693EMZjB20FiROGQkAFS6G%2FBQkbvbz7Qg69XSyuPIT2IzuUfcwc8JrAt8Ilrx96Uik0GhpR2sQHkEK5wS%2B83XG8FDJk5GO630SIKNtWCcL%2FVJo52OYPZg5kHB3e6mIo%2FOnayIIhg66lO6UGlEUC70eL%2Fk6GgLZhww7CC6msAcwHzR6PQDtNG51A4UDDOcfxzBrS3Yc0%2FbrmJ5G6ukLKhSeU7TtuS0ZFxS6Lq%2BLTNoM96ToPY9DSjPcG%2Bg%2FIcgijRNooOeGzk5QBdJ%2BwcVCbZ1RZoWkp73fUJjJjlNC1XSNskVzXhc5ixhvGfgQ62dYIvWSXQV4SwuKMsoW9zGiWCxWCThYlH8IMF3o%2BehA%2FPND7Yi9TXzJy3yZg%2B4Raz3jRxHqKWn6GH0cc19f0WZVxmHcUmztPAICU9TEty%2FePZWyMWqeMYw%2F%2Bp836Z8cUhWH2dZRs%2BLcym%2Bulxfb9jqCQ%3D%3D&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=hr9RBbyvfdUFJyCJefbC%2FcCIE4A4fTl5RtDwuPutCmqlcBuOECnrTKCLZ%2F3zLpCt0kFtiHmjk6RHParFwC%2F36hvbYIuKcGcDasWknJIUANY8%2FlRLqadT6B2Q42TuElDsjkgrQom%2BGARlaPjJmabFKVYdNpxhWa1z3TlgU9iRxZPHX4XLAm0JSmDABdZpuZg0KUvXRr2MPlYESE3HCaHs2uf2rpIzt1svmNvfeb73im2FawiDzthAIvTM1QatjnsZ1tsdNHunm0jXY0dUY57jIjh0tetU%2BJG9Veqk%2FMCLIQDN4p8i3pprrpyaGZD3cdr22C2FXmcjVDNSN77cj2n0TA%3D%3D"
|
211
|
network 2018.06.05 15:01:53.995 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Content-Type": "text/html"
|
212
|
network 2018.06.05 15:01:53.995 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Content-Length": "0"
|
213
|
network 2018.06.05 15:01:53.995 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Date": "Tue, 05 Jun 2018 13:01:53 GMT"
|
214
|
network 2018.06.05 15:01:53.995 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Set-Cookie": "TS015f2d62=01d33437f96092ea00ce1bf9d1a67ceedbea601dcce261a9ef510cb657ac22bddf92e81c9ab4b7a5a7c393d2a6ab8a1b11950e9724; Path=/"
|
215
|
network 2018.06.05 15:01:53.996 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8443, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?SAMLRequest=nZLbbtswDEB%2FxdC7bFl2fBHiBOncAcG6YUh6AfZiyDKdGnCoTJK97e%2BrdCmwYkUfqjdBpHjIw%2BX693EMZjB20FiROGQkAFS6G%2FBQkbvbz7Qg69XSyuPIT2IzuUfcwc8JrAt8Ilrx96Uik0GhpR2sQHkEK5wS%2B83XG8FDJk5GO630SIKNtWCcL%2FVJo52OYPZg5kHB3e6mIo%2FOnayIIhg66lO6UGlEUC70eL%2Fk6GgLZhww7CC6msAcwHzR6PQDtNG51A4UDDOcfxzBrS3Yc0%2FbrmJ5G6ukLKhSeU7TtuS0ZFxS6Lq%2BLTNoM96ToPY9DSjPcG%2Bg%2FIcgijRNooOeGzk5QBdJ%2BwcVCbZ1RZoWkp73fUJjJjlNC1XSNskVzXhc5ixhvGfgQ62dYIvWSXQV4SwuKMsoW9zGiWCxWCThYlH8IMF3o%2BehA%2FPND7Yi9TXzJy3yZg%2B4Raz3jRxHqKWn6GH0cc19f0WZVxmHcUmztPAICU9TEty%2FePZWyMWqeMYw%2F%2Bp836Z8cUhWH2dZRs%2BLcym%2Bulxfb9jqCQ%3D%3D&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=hr9RBbyvfdUFJyCJefbC%2FcCIE4A4fTl5RtDwuPutCmqlcBuOECnrTKCLZ%2F3zLpCt0kFtiHmjk6RHParFwC%2F36hvbYIuKcGcDasWknJIUANY8%2FlRLqadT6B2Q42TuElDsjkgrQom%2BGARlaPjJmabFKVYdNpxhWa1z3TlgU9iRxZPHX4XLAm0JSmDABdZpuZg0KUvXRr2MPlYESE3HCaHs2uf2rpIzt1svmNvfeb73im2FawiDzthAIvTM1QatjnsZ1tsdNHunm0jXY0dUY57jIjh0tetU%2BJG9Veqk%2FMCLIQDN4p8i3pprrpyaGZD3cdr22C2FXmcjVDNSN77cj2n0TA%3D%3D"))
|
216
|
network 2018.06.05 15:01:53.996 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
217
|
network 2018.06.05 15:01:54.245 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
|
218
|
network 2018.06.05 15:01:54.245 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors
|
219
|
network 2018.06.05 15:01:54.245 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-SHA384, bits=256, proto=TLSv1.2)
|
220
|
network 2018.06.05 15:01:54.245 I (:0) : Used session protocol: "TlsV1_2"
|
221
|
network 2018.06.05 15:01:54.245 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
|
222
|
network 2018.06.05 15:01:54.246 I (:0) : Used peer certificate: QSslCertificate("3", "3c:3f:e6:1c:7c:28:28:d9", "Kfl3PTkdwoi1P7sQWG1dvQ==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.verwalt-berlin.de")), QDateTime(2017-10-16 13:01:51.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-10-21 23:59:59.000 UTC Qt::TimeSpec(UTC)))
|
223
|
network 2018.06.05 15:01:54.246 I StateGetTcToken::onSslHandshakeDone(core/states/StateGetTcToken.cpp:110) : Handshake of tls connection done!
|
224
|
default 2018.06.05 15:01:54.246 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048
|
225
|
default 2018.06.05 15:01:54.246 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000
|
226
|
default 2018.06.05 15:01:54.246 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384
|
227
|
default 2018.06.05 15:01:54.246 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224
|
228
|
default 2018.06.05 15:01:54.246 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" for URL origin QUrl("https://eid-prod.verwalt-berlin.de:8443")
|
229
|
default 2018.06.05 15:01:54.637 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:139) : Status Code: 303 | RedirectUrl: QUrl("https://eid-prod.verwalt-berlin.de:8443/ecardpaos/startauthentication?RestrictedId=true&idProviderUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8443%2Fgov_autent%2Fasync&IssuingState=true&FamilyNames=true&ArtisticName=true&PlaceOfBirth=true&AcademicTitle=true&PlaceOfResidence=true&Signature=m48LCeBbrVZcAaS9%2BohPoh2ePZBB3ZwS1A%2Fy%2BU7DwIgBaGtpxx3UWCS8o12RAQUTzxDrg4NtL142%0APjvxJQCV1DTqMIR0VMLpRXmOZ8axVQUG2zf%2BQ7YxMOimpY%2BF3Y5rCZUH6A40YGWtvowZZIdlLQb3%0AwIvyLaOGLxDuUogacfElJ9FJPMxexvryMlWybWAhl5AO404drpSG36MRLvqzRMPy6a3jR%2BD2kqjm%0Av%2FgdLKSgFeyfd4TNOAE%2Bivi0h%2Fs6cplw5rUXbyEjMdMjGFdWJ8%2BCZmUSVgA8u0gDhrwEJdzGPN40%0AkhPvEQx8%2BJy5kezGYKx9zsuBB1oVl5iBqumU5Q%3D%3D&Nationality=true&DateOfBirth=true&GivenNames=true&requestID=cbd5ac4bf2b50fb720032320c0b7b59290646fa&receiverUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8445%2Fecardpaos%2Fpaosreceiver&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%2Frsa-sha256&DocumentType=true&ResidencePermitI=true")
|
230
|
network 2018.06.05 15:01:54.637 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Server": "Apache-Coyote/1.1"
|
231
|
network 2018.06.05 15:01:54.637 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Location": "https://eid-prod.verwalt-berlin.de:8443/ecardpaos/startauthentication?RestrictedId=true&idProviderUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8443%2Fgov_autent%2Fasync&IssuingState=true&FamilyNames=true&ArtisticName=true&PlaceOfBirth=true&AcademicTitle=true&PlaceOfResidence=true&Signature=m48LCeBbrVZcAaS9%2BohPoh2ePZBB3ZwS1A%2Fy%2BU7DwIgBaGtpxx3UWCS8o12RAQUTzxDrg4NtL142%0APjvxJQCV1DTqMIR0VMLpRXmOZ8axVQUG2zf%2BQ7YxMOimpY%2BF3Y5rCZUH6A40YGWtvowZZIdlLQb3%0AwIvyLaOGLxDuUogacfElJ9FJPMxexvryMlWybWAhl5AO404drpSG36MRLvqzRMPy6a3jR%2BD2kqjm%0Av%2FgdLKSgFeyfd4TNOAE%2Bivi0h%2Fs6cplw5rUXbyEjMdMjGFdWJ8%2BCZmUSVgA8u0gDhrwEJdzGPN40%0AkhPvEQx8%2BJy5kezGYKx9zsuBB1oVl5iBqumU5Q%3D%3D&Nationality=true&DateOfBirth=true&GivenNames=true&requestID=cbd5ac4bf2b50fb720032320c0b7b59290646fa&receiverUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8445%2Fecardpaos%2Fpaosreceiver&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%2Frsa-sha256&DocumentType=true&ResidencePermitI=true"
|
232
|
network 2018.06.05 15:01:54.637 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Cache-Control": "no-cache, no-store"
|
233
|
network 2018.06.05 15:01:54.637 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Pragma": "no-cache"
|
234
|
network 2018.06.05 15:01:54.637 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Content-Length": "0"
|
235
|
network 2018.06.05 15:01:54.637 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Date": "Tue, 05 Jun 2018 13:01:54 GMT"
|
236
|
network 2018.06.05 15:01:54.637 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8443, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8443/ecardpaos/startauthentication?RestrictedId=true&idProviderUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8443%2Fgov_autent%2Fasync&IssuingState=true&FamilyNames=true&ArtisticName=true&PlaceOfBirth=true&AcademicTitle=true&PlaceOfResidence=true&Signature=m48LCeBbrVZcAaS9%2BohPoh2ePZBB3ZwS1A%2Fy%2BU7DwIgBaGtpxx3UWCS8o12RAQUTzxDrg4NtL142%0APjvxJQCV1DTqMIR0VMLpRXmOZ8axVQUG2zf%2BQ7YxMOimpY%2BF3Y5rCZUH6A40YGWtvowZZIdlLQb3%0AwIvyLaOGLxDuUogacfElJ9FJPMxexvryMlWybWAhl5AO404drpSG36MRLvqzRMPy6a3jR%2BD2kqjm%0Av%2FgdLKSgFeyfd4TNOAE%2Bivi0h%2Fs6cplw5rUXbyEjMdMjGFdWJ8%2BCZmUSVgA8u0gDhrwEJdzGPN40%0AkhPvEQx8%2BJy5kezGYKx9zsuBB1oVl5iBqumU5Q%3D%3D&Nationality=true&DateOfBirth=true&GivenNames=true&requestID=cbd5ac4bf2b50fb720032320c0b7b59290646fa&receiverUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8445%2Fecardpaos%2Fpaosreceiver&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%2Frsa-sha256&DocumentType=true&ResidencePermitI=true"))
|
237
|
network 2018.06.05 15:01:54.638 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
238
|
default 2018.06.05 15:01:54.684 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:139) : Status Code: 200 | RedirectUrl: QUrl("")
|
239
|
network 2018.06.05 15:01:54.684 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Server": "Apache-Coyote/1.1"
|
240
|
network 2018.06.05 15:01:54.684 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Content-Length": "638"
|
241
|
network 2018.06.05 15:01:54.685 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Date": "Tue, 05 Jun 2018 13:01:54 GMT"
|
242
|
default 2018.06.05 15:01:54.685 TcToken::parse(core/TcToken.cpp:39) : Parsing TcToken:
|
243
|
default 2018.06.05 15:01:54.685 TcToken::parse(core/TcToken.cpp:40) : "<TCTokenType>\n<ServerAddress>https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver</ServerAddress>\n<SessionIdentifier>cbd5ac4bf2b50fb720032320c0b7b59290646fa</SessionIdentifier>\n<RefreshAddress>https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=cbd5ac4bf2b50fb720032320c0b7b59290646fa</RefreshAddress>\n<Binding>urn:liberty:paos:2006-08</Binding>\n<PathSecurity-Protocol>urn:ietf:rfc:4279</PathSecurity-Protocol>\n<PathSecurity-Parameter>\n<PSK>621A9ED4FF15BCACF7A9834DC2F4875247FB52797CFC65B7D00E8ED0FA38339BF2DA9DC1D4982EAEA47117F2A87EEE26323F44366ED7B8629B49A83AE6D7923E</PSK>\n</PathSecurity-Parameter>\n</TCTokenType>\n"
|
244
|
statema... 2018.06.05 15:01:54.687 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateGetTcToken" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
245
|
statema... 2018.06.05 15:01:54.687 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateStartPaos"
|
246
|
statema... 2018.06.05 15:01:54.687 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateStartPaos"
|
247
|
statema... 2018.06.05 15:01:54.687 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateStartPaos" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
248
|
statema... 2018.06.05 15:01:54.687 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendStartPaos"
|
249
|
statema... 2018.06.05 15:01:54.687 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendStartPaos"
|
250
|
network 2018.06.05 15:01:54.687 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data:
|
251
|
"<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n <paos:EndpointReference>\n <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n <paos:MetaData>\n <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n </paos:MetaData>\n </paos:EndpointReference>\n </paos:PAOS>\n <wsa:ReplyTo>\n <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n </wsa:ReplyTo>\n <wsa:MessageID>urn:uuid:39240635-52aa-47bd-a017-440756bbd1e2</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n <StartPAOS xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n <SessionIdentifier>cbd5ac4bf2b50fb720032320c0b7b59290646fa</SessionIdentifier>\n <ConnectionHandle xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"ConnectionHandleType\">\n <CardApplication>e80704007f00070302</CardApplication>\n <SlotHandle>00</SlotHandle>\n </ConnectionHandle>\n <UserAgent>\n <Name>AusweisApp2</Name>\n <VersionMajor>1</VersionMajor>\n <VersionMinor>14</VersionMinor>\n <VersionSubminor>0</VersionSubminor>\n </UserAgent>\n <SupportedAPIVersions>\n <Major>1</Major>\n <Minor>1</Minor>\n <Subminor>5</Subminor>\n </SupportedAPIVersions>\n </StartPAOS>\n </soap:Body>\n</soap:Envelope>\n"
|
252
|
network 2018.06.05 15:01:54.689 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
|
253
|
network 2018.06.05 15:01:54.689 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
254
|
network 2018.06.05 15:01:54.798 ...dKeyAuthenticationRequired(core/states/StateGenericSendReceive.cpp:141) : pre-shared key authentication requested: "Hint"
|
255
|
network 2018.06.05 15:01:54.852 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
|
256
|
network 2018.06.05 15:01:54.852 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors
|
257
|
network 2018.06.05 15:01:54.852 I (:0) : Used session cipher QSslCipher(name=RSA-PSK-AES256-CBC-SHA, bits=256, proto=SSLv3)
|
258
|
network 2018.06.05 15:01:54.852 I (:0) : Used session protocol: "TlsV1_2"
|
259
|
network 2018.06.05 15:01:54.852 I (:0) : Used ephemeral server key:
|
260
|
network 2018.06.05 15:01:54.853 I (:0) : Used peer certificate: QSslCertificate("3", "3c:3f:e6:1c:7c:28:28:d9", "Kfl3PTkdwoi1P7sQWG1dvQ==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.verwalt-berlin.de")), QDateTime(2017-10-16 13:01:51.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-10-21 23:59:59.000 UTC Qt::TimeSpec(UTC)))
|
261
|
network 2018.06.05 15:01:54.853 I ...eceive::onSslHandshakeDone(core/states/StateGenericSendReceive.cpp:115) : Handshake of tls connection done!
|
262
|
default 2018.06.05 15:01:54.853 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048
|
263
|
default 2018.06.05 15:01:54.853 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000
|
264
|
default 2018.06.05 15:01:54.853 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" for URL origin QUrl("https://eid-prod.verwalt-berlin.de:8445")
|
265
|
network 2018.06.05 15:01:54.894 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
|
266
|
network 2018.06.05 15:01:54.895 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
|
267
|
network 2018.06.05 15:01:54.895 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
|
268
|
network 2018.06.05 15:01:54.895 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
|
269
|
network 2018.06.05 15:01:54.895 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:01:54 GMT"
|
270
|
network 2018.06.05 15:01:54.895 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
|
271
|
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n <soap:Header>\n <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id976\" refToMessageID=\"cbd5ac4bf2b50fb720032320c0b7b59290646fa\"/>\n </soap:Header>\n <soap:Body>\n <InitializeFramework xmlns=\"http://www.bsi.bund.de/ecard/api/1.1\"/>\n</soap:Body>\n</soap:Envelope>\n"
|
272
|
network 2018.06.05 15:01:54.895 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: INITIALIZE_FRAMEWORK
|
273
|
statema... 2018.06.05 15:01:54.896 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendStartPaos" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
274
|
statema... 2018.06.05 15:01:54.896 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateInitializeFramework"
|
275
|
statema... 2018.06.05 15:01:54.896 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateInitializeFramework"
|
276
|
statema... 2018.06.05 15:01:54.896 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateInitializeFramework" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
277
|
statema... 2018.06.05 15:01:54.896 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendInitializeFrameworkResponse"
|
278
|
statema... 2018.06.05 15:01:54.896 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendInitializeFrameworkResponse"
|
279
|
network 2018.06.05 15:01:54.896 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data:
|
280
|
"<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n <paos:EndpointReference>\n <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n <paos:MetaData>\n <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n </paos:MetaData>\n </paos:EndpointReference>\n </paos:PAOS>\n <wsa:ReplyTo>\n <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n </wsa:ReplyTo>\n <wsa:MessageID>urn:uuid:9cd94743-9512-4f37-9093-4892a28f1fa6</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n <InitializeFrameworkResponse xmlns=\"http://www.bsi.bund.de/ecard/api/1.1\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n </Result>\n <Version>\n <Major>1</Major>\n <Minor>1</Minor>\n <SubMinor>5</SubMinor>\n </Version>\n </InitializeFrameworkResponse>\n </soap:Body>\n</soap:Envelope>\n"
|
281
|
network 2018.06.05 15:01:54.896 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
|
282
|
network 2018.06.05 15:01:54.896 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
283
|
network 2018.06.05 15:01:54.938 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
|
284
|
network 2018.06.05 15:01:54.939 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
|
285
|
network 2018.06.05 15:01:54.939 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
|
286
|
network 2018.06.05 15:01:54.939 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
|
287
|
network 2018.06.05 15:01:54.939 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:01:54 GMT"
|
288
|
network 2018.06.05 15:01:54.939 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
|
289
|
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n <soap:Header>\n <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id977\" refToMessageID=\"cbd5ac4bf2b50fb720032320c0b7b59290646fa\"/>\n </soap:Header>\n <soap:Body>\n <DIDList xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<ConnectionHandle xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"ConnectionHandle\">\n<CardApplication>E80704007F00070302</CardApplication>\n<SlotHandle>00</SlotHandle>\n</ConnectionHandle>\n</DIDList>\n</soap:Body>\n</soap:Envelope>\n"
|
290
|
network 2018.06.05 15:01:54.939 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DID_LIST
|
291
|
statema... 2018.06.05 15:01:54.939 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendInitializeFrameworkResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
292
|
statema... 2018.06.05 15:01:54.939 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateDidList"
|
293
|
statema... 2018.06.05 15:01:54.939 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateDidList"
|
294
|
statema... 2018.06.05 15:01:54.939 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateDidList" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
295
|
statema... 2018.06.05 15:01:54.940 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendDIDListResponse"
|
296
|
statema... 2018.06.05 15:01:54.940 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendDIDListResponse"
|
297
|
network 2018.06.05 15:01:54.940 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data:
|
298
|
"<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n <paos:EndpointReference>\n <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n <paos:MetaData>\n <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n </paos:MetaData>\n </paos:EndpointReference>\n </paos:PAOS>\n <wsa:ReplyTo>\n <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n </wsa:ReplyTo>\n <wsa:MessageID>urn:uuid:e2ba4c83-f16b-4132-a263-3b2e429d879d</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n <DIDListResponse xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n </Result>\n <DIDNameList>\n <DIDName>PIN</DIDName>\n </DIDNameList>\n </DIDListResponse>\n </soap:Body>\n</soap:Envelope>\n"
|
299
|
network 2018.06.05 15:01:54.940 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
|
300
|
network 2018.06.05 15:01:54.940 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
301
|
network 2018.06.05 15:01:55.020 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
|
302
|
network 2018.06.05 15:01:55.020 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
|
303
|
network 2018.06.05 15:01:55.020 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
|
304
|
network 2018.06.05 15:01:55.020 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
|
305
|
network 2018.06.05 15:01:55.020 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:01:54 GMT"
|
306
|
network 2018.06.05 15:01:55.020 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
|
307
|
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n <soap:Header>\n <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id978\" refToMessageID=\"cbd5ac4bf2b50fb720032320c0b7b59290646fa\"/>\n </soap:Header>\n <soap:Body>\n <DIDAuthenticate xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<ConnectionHandle xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"ConnectionHandle\">\n<CardApplication>E80704007F00070302</CardApplication>\n<SlotHandle>00</SlotHandle>\n</ConnectionHandle>\n<DIDName>PIN</DIDName>\n<AuthenticationProtocolData Protocol=\"urn:oid:1.3.162.15480.3.0.14.2\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"EAC1InputType\">\n<Certificate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ertificate>\n<Certificate>7F2181E77F4E81A05F290100420E44454356434165494430303130347F494F060A04007F00070202020203864104623D7CEBFF7918590B4D5C53D507DCF1EE3AE9E20A5E62AFEB8DBFC958F7EFFB4CCF7952FDA2B3F6254E9DC34FE5ECD1E084D4C23658319EC5BBE5A009D1E0EC5F2010444544566549444454523130313433337F4C12060904007F0007030102025305400513FF975F25060108000501075F24060108000801055F374054483CEF8791A094D40343B753FA83689C2B56256BB8428C56DDCDAB94709CAE8107DE8649DC37F7D130D75E36936CD85DAC818D1297C348BA408DA179A20CE4</Certificate>\n<Certificate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ertificate>\n<Certificate>7F218201B67F4E82016E5F290100420E44454356434165494430303130327F4982011D060A04007F000702020202038120A9FB57DBA1EEA9BC3E660A909D838D726E3BF623D52620282013481D1F6E537782207D5A0975FC2C3057EEF67530417AFFE7FB8055C126DC5C6CE94A4B44F330B5D9832026DC5C6CE94A4B44F330B5D9BBD77CBF958416295CF7E1CE6BCCDC18FF8C07B68441048BD2AEB9CB7E57CB2C4B482FFC81B7AFB9DE27E1E3BD23C23A4453BD9ACE3262547EF835C3DAC4FD97F8461A14611DC9C27745132DED8E545C1D54C72F0469978520A9FB57DBA1EEA9BC3E660A909D838D718C397AA3B561A6F7901E0E82974856A78641048925419FC7F194922CFC6B8DD25AE6A19C1B59216E6CF06270E5D75CFD64205F55CF867BBFEFEEFD6E680E1FD197F18AB684484901362568EFC9ADB5C6018D728701015F200E44454356434165494430303130337F4C12060904007F0007030102025305FC0F13FFFF5F25060102010200035F24060105010200035F37404D6F08A86A4F18409F6685387DD3C6A7FF5D68EA4F7714A861BBB3BB721D05D3014ADF1763C9292F715D8E94EE9B3E1B73AB1382414EBF39DFB3B0FB6C09DBEB</Certificate>\n<CertificateDescription>308202DA060A04007F00070301030101A10E0C0C442D547275737420476D6248A2181316687474703A2F2F7777772E642D74727573742E6E6574A3300C2E4C616E64204265726C696E2C20762E642E2053656E762E2046C3BC7220496E6E6572657320756E642053706F7274A42C132A68747470733A2F2F6569642D70726F642E636F6E6E6563742E76657277616C742D6265726C696E2E6465A58201F80C8201F44E616D652C20416E7363687269667420756E6420452D4D61696C2D4164726573736520646573204469656E737465616E626965746572733A0D0A4C616E64204265726C696E2C20762E642E2053656E762E2066C3BC7220496E6E6572657320756E642053706F72740D0A4B6C6F737465727374722E2034370D0A3130313739204265726C696E0D0A706F73747374656C6C654073656E696E6E73706F72742E6265726C696E2E64650D0A0D0A4765736368C3A46674737A7765636B3A0D0A0D0A48696E7765697320617566206469652066C3BC722064656E204469656E737465616E626965746572207A757374C3A46E646967656E205374656C6C656E2C20646965206469652045696E68616C74756E672064657220566F7273636872696674656E207A756D20446174656E73636875747A206B6F6E74726F6C6C696572656E3A0D0A4265726C696E65722042656175667472616774652066C3BC7220446174656E73636875747A20756E6420496E666F726D6174696F6E7366726569686569740D0A46726965647269636873747261C39F65203231390D0A3130393639204265726C696E0D0A3033302F3133382038392D300D0A6D61696C626F7840646174656E73636875747A2D6265726C696E2E64650D0A687474703A2F2F7777772E646174656E73636875747A2D6265726C696E2E6465A746314404200546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C0420774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94</CertificateDescription>\n<RequiredCHAT>7F4C12060904007F0007030102025305000503FB04</RequiredCHAT>\n<OptionalCHAT>7F4C12060904007F00070301020253050000000000</OptionalCHAT>\n<AuthenticatedAuxiliaryData>67177315060904007F00070301040253083230313830363035</AuthenticatedAuxiliaryData>\n</AuthenticationProtocolData>\n</DIDAuthenticate>\n</soap:Body>\n</soap:Envelope>\n"
|
308
|
paos 2018.06.05 15:01:55.020 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:36) : "ConnectionHandle"
|
309
|
paos 2018.06.05 15:01:55.020 ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "CardApplication"
|
310
|
paos 2018.06.05 15:01:55.020 ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "SlotHandle"
|
311
|
paos 2018.06.05 15:01:55.020 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:36) : "DIDName"
|
312
|
paos 2018.06.05 15:01:55.021 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:36) : "AuthenticationProtocolData"
|
313
|
paos 2018.06.05 15:01:55.021 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate"
|
314
|
paos 2018.06.05 15:01:55.021 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate"
|
315
|
paos 2018.06.05 15:01:55.021 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate"
|
316
|
paos 2018.06.05 15:01:55.021 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate"
|
317
|
paos 2018.06.05 15:01:55.021 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "CertificateDescription"
|
318
|
paos 2018.06.05 15:01:55.021 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "RequiredCHAT"
|
319
|
paos 2018.06.05 15:01:55.021 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "OptionalCHAT"
|
320
|
paos 2018.06.05 15:01:55.021 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "AuthenticatedAuxiliaryData"
|
321
|
network 2018.06.05 15:01:55.021 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DID_AUTHENTICATE_EAC1
|
322
|
statema... 2018.06.05 15:01:55.021 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendDIDListResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
323
|
statema... 2018.06.05 15:01:55.022 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateExtractCvcsFromEac1InputType"
|
324
|
statema... 2018.06.05 15:01:55.022 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateExtractCvcsFromEac1InputType"
|
325
|
card 2018.06.05 15:01:55.022 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])
|
326
|
card 2018.06.05 15:01:55.022 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"])
|
327
|
card 2018.06.05 15:01:55.022 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"])
|
328
|
card 2018.06.05 15:01:55.022 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"])
|
329
|
card 2018.06.05 15:01:55.022 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"])
|
330
|
card 2018.06.05 15:01:55.022 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"])
|
331
|
card 2018.06.05 15:01:55.022 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"])
|
332
|
card 2018.06.05 15:01:55.023 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
|
333
|
card 2018.06.05 15:01:55.023 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
|
334
|
card 2018.06.05 15:01:55.023 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
|
335
|
card 2018.06.05 15:01:55.023 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
|
336
|
card 2018.06.05 15:01:55.023 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])
|
337
|
card 2018.06.05 15:01:55.023 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"])
|
338
|
card 2018.06.05 15:01:55.023 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"])
|
339
|
card 2018.06.05 15:01:55.023 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"])
|
340
|
card 2018.06.05 15:01:55.024 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00001", chr="DETESTeID00001", valid=["2010-08-13","2013-08-13"])
|
341
|
card 2018.06.05 15:01:55.024 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00001", chr="DETESTeID00002", valid=["2010-09-21","2013-09-21"])
|
342
|
card 2018.06.05 15:01:55.024 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00002", chr="DETESTeID00004", valid=["2012-05-11","2015-05-11"])
|
343
|
card 2018.06.05 15:01:55.024 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00004", chr="DETESTeID00005", valid=["2015-05-04","2018-05-04"])
|
344
|
card 2018.06.05 15:01:55.024 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeIDCTL0401", chr="DECVCAeIDCTL0402", valid=["2016-03-01","2019-03-01"])
|
345
|
card 2018.06.05 15:01:55.024 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeIDCT00001", chr="DECVCAeIDCTL0401", valid=["2016-03-01","2019-03-01"])
|
346
|
card 2018.06.05 15:01:55.024 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeIDCT00001", chr="DECVCAeIDCT00001", valid=["2016-03-01","2019-03-01"])
|
347
|
card 2018.06.05 15:01:55.024 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
|
348
|
statema... 2018.06.05 15:01:55.024 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateExtractCvcsFromEac1InputType" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
349
|
statema... 2018.06.05 15:01:55.024 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StatePreVerification"
|
350
|
statema... 2018.06.05 15:01:55.024 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StatePreVerification"
|
351
|
default 2018.06.05 15:01:55.024 StatePreVerification::run(core/states/StatePreVerification.cpp:33) : Try to build a cvc chain for one of the known trust points
|
352
|
card 2018.06.05 15:01:55.024 const(card/base/asn1/CVCertificateChainBuilder.cpp:109) : Get chain for root CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"])
|
353
|
card 2018.06.05 15:01:55.024 const(card/base/asn1/CVCertificateChainBuilder.cpp:119) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
|
354
|
default 2018.06.05 15:01:55.030 StatePreVerification::isValid(core/states/StatePreVerification.cpp:97) : Check certificate chain validity on "2018-06-05T15:01:53"
|
355
|
default 2018.06.05 15:01:55.030 StatePreVerification::isValid(core/states/StatePreVerification.cpp:108) : CVC "DE000048700233" AT | valid from/to [ "2018-06-05" , "2018-06-06" ]
|
356
|
default 2018.06.05 15:01:55.030 StatePreVerification::isValid(core/states/StatePreVerification.cpp:108) : CVC "DEDVeIDDTR101433" DV_no_f | valid from/to [ "2018-05-17" , "2018-08-15" ]
|
357
|
default 2018.06.05 15:01:55.030 StatePreVerification::isValid(core/states/StatePreVerification.cpp:108) : CVC "DECVCAeID00104" CVCA | valid from/to [ "2015-09-14" , "2018-09-14" ]
|
358
|
statema... 2018.06.05 15:01:55.038 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StatePreVerification" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
359
|
statema... 2018.06.05 15:01:55.038 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateCertificateDescriptionCheck"
|
360
|
statema... 2018.06.05 15:01:55.038 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateCertificateDescriptionCheck"
|
361
|
network 2018.06.05 15:01:55.038 UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46) : SOP-Check( "https://eid-prod.connect.verwalt-berlin.de:443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= true
|
362
|
statema... 2018.06.05 15:01:55.038 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateCertificateDescriptionCheck" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
363
|
statema... 2018.06.05 15:01:55.038 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateCheckCertificates"
|
364
|
statema... 2018.06.05 15:01:55.038 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateCheckCertificates"
|
365
|
default 2018.06.05 15:01:55.038 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42"
|
366
|
default 2018.06.05 15:01:55.038 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "774af1694f2280b09d0d640948b22a77ea638f1157f517923c255bd2aae56b94"
|
367
|
default 2018.06.05 15:01:55.038 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
|
368
|
default 2018.06.05 15:01:55.039 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9"
|
369
|
default 2018.06.05 15:01:55.039 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "0546c2b01048cb77669003ab0743255f94582f010baa85308133f514e218ff3c"
|
370
|
default 2018.06.05 15:01:55.039 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
|
371
|
default 2018.06.05 15:01:55.039 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9"
|
372
|
default 2018.06.05 15:01:55.039 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "0546c2b01048cb77669003ab0743255f94582f010baa85308133f514e218ff3c"
|
373
|
default 2018.06.05 15:01:55.039 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
|
374
|
statema... 2018.06.05 15:01:55.039 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateCheckCertificates" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
375
|
statema... 2018.06.05 15:01:55.039 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateEditAccessRights"
|
376
|
card_pcsc 2018.06.05 15:01:55.113 PcscReader::updateCard(card/pcsc/PcscReader.cpp:194) : old state: "(0x20022) CHANGED PRESENT" | new state: "(0x20422) CHANGED PRESENT UNPOWERED"
|
377
|
statema... 2018.06.05 15:01:56.256 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateEditAccessRights"
|
378
|
statema... 2018.06.05 15:01:56.256 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateEditAccessRights" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
379
|
statema... 2018.06.05 15:01:56.256 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSelectReader"
|
380
|
statema... 2018.06.05 15:01:56.257 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSelectReader"
|
381
|
statema... 2018.06.05 15:01:56.257 ...SelectReader::onReaderInfoChanged(core/states/StateSelectReader.cpp:71) : Select first found reader "REINER SCT cyberJack RFID basis 0" of type PCSC
|
382
|
card 2018.06.05 15:01:56.257 ReaderManagerWorker::startScan(card/base/ReaderManagerWorker.cpp:114) : Start scan on plugin: governikus::PcscReaderManagerPlugIn
|
383
|
card 2018.06.05 15:01:56.257 ReaderManagerWorker::startScan(card/base/ReaderManagerWorker.cpp:114) : Start scan on plugin: governikus::RemoteReaderManagerPlugIn
|
384
|
statema... 2018.06.05 15:01:56.257 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSelectReader" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
385
|
statema... 2018.06.05 15:01:56.257 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateConnectCard"
|
386
|
statema... 2018.06.05 15:01:56.257 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateConnectCard"
|
387
|
statema... 2018.06.05 15:01:56.257 StateConnectCard::run(core/states/StateConnectCard.cpp:24) : StateConnectCard::run()
|
388
|
card_dr... 2018.06.05 15:01:56.260 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
|
389
|
statema... 2018.06.05 15:01:56.260 StateConnectCard::onCardInserted(core/states/StateConnectCard.cpp:40) : Card has been inserted, trying to connect
|
390
|
network 2018.06.05 15:01:56.261 ...ramHandlerImpl::DatagramHandlerImpl(network/DatagramHandlerImpl.cpp:57) : Bound on port: 24727
|
391
|
card_pcsc 2018.06.05 15:01:56.265 PcscCard::connect(card/pcsc/PcscCard.cpp:111) : SCardConnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" | cardHandle: 3926130688 | protocol: "SCARD_PROTOCOL_T1"
|
392
|
card_pcsc 2018.06.05 15:01:56.265 PcscCard::connect(card/pcsc/PcscCard.cpp:118) : SCardBeginTransaction for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
393
|
card_dr... 2018.06.05 15:01:56.270 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
|
394
|
statema... 2018.06.05 15:01:56.270 StateConnectCard::onCommandDone(core/states/StateConnectCard.cpp:49) : Card connection command completed
|
395
|
statema... 2018.06.05 15:01:56.270 StateConnectCard::onCommandDone(core/states/StateConnectCard.cpp:57) : Card connection was successful
|
396
|
statema... 2018.06.05 15:01:56.270 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateConnectCard" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
397
|
statema... 2018.06.05 15:01:56.270 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateUpdateRetryCounter"
|
398
|
statema... 2018.06.05 15:01:56.270 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateUpdateRetryCounter"
|
399
|
default 2018.06.05 15:01:56.271 StateUpdateRetryCounter::run(core/states/StateUpdateRetryCounter.cpp:22) : StateUpdateRetryCounter::run()
|
400
|
card_pcsc 2018.06.05 15:01:56.271 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4020c02011c"
|
401
|
card_pcsc 2018.06.05 15:01:56.304 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
402
|
card_pcsc 2018.06.05 15:01:56.304 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000"
|
403
|
card_pcsc 2018.06.05 15:01:56.304 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0022c1a412800a04007f0007020204020283010384010d"
|
404
|
card_pcsc 2018.06.05 15:01:56.332 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
405
|
card_pcsc 2018.06.05 15:01:56.332 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000"
|
406
|
card 2018.06.05 15:01:56.332 Reader::getRetryCounter(card/base/Reader.cpp:151) : StatusCode: SUCCESS
|
407
|
support 2018.06.05 15:01:56.332 I Reader::updateRetryCounter(card/base/Reader.cpp:103) : retrieved retry counter: 3 , was: 3 , PIN deactivated: false
|
408
|
card 2018.06.05 15:01:56.332 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK
|
409
|
default 2018.06.05 15:01:56.332 ...r::onUpdateRetryCounterDone(core/states/StateUpdateRetryCounter.cpp:39) : StateUpdateRetryCounter::onUpdateRetryCounterDone()
|
410
|
statema... 2018.06.05 15:01:56.332 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateUpdateRetryCounter" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
411
|
statema... 2018.06.05 15:01:56.332 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateHandleRetryCounter"
|
412
|
statema... 2018.06.05 15:01:56.332 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateHandleRetryCounter"
|
413
|
default 2018.06.05 15:01:56.332 StateHandleRetryCounter::run(core/states/StateHandleRetryCounter.cpp:37) : PIN allowed
|
414
|
statema... 2018.06.05 15:01:56.332 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateHandleRetryCounter" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
415
|
statema... 2018.06.05 15:01:56.333 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateEstablishPacePin"
|
416
|
card_pcsc 2018.06.05 15:01:56.614 PcscReader::updateCard(card/pcsc/PcscReader.cpp:194) : old state: "(0x20422) CHANGED PRESENT UNPOWERED" | new state: "(0x20122) CHANGED PRESENT INUSE"
|
417
|
statema... 2018.06.05 15:01:58.632 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateEstablishPacePin"
|
418
|
default 2018.06.05 15:01:58.632 AuthContext::encodeEffectiveChat(core/context/AuthContext.cpp:223) : Using effective chat: "7f4c12060904007f0007030102025305000503fb04"
|
419
|
default 2018.06.05 15:01:58.632 StateEstablishPacePin::run(core/states/StateEstablishPacePin.cpp:38) : Establish connection using PIN
|
420
|
support 2018.06.05 15:01:58.632 I ...ionWorker::establishPaceChannel(card/base/CardConnectionWorker.cpp:179) : Starting PACE for PACE_PIN
|
421
|
card 2018.06.05 15:01:58.633 const(card/base/pace/PaceHandler.cpp:141) : Use ECDH with standardized domain parameters: "0.4.0.127.0.7.2.2.4.2.2"
|
422
|
card 2018.06.05 15:01:58.633 ...urveFactory::createCurve(card/base/pace/ec/EllipticCurveFactory.cpp:41) : Create elliptic curve brainpoolP256r1
|
423
|
card_pcsc 2018.06.05 15:01:58.633 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4020c02011c"
|
424
|
card_pcsc 2018.06.05 15:01:58.645 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
425
|
card_pcsc 2018.06.05 15:01:58.645 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000"
|
426
|
card_pcsc 2018.06.05 15:01:58.645 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0022c1a427800a04007f0007020204020283010384010d7f4c12060904007f0007030102025305000503fb04"
|
427
|
card_pcsc 2018.06.05 15:01:58.686 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
428
|
card_pcsc 2018.06.05 15:01:58.686 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000"
|
429
|
card_pcsc 2018.06.05 15:01:58.686 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "10860000027c0000"
|
430
|
card_pcsc 2018.06.05 15:01:58.741 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
431
|
card_pcsc 2018.06.05 15:01:58.741 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "7c1280101d17b027156768f8e11b3892ab4450029000"
|
432
|
card_pcsc 2018.06.05 15:01:58.742 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "10860000457c438141045095ae46bbd75a3b04e3bc709fffcb741e16ee267f66964b60b9230904ba7e33565ebd948c3bbd3ec8d7726653e1e788f8a647c3211ae80cb671979c6b3e335900"
|
433
|
card_pcsc 2018.06.05 15:01:58.969 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
434
|
card_pcsc 2018.06.05 15:01:58.970 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "7c438241048b12ac3afd13a24fa0999a072fe3d0b4a60124ee43fb59bd9078f76c8f7a1b991513d48037e8b76cec075f9e5a6253a2a525a0905315d8c928d3e080c59e79a09000"
|
435
|
card_pcsc 2018.06.05 15:01:58.973 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "10860000457c43834104021c00743b6825a826fd1f217a66b3c83ecfaf74b5c653df50c1b196463d6ec71543dccbd8e139cd6022494f1ff1dfcf0c47af6e86f53857baf4724d9477429400"
|
436
|
card_pcsc 2018.06.05 15:01:59.135 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
437
|
card_pcsc 2018.06.05 15:01:59.135 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "7c43844104903653e62ab456bfd17ed6ae240e5ad9251764d554d2bf460ea80030726f109d3d24668325d87d7962e9cf02b7d3c60238c71a069e03c0476845e9f1872f049e9000"
|
438
|
card_pcsc 2018.06.05 15:01:59.137 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "008600000c7c0a85081132a9f20a1b4c1700"
|
439
|
card_pcsc 2018.06.05 15:01:59.248 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
440
|
card_pcsc 2018.06.05 15:01:59.249 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "7c2a8608b288fa2e22642864870e4445435643416549443030313034880e44454356434165494430303130339000"
|
441
|
default 2018.06.05 15:01:59.249 ...ynamicAuthenticationData(card/base/GeneralAuthenticateResponse.cpp:219) : mCarCurr "DECVCAeID00104"
|
442
|
default 2018.06.05 15:01:59.249 ...ynamicAuthenticationData(card/base/GeneralAuthenticateResponse.cpp:220) : mCarPrev "DECVCAeID00103"
|
443
|
card 2018.06.05 15:01:59.249 ...reement::performMutualAuthenticate(card/base/pace/KeyAgreement.cpp:170) : Successfully authenticated
|
444
|
card 2018.06.05 15:01:59.249 PaceHandler::establishPaceChannel(card/base/pace/PaceHandler.cpp:93) : Pace channel established
|
445
|
support 2018.06.05 15:01:59.249 I ...ionWorker::establishPaceChannel(card/base/CardConnectionWorker.cpp:206) : Finished PACE for PACE_PIN with result OK
|
446
|
card 2018.06.05 15:01:59.249 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK
|
447
|
statema... 2018.06.05 15:01:59.249 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateEstablishPacePin" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
448
|
statema... 2018.06.05 15:01:59.249 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateDidAuthenticateEac1"
|
449
|
statema... 2018.06.05 15:01:59.257 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateDidAuthenticateEac1"
|
450
|
card_pcsc 2018.06.05 15:01:59.257 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c8400000d9701088e0843e7b18792e0fce900"
|
451
|
card_pcsc 2018.06.05 15:01:59.292 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
452
|
card_pcsc 2018.06.05 15:01:59.292 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "871101168be941eacc35a6424b433ef3da4413990290008e080b8860512a726aa39000"
|
453
|
card 2018.06.05 15:01:59.293 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK
|
454
|
default 2018.06.05 15:01:59.293 AuthContext::encodeEffectiveChat(core/context/AuthContext.cpp:223) : Using effective chat: "7f4c12060904007f0007030102025305000503fb04"
|
455
|
card 2018.06.05 15:01:59.293 const(card/base/asn1/CVCertificateChainBuilder.cpp:85) : Get chain for authority "DECVCAeID00104"
|
456
|
card 2018.06.05 15:01:59.293 const(card/base/asn1/CVCertificateChainBuilder.cpp:96) : Found valid chain QVector(CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
|
457
|
statema... 2018.06.05 15:01:59.293 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateDidAuthenticateEac1" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
458
|
statema... 2018.06.05 15:01:59.293 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendDIDAuthenticateResponseEAC1"
|
459
|
statema... 2018.06.05 15:01:59.293 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendDIDAuthenticateResponseEAC1"
|
460
|
network 2018.06.05 15:01:59.294 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data:
|
461
|
"<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n <paos:EndpointReference>\n <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n <paos:MetaData>\n <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n </paos:MetaData>\n </paos:EndpointReference>\n </paos:PAOS>\n <wsa:ReplyTo>\n <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n </wsa:ReplyTo>\n <wsa:MessageID>urn:uuid:dc3ea58a-be90-462c-bedb-2e3d52af0dd1</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n <DIDAuthenticateResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n </Result>\n <AuthenticationProtocolData Protocol=\"urn:oid:1.3.162.15480.3.0.14.2\" xsi:type=\"iso:EAC1OutputType\">\n <CertificateHolderAuthorizationTemplate>7f4c12060904007f0007030102025305000503fb04</CertificateHolderAuthorizationTemplate>\n <EFCardAccess>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</EFCardAccess>\n <IDPICC>903653e62ab456bfd17ed6ae240e5ad9251764d554d2bf460ea80030726f109d</IDPICC>\n <Challenge>b970753ad2e85e20</Challenge>\n </AuthenticationProtocolData>\n </DIDAuthenticateResponse>\n </soap:Body>\n</soap:Envelope>\n"
|
462
|
network 2018.06.05 15:01:59.295 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
|
463
|
network 2018.06.05 15:01:59.295 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
464
|
network 2018.06.05 15:01:59.372 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
|
465
|
network 2018.06.05 15:01:59.372 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
|
466
|
network 2018.06.05 15:01:59.372 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
|
467
|
network 2018.06.05 15:01:59.372 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
|
468
|
network 2018.06.05 15:01:59.372 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:01:58 GMT"
|
469
|
network 2018.06.05 15:01:59.372 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
|
470
|
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n <soap:Header>\n <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id979\" refToMessageID=\"cbd5ac4bf2b50fb720032320c0b7b59290646fa\"/>\n </soap:Header>\n <soap:Body>\n <DIDAuthenticate xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<ConnectionHandle xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"ConnectionHandle\">\n<CardApplication>E80704007F00070302</CardApplication>\n<SlotHandle>00</SlotHandle>\n</ConnectionHandle>\n<DIDName>PIN</DIDName>\n<AuthenticationProtocolData Protocol=\"urn:oid:1.3.162.15480.3.0.14.2\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"EAC2InputType\">\n<Certificates xmlns=\"unknownNamespace\"/>\n<EphemeralPublicKey>049E1AFEDB227F8456AA4ADE1083E61239F9B16361EE873A864DC305528A8019562618BB53D8068968B3097569F27D941C12C4B10639AF57926A690A988E8D9519</EphemeralPublicKey>\n<Signature>5E9E3238FAC60B3BDA32CA1739BBAFAB301959FB6B9CDE4EBB5A1220C930EE2B1442C9DCF6EEFC84B86169DAB14380AA9219136C8940C056A91DD448E1FBC89B</Signature>\n</AuthenticationProtocolData>\n</DIDAuthenticate>\n</soap:Body>\n</soap:Envelope>\n"
|
471
|
paos 2018.06.05 15:01:59.373 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:37) : "ConnectionHandle"
|
472
|
paos 2018.06.05 15:01:59.373 ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "CardApplication"
|
473
|
paos 2018.06.05 15:01:59.373 ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "SlotHandle"
|
474
|
paos 2018.06.05 15:01:59.373 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:37) : "DIDName"
|
475
|
paos 2018.06.05 15:01:59.373 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:37) : "AuthenticationProtocolData"
|
476
|
paos 2018.06.05 15:01:59.373 ...parseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:80) : "Certificates"
|
477
|
paos 2018.06.05 15:01:59.373 W ...arseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:111) : Unknown element: "Certificates"
|
478
|
paos 2018.06.05 15:01:59.373 ...parseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:80) : "EphemeralPublicKey"
|
479
|
paos 2018.06.05 15:01:59.373 ...parseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:80) : "Signature"
|
480
|
network 2018.06.05 15:01:59.373 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DID_AUTHENTICATE_EAC2
|
481
|
statema... 2018.06.05 15:01:59.373 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendDIDAuthenticateResponseEAC1" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
482
|
statema... 2018.06.05 15:01:59.374 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateEACAdditionalInputType"
|
483
|
statema... 2018.06.05 15:01:59.374 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateEACAdditionalInputType"
|
484
|
statema... 2018.06.05 15:01:59.374 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateEACAdditionalInputType" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
485
|
statema... 2018.06.05 15:01:59.374 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateProcessCertificatesFromEac2"
|
486
|
statema... 2018.06.05 15:01:59.374 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateProcessCertificatesFromEac2"
|
487
|
card 2018.06.05 15:01:59.374 const(card/base/asn1/CVCertificateChainBuilder.cpp:85) : Get chain for authority "DECVCAeID00104"
|
488
|
card 2018.06.05 15:01:59.374 const(card/base/asn1/CVCertificateChainBuilder.cpp:96) : Found valid chain QVector(CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
|
489
|
default 2018.06.05 15:01:59.374 ...catesFromEac2::run(core/states/StateProcessCertificatesFromEac2.cpp:26) : CVC chain already determined, skip further processing
|
490
|
statema... 2018.06.05 15:01:59.374 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateProcessCertificatesFromEac2" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
491
|
statema... 2018.06.05 15:01:59.374 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateDidAuthenticateEac2"
|
492
|
statema... 2018.06.05 15:01:59.375 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateDidAuthenticateEac2"
|
493
|
card 2018.06.05 15:01:59.376 const(card/base/asn1/CVCertificateChainBuilder.cpp:85) : Get chain for authority "DECVCAeID00104"
|
494
|
card 2018.06.05 15:01:59.376 const(card/base/asn1/CVCertificateChainBuilder.cpp:96) : Found valid chain QVector(CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
|
495
|
card 2018.06.05 15:01:59.376 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:125) : Performing TA MSE:Set DST
|
496
|
card 2018.06.05 15:01:59.376 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:126) : Sending CAR "DECVCAeID00104"
|
497
|
card_pcsc 2018.06.05 15:01:59.376 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2281b62d872101821d44460aed420846fe31cf903a4c830d5099a31ae4499a0676a14f9cb6d13b8e08059ab7dfc630883a00"
|
498
|
card_pcsc 2018.06.05 15:01:59.402 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
499
|
card_pcsc 2018.06.05 15:01:59.403 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08d3dcdfd7219eeb6d9000"
|
500
|
card 2018.06.05 15:01:59.403 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:144) : Performing TA PSO:Verify Certificate
|
501
|
card 2018.06.05 15:01:59.403 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:145) : Sending certificate CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"])
|
502
|
card_pcsc 2018.06.05 15:01:59.403 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "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"
|
503
|
card_pcsc 2018.06.05 15:01:59.614 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
504
|
card_pcsc 2018.06.05 15:01:59.614 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e087b4a86db5c6f68359000"
|
505
|
card 2018.06.05 15:01:59.614 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:125) : Performing TA MSE:Set DST
|
506
|
card 2018.06.05 15:01:59.614 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:126) : Sending CAR "DEDVeIDDTR101433"
|
507
|
card_pcsc 2018.06.05 15:01:59.614 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2281b62d872101bc2f4c476a6678b3bb8141adcc7efe16c95c8a52296c8ab0c0ca6ec6a473fa618e0831c46f4d39a6216100"
|
508
|
card_pcsc 2018.06.05 15:01:59.648 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
509
|
card_pcsc 2018.06.05 15:01:59.648 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08a97b7d2f5aff3f369000"
|
510
|
card 2018.06.05 15:01:59.648 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:144) : Performing TA PSO:Verify Certificate
|
511
|
card 2018.06.05 15:01:59.648 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:145) : Sending certificate CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])
|
512
|
card_pcsc 2018.06.05 15:01:59.648 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2a00be00015f8782015101a9e336b10b5cad3a322e2fa307af20180cc2e95c1a6622f0e3f93a595253fdc2f0940059bd63aa7ae420d30f2f509b17bd139f747b4afcf0c1327dd0bbceed2e2fe1ca317bab68027245b1d2daa94cea79d4796a76bf1fdf9951b137e9d0aeaba33d8dfdd1fba1c261cf450f7fe48859ce0223e46b301d1783c637000bcdad0569ebd1366644930e3af8ef40a302fa779c79c8468077776b2bd1ecd91d3471b25c2c838b3c0c7699fefd05d1f1e17ddc2d4c1580dfff1cff29877190335c189b8d128fbc30653f409e8d0f5a47edb6a0bf7c016f41b7fa6f62cc270012d27cce907c4b3966f7485f6da59871fc806428bf3452b9a682ff9d3c990cca58a13f2c1117203b137088f797af42161eab6627cbd70f0c1ad507aaf2ba55bc25bab105e5728a174268583ca509e9f31e9f8ac131ceb0a19e9782a524117d258c82bcd27304b0f5e8836332c7947bfbf10d923a8e08eb59b87ec62979750000"
|
513
|
card_pcsc 2018.06.05 15:01:59.846 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
514
|
card_pcsc 2018.06.05 15:01:59.846 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08e69b0f536330ec439000"
|
515
|
card 2018.06.05 15:01:59.846 ...nalAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:178) : Performing TA MSE:Set AT
|
516
|
card_pcsc 2018.06.05 15:01:59.846 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2281a46d876101c4943fdfd59a3a35cbf0d6e84eaf4cc39c105c6f129cb433ee764d52fd1d5f025ccd884dfe9bc8db4b37771a6f32d10b87059c96b0ee7fd0f50a26a54256cb650d8262add3428e09ca0867e058550fa3e26b63ceaae224bc96dce48e910fb8108e08fa764cc0302b845600"
|
517
|
card_pcsc 2018.06.05 15:01:59.902 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
518
|
card_pcsc 2018.06.05 15:01:59.902 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e088cfb7540acb8dc429000"
|
519
|
card 2018.06.05 15:01:59.902 ...nalAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:194) : Performing TA External Authenticate
|
520
|
card_pcsc 2018.06.05 15:01:59.902 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c8200005d875101bca5451d03fb4a0ba3205dcdac168f4aba779ec282c11270231cb8ed04a0e2cd519ecf512b511f0d3b7d2a0a4915cea05152b1f9305e646755ffe0ba9bc1b6d5173c31108b371b0a52b6c8f1a11891e68e081d3f35fd0aa1effb00"
|
521
|
card_pcsc 2018.06.05 15:02:00.044 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
522
|
card_pcsc 2018.06.05 15:02:00.044 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0878796963fa87232f9000"
|
523
|
card 2018.06.05 15:02:00.044 ...d::internalExecute(card/base/command/DidAuthenticateEAC2Command.cpp:82) : Performing Read EF.CardSecurity
|
524
|
card_pcsc 2018.06.05 15:02:00.044 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d87110134054dfbb271b5652ac0902f10b4910b8e086fa14c533fd958db00"
|
525
|
card_pcsc 2018.06.05 15:02:00.072 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
526
|
card_pcsc 2018.06.05 15:02:00.072 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0872edc7ff474681ae9000"
|
527
|
card_pcsc 2018.06.05 15:02:00.072 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb000000d9701ff8e08ef09526d399ae4d400"
|
528
|
card_pcsc 2018.06.05 15:02:00.101 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
529
|
card_pcsc 2018.06.05 15:02:00.101 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e101165491c5acaeb8494246be8e79cc143ed120b8f9e84ee8608fa21c717dd1effd37d9ae8e31fbd26f739133c0a433279469feded02d6a908c15472191f7c386e04ad444f33761dd0231c0b09a576ed03563aa9b4ecbf27c169b3a5998a98bfbda1b92a7eb93778fe43e8f27f7ca3ad3e17ef6548e3703a8812a6a8cac522dbe6704c9a0bffb49323afcbf25571e6170767752cd8126a029cd771c152d34c2dc6fafa4a2d35dd2a56a0bdbd8dd229a088958dcc55a2317978dc20d505510f65c06bf21c448dbb811de092661e9ad2f8df7b6926271f9190c084daf6aecde6ac208990290008e081511c2084cfb8f0f9000"
|
530
|
card_pcsc 2018.06.05 15:02:00.101 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb000df0d9701ff8e081e6dcd8de57d895700"
|
531
|
card_pcsc 2018.06.05 15:02:00.130 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
532
|
card_pcsc 2018.06.05 15:02:00.130 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e10110fb41abe5e63765358e8e9e5ea0d6f4c77cd3ace92e17f320a4a94c5715e47b279a3259fd49f311d91d3b0e7dd9be857b6199e9460530e0b035b80b2c6c737f89380defca7f7460977c908a18d6ef6e1bd3f65d6d629baf87200d2709e24c783266dc46e634d143e159a9d772723d1be2a52040c2fc67ff6578e9f11064c22735ab3bd05a5bb6d9e1fe9bd9a9a04398bf35d034dbe93850fce1895ec7b1a1bc87ebea98dc313fbd01f517fca72836788e0a4bd89ea3a22a1332c5fa51cfbc22b4d6c6a2877239827baf2136ba383be9511c759b573856a99b13365c8dea9d3d990290008e08acec4082437ff27f9000"
|
533
|
card_pcsc 2018.06.05 15:02:00.130 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb001be0d9701ff8e08b0df66e289acbf7500"
|
534
|
card_pcsc 2018.06.05 15:02:00.158 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
535
|
card_pcsc 2018.06.05 15:02:00.159 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e101e60d61931eeac56ed089d25ebb9f12affe96f57525920522c15cf5c31e3e987df5d414a53e69017171b7c9c3363111390109825a1b20540ea48c960e17363a4cab1ba5f2594c7d31073522ddbe851a4bcf95c008b4d84f48b43dc79e3a81a3e1efb6b2283c6616baa74eb57a95358e3e212d1140b78ba4cfa5aa77ed72df4857df92242be45da6659939d6e1dcf10762c3789c23569d8002ec4da2eea4db52d1599c23d3766044865908d6a26b0835fa3e2106e619d1c5f02b38be0dc4a919da988939f7a2d6303293cdffa8c1e325d43b6277ed2dfed97f3292268f97387c0a990290008e08fdf1bd01744c95a39000"
|
536
|
card_pcsc 2018.06.05 15:02:00.159 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0029d0d9701ff8e08309cb52fef854fc100"
|
537
|
card_pcsc 2018.06.05 15:02:00.187 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
538
|
card_pcsc 2018.06.05 15:02:00.187 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e10140e47f3b7bdf3b98e2aea9d94debaa1c9ea516668dd68d7ba44007a182c7f83aa47be2b1b92037db537f8ad3e561644b9722769daf7b53d98d018d4c37ced88221a364f2498bc7cfc59afc53b36b9611a2a5c35f9cef9db8236b1c054db52803c186029578463fbcf9eeae4d8d4c351b6470de8aaef7d25d0f95d3809294134f4bea402e01818e6d7f90f60647dcdfcfc2146272fdac3ffd047624feff6bfceee542289922c8670b7f7839d2f985bb3731dce3c4f7910b3ae991727351442bb3042b0e042a503de923c3deea094d1f7f12fb1dfd57c4d0c4a6189eb9bbd5e0a3990290008e08fa031495e4ec9b349000"
|
539
|
card_pcsc 2018.06.05 15:02:00.188 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0037c0d9701ff8e08379e96732296be1100"
|
540
|
card_pcsc 2018.06.05 15:02:00.216 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
541
|
card_pcsc 2018.06.05 15:02:00.217 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e101de51a6ddb0cd0d6e348d3eb57179fd9938fb7e376fad460b5f290fa1d2831c69ffe3185409b824dc37d5e211add634361a40d51177e48c64f0b856403657163a33880a83a06088f28d67c6f97ac04b89bdfc3cffcaf65ffddbd4bb9c2f657455cb8a8df88fa96ac8121d2680dce5548fd701aceb963744e9bf013280aec3e43f45a7eb5a77303d8959bac7297dfbbbac8f0a43d5691df2fe89f72d27af3a053e48c2d2d1c5bc20bd06994cfbdc3e50ae49834ce4f89724e56cf18d12a28cda8538177e3471aab03e3d0e025e9d828a654d41ab85d848da2cdf6735553c8372cd990290008e088330e1b4f628e1429000"
|
542
|
card_pcsc 2018.06.05 15:02:00.217 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0045b0d9701ff8e086407fa9eba70b93f00"
|
543
|
card_pcsc 2018.06.05 15:02:00.245 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
544
|
card_pcsc 2018.06.05 15:02:00.246 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e101adc90921449477dd1945548c0265c26b432a928299025a615c1eae53be1c9023759299ef76e02bed2338d06e34e78075d94bf2b3bc8c7c3ab87087d782c79321d081f337252333e65f932e21a3fa1b2ec1ed0ea0d9fdbb908226cc62c7e48036ad656c0171cb860ce217ede5f74d5eec2b8104b24f35f591715e587b24b632abb9a556edf1ebf8f9e4dca16d71bf3a4a2f2848f67cb4730101a2c6ccb37e9fa5b52184ae578306542bf2e940dfed2ea6a96096111fa2c523401acee84c18d0d91f5143da5226fc351693c8c8e2d2503759a46a37a62cb71c4ef259734c89619f990290008e080796f357aa9cb8cc9000"
|
545
|
card_pcsc 2018.06.05 15:02:00.246 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0053a0d9701ff8e08dde51808a3670a1500"
|
546
|
card_pcsc 2018.06.05 15:02:00.274 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
547
|
card_pcsc 2018.06.05 15:02:00.274 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e101d2e7172b0d435f2c7204e160009772db5e837181737bb5d2c9e95d47921c28e69ae4387cac592a624e64b6d4f04b01bf4fc1d988f0e64f66d505e64816a17dd05d30d8d1bc60de8ad9b730a03c1297d1d462a62e64ea9bf0d5bc6c188ddb9bec3743cbdc74c8c942189596a87e45130dc4a9b3990e691d23e125eddc42d4ce541e07ff4b7d442e3f80c65229287aceb79a26fc6bc23ad3430070ef33097704f6cefb9b8150c087117dc4cdbe7ef934483b157e96c705372cd5703abf18e3ec00377474b10141572da950960e54f676effdad6a8cd4489ccfc3ec73193468666d990290008e08cab6aa0cada662719000"
|
548
|
card_pcsc 2018.06.05 15:02:00.275 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb006190d9701ff8e0871942f6ed7231e9000"
|
549
|
card_pcsc 2018.06.05 15:02:00.300 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
550
|
card_pcsc 2018.06.05 15:02:00.301 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "87818101a271645a7a6d28d965a3f2a585f58b06e402f60d8c7cbce728016d0c97cc8fcf6828dcd99324ccd9a154ec850d1a08f9a1494831e1fd36e3b8ff0304eca67cec5d5ec27478613e2726a013264c915833ef26c6f19bc38c1ac28d4d8c922e6cdc0c0902e0e14fe76eb54bfd0effd9fb4fccd573c10736ee402a3df44b1788c225990262828e080474d697fd1dc4056282"
|
551
|
card 2018.06.05 15:02:00.301 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.2"
|
552
|
card 2018.06.05 15:02:00.301 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:67) : Parsed ChipAuthenticationInfo
|
553
|
card 2018.06.05 15:02:00.301 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:61) : Parsed PACEInfo
|
554
|
card 2018.06.05 15:02:00.301 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.5.2.3"
|
555
|
card 2018.06.05 15:02:00.302 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.5.2.3"
|
556
|
card 2018.06.05 15:02:00.302 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.5.2"
|
557
|
card 2018.06.05 15:02:00.302 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.3.2"
|
558
|
card 2018.06.05 15:02:00.302 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.6"
|
559
|
card 2018.06.05 15:02:00.302 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.1.2"
|
560
|
card 2018.06.05 15:02:00.302 ...::internalExecute(card/base/command/DidAuthenticateEAC2Command.cpp:106) : Chose ChipAuthenticationInfo(0): protocol "0.4.0.127.0.7.2.2.3.2.2" , keyId "48"
|
561
|
card 2018.06.05 15:02:00.303 ...hipAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:221) : Performing CA MSE:Set AT
|
562
|
card_pcsc 2018.06.05 15:02:00.303 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2241a41d871101a775e9c5405037634e666ec9329e57948e089a24ee99bb1e783c00"
|
563
|
card_pcsc 2018.06.05 15:02:00.337 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
564
|
card_pcsc 2018.06.05 15:02:00.337 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0880c12d79ead8016a9000"
|
565
|
card 2018.06.05 15:02:00.337 ...hipAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:237) : Performing CA General Authenticate
|
566
|
card_pcsc 2018.06.05 15:02:00.337 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c8600006087510101672efbf421984de4f073339211bc7347be4845d2469697a33189bfc7671b2158130d199bb5fe1393d7379dabf9fe712fec93e8f8d0da138f586fac40a59bbecb823da11936b278a6db000cce6347539701008e08bd338166daafec1b00"
|
567
|
card_pcsc 2018.06.05 15:02:00.471 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
568
|
card_pcsc 2018.06.05 15:02:00.471 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "87210131a71a3fd9fc92e16254f31369fea90f61f3a83ac83cff4c6b877bf6078fbd95990290008e0821b4e07ef7861a309000"
|
569
|
card 2018.06.05 15:02:00.471 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK
|
570
|
statema... 2018.06.05 15:02:00.472 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateDidAuthenticateEac2" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
571
|
statema... 2018.06.05 15:02:00.472 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendDIDAuthenticateResponseEAC2"
|
572
|
statema... 2018.06.05 15:02:00.472 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendDIDAuthenticateResponseEAC2"
|
573
|
network 2018.06.05 15:02:00.473 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data:
|
574
|
"<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n <paos:EndpointReference>\n <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n <paos:MetaData>\n <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n </paos:MetaData>\n </paos:EndpointReference>\n </paos:PAOS>\n <wsa:ReplyTo>\n <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n </wsa:ReplyTo>\n <wsa:MessageID>urn:uuid:af87b6f7-9684-4772-90ec-2c286bce75c4</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n <DIDAuthenticateResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n </Result>\n <AuthenticationProtocolData Protocol=\"urn:oid:1.3.162.15480.3.0.14.2\" xsi:type=\"iso:EAC2OutputType\">\n <EFCardSecurity>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</EFCardSecurity>\n <AuthenticationToken>7b8e96d3560b48b2</AuthenticationToken>\n <Nonce>3ce84d651c5b35cc</Nonce>\n </AuthenticationProtocolData>\n </DIDAuthenticateResponse>\n </soap:Body>\n</soap:Envelope>\n"
|
575
|
network 2018.06.05 15:02:00.473 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
|
576
|
network 2018.06.05 15:02:00.473 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
577
|
network 2018.06.05 15:02:00.639 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
|
578
|
network 2018.06.05 15:02:00.640 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
|
579
|
network 2018.06.05 15:02:00.640 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
|
580
|
network 2018.06.05 15:02:00.640 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
|
581
|
network 2018.06.05 15:02:00.640 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:02:00 GMT"
|
582
|
network 2018.06.05 15:02:00.640 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
|
583
|
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n <soap:Header>\n <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id980\" refToMessageID=\"cbd5ac4bf2b50fb720032320c0b7b59290646fa\"/>\n </soap:Header>\n <soap:Body>\n <Transmit xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<SlotHandle>00</SlotHandle>\n<InputAPDUInfo>\n<InputAPDU>0CA4040C1D8711018EDC7870E963ACDE19EA91F6B537B22B8E085A8F0B05CBA14A4100</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>8C2080001D871101F08651936CD32CCD9FC06D9FEAA29E638E08305444AF21184F2500</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0C2241A41D871101C1F92B4D150913FCF75221195784FF758E08777E4438FE2F07C400</InputAPDU>\n<AcceptableStatusCode>9000</AcceptableStatusCode>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<Input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nputAPDU>\n<AcceptableStatusCode>9000</AcceptableStatusCode>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0C2241A41D871101974CA0410BCBBEB717BB73460B90963D8E088DC871EDD8196B8400</InputAPDU>\n<AcceptableStatusCode>9000</AcceptableStatusCode>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<Input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nputAPDU>\n<AcceptableStatusCode>9000</AcceptableStatusCode>\n</InputAPDUInfo>\n</Transmit>\n</soap:Body>\n</soap:Envelope>\n"
|
584
|
paos 2018.06.05 15:02:00.640 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "SlotHandle"
|
585
|
paos 2018.06.05 15:02:00.640 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
586
|
paos 2018.06.05 15:02:00.640 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
587
|
paos 2018.06.05 15:02:00.641 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
588
|
paos 2018.06.05 15:02:00.641 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
589
|
paos 2018.06.05 15:02:00.641 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
590
|
paos 2018.06.05 15:02:00.641 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
591
|
paos 2018.06.05 15:02:00.641 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode"
|
592
|
paos 2018.06.05 15:02:00.641 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
593
|
paos 2018.06.05 15:02:00.641 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
594
|
paos 2018.06.05 15:02:00.641 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode"
|
595
|
paos 2018.06.05 15:02:00.641 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
596
|
paos 2018.06.05 15:02:00.641 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
597
|
paos 2018.06.05 15:02:00.641 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode"
|
598
|
paos 2018.06.05 15:02:00.641 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
599
|
paos 2018.06.05 15:02:00.641 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
600
|
paos 2018.06.05 15:02:00.641 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode"
|
601
|
network 2018.06.05 15:02:00.641 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: TRANSMIT
|
602
|
statema... 2018.06.05 15:02:00.642 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendDIDAuthenticateResponseEAC2" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
603
|
statema... 2018.06.05 15:02:00.642 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateTransmit"
|
604
|
statema... 2018.06.05 15:02:00.642 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateTransmit"
|
605
|
card_pcsc 2018.06.05 15:02:00.643 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4040c1d8711018edc7870e963acde19ea91f6b537b22b8e085a8f0b05cba14a4100"
|
606
|
card_pcsc 2018.06.05 15:02:00.668 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
607
|
card_pcsc 2018.06.05 15:02:00.668 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08cc6ee400ecd650029000"
|
608
|
card_pcsc 2018.06.05 15:02:00.668 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "8c2080001d871101f08651936cd32ccd9fc06d9feaa29e638e08305444af21184f2500"
|
609
|
card_pcsc 2018.06.05 15:02:00.693 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
610
|
card_pcsc 2018.06.05 15:02:00.693 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08d582c9464ed02c4e9000"
|
611
|
card_pcsc 2018.06.05 15:02:00.693 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2241a41d871101c1f92b4d150913fcf75221195784ff758e08777e4438fe2f07c400"
|
612
|
card_pcsc 2018.06.05 15:02:00.744 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
613
|
card_pcsc 2018.06.05 15:02:00.745 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0832e5258df69b0fa69000"
|
614
|
card_pcsc 2018.06.05 15:02:00.745 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c8600000001428782013101eb9dc4b7a547ccbebdf48e4993efca48e00fbc00d37f18c1d81dedae2d37b1e596c7903d98e8f80b3092cd6389ae58eac5804bce5db01fd4fb74131e6b3a4df64ef981d9a3528b7ea0ac2d20531dff3ecd4d6024f43d4556927970755c876da5a5454efd546b4905c5cc77fddb01b6a28d1288cc644a9dd108b17a2428256ed139a6f4cf87766b866d20b7fb6cb257988aff4d7e454dac36ee474caf14005f1f9df4682b6f8d9225b72dc78e4893e2f2e649ae34b7b24011fb3a23b289ef6f1c7df8bae258f032e353d8ffe0a0ab9d744b2b49a116530e47d748a588a2da05090dc145d160190e5ba4ea697770910a44b372ff039fa7b6c9d940cdd46f8a6eaee5d245383c32a460a9be56a7838a64dba1579e4c0f10f2084b73b79a23566c72cdd4860135fd6947ac50146a9f478c2b9701248e085d3d0d3efa9201880000"
|
615
|
card_pcsc 2018.06.05 15:02:00.888 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
616
|
card_pcsc 2018.06.05 15:02:00.888 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "873101c5fd58c62bbeae8a9e73280ea8755b902245bb62012bd81576ade95668c8e174d8687c3e849ce7a7f241d80fd3b62d49990290008e083ebf660fd38889799000"
|
617
|
card_pcsc 2018.06.05 15:02:00.888 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2241a41d871101974ca0410bcbbeb717bb73460b90963d8e088dc871edd8196b8400"
|
618
|
card_pcsc 2018.06.05 15:02:00.941 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
619
|
card_pcsc 2018.06.05 15:02:00.941 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08cefb066f2b6941b29000"
|
620
|
card_pcsc 2018.06.05 15:02:00.941 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c8600000001428782013101b10c04955502228e50231d225fa8964f42d3d54493d7221f63cf8c1e8d76b541fea774b4dd8f22ab81acb2fdc0f451fafdb544440289deb23087441aec85ba3a5dea15148c849df7e78313b6d64e989a16e90652cb887e5bee2d5456bac6d1d4f3427f6b21cd392f9b5fbf03af22559c8d1b8adb557070cf749de28cc1dd0ddfc1c11f1e573dfd5f378dfd5d6183fcb3d74288fdff20a8384f7413d5d92024c3fec36c6f38ca1319adea0258b5b5af16723fd893651dbf6bcfc123823cd53c02851cedb1cf2017cff52333ede71197e7228fbfdc390966687d62b45bed833a43194c5063e5b0133c6a4e07bf85c44d7e0b6904181de82f428dea034c6985e1602a6d3f2fa44362dbc7e10fd7b6b2d0441b7a5c0f57182191f023a38eabc595bc6d3c8125d968233983c4e4eea6a7be929701248e08aa48e8ee7e4330060000"
|
621
|
card_pcsc 2018.06.05 15:02:01.085 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
622
|
card_pcsc 2018.06.05 15:02:01.085 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "873101e5973bcc6c94404ddc2fc272b707428288f2c648fe7a4c9f4a9f76773c8fd20f1b5795eb0df98441dbb03f49233a5a85990290008e082af7db87b8794de49000"
|
623
|
card 2018.06.05 15:02:01.085 TransmitCommand::internalExecute(card/base/command/TransmitCommand.cpp:74) : transmit end
|
624
|
card 2018.06.05 15:02:01.085 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK
|
625
|
statema... 2018.06.05 15:02:01.085 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateTransmit" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
626
|
statema... 2018.06.05 15:02:01.085 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendTransmitResponse"
|
627
|
statema... 2018.06.05 15:02:01.085 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendTransmitResponse"
|
628
|
network 2018.06.05 15:02:01.086 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data:
|
629
|
"<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n <paos:EndpointReference>\n <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n <paos:MetaData>\n <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n </paos:MetaData>\n </paos:EndpointReference>\n </paos:PAOS>\n <wsa:ReplyTo>\n <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n </wsa:ReplyTo>\n <wsa:MessageID>urn:uuid:9aecd72b-7e4f-4bbe-92aa-a4ca3ead28af</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n <TransmitResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n </Result>\n <OutputAPDU>990290008e08cc6ee400ecd650029000</OutputAPDU>\n <OutputAPDU>990290008e08d582c9464ed02c4e9000</OutputAPDU>\n <OutputAPDU>990290008e0832e5258df69b0fa69000</OutputAPDU>\n <OutputAPDU>873101c5fd58c62bbeae8a9e73280ea8755b902245bb62012bd81576ade95668c8e174d8687c3e849ce7a7f241d80fd3b62d49990290008e083ebf660fd38889799000</OutputAPDU>\n <OutputAPDU>990290008e08cefb066f2b6941b29000</OutputAPDU>\n <OutputAPDU>873101e5973bcc6c94404ddc2fc272b707428288f2c648fe7a4c9f4a9f76773c8fd20f1b5795eb0df98441dbb03f49233a5a85990290008e082af7db87b8794de49000</OutputAPDU>\n </TransmitResponse>\n </soap:Body>\n</soap:Envelope>\n"
|
630
|
network 2018.06.05 15:02:01.086 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
|
631
|
network 2018.06.05 15:02:01.086 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
632
|
network 2018.06.05 15:02:01.175 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
|
633
|
network 2018.06.05 15:02:01.175 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
|
634
|
network 2018.06.05 15:02:01.175 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
|
635
|
network 2018.06.05 15:02:01.175 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
|
636
|
network 2018.06.05 15:02:01.175 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:02:00 GMT"
|
637
|
network 2018.06.05 15:02:01.175 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
|
638
|
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n <soap:Header>\n <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id981\" refToMessageID=\"cbd5ac4bf2b50fb720032320c0b7b59290646fa\"/>\n </soap:Header>\n <soap:Body>\n <Transmit xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<SlotHandle>00</SlotHandle>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101CEA20EFDDB4183852841775F53D972B38E089BFA8F920540484100</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08EE714CBF7208A5F20000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101A7C333E97A9D7C7C8665E61A99E4A76A8E084B2A8ACCAA037CC800</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08705311EC633A41D80000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101B67186FDBA9B07A66BBAE9019931E61E8E08D35E694D6019F7C800</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E082966825BDF92C49E0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D8711013A076D986463BC211CFDDEB9E77675708E0847000562C8DE55AF00</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E084C9FE7D09D14CF350000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101D3FD24962708F561705FA8DCD2C9FAC58E08F56B25EB93DE652600</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E0850F74B32FE0BA5EE0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101A4D5E1F5BFDE2D3A0E1E26B13C3BBAF08E087B14DA1B19D2A73C00</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E0827B823C584AAFB0E0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D87110164781FD5CAF72BC1C5343C4E64EF11A88E089EDA9EF500680A8A00</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08ADA0D07C243043A80000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101314E365996BBD9EC98E9E5C164C22C088E082FADF94E068550A800</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E089900D78637D0FDFF0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D8711014EC8D4F5A77B2AD20F46F45617ACB0C88E08E9D5D6C134C4432000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E085D8A034FD8B57F3F0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101CD72782FFABE8BBC5420449C60D62B848E08EA41FB155EC2B14700</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08DFEFACBF137CA4F40000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101D5A12B7FAAFAA634B3F6D7F7E315ABBC8E08F7546E644B93DADF00</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08562160CEE15BE9BE0000</InputAPDU>\n</InputAPDUInfo>\n</Transmit>\n</soap:Body>\n</soap:Envelope>\n"
|
639
|
paos 2018.06.05 15:02:01.176 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "SlotHandle"
|
640
|
paos 2018.06.05 15:02:01.176 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
641
|
paos 2018.06.05 15:02:01.176 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
642
|
paos 2018.06.05 15:02:01.176 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
643
|
paos 2018.06.05 15:02:01.176 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
644
|
paos 2018.06.05 15:02:01.176 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
645
|
paos 2018.06.05 15:02:01.176 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
646
|
paos 2018.06.05 15:02:01.176 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
647
|
paos 2018.06.05 15:02:01.176 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
648
|
paos 2018.06.05 15:02:01.176 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
649
|
paos 2018.06.05 15:02:01.176 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
650
|
paos 2018.06.05 15:02:01.176 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
651
|
paos 2018.06.05 15:02:01.176 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
652
|
paos 2018.06.05 15:02:01.177 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
653
|
paos 2018.06.05 15:02:01.177 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
654
|
paos 2018.06.05 15:02:01.177 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
655
|
paos 2018.06.05 15:02:01.177 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
656
|
paos 2018.06.05 15:02:01.177 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
657
|
paos 2018.06.05 15:02:01.177 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
658
|
paos 2018.06.05 15:02:01.177 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
659
|
paos 2018.06.05 15:02:01.177 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
660
|
paos 2018.06.05 15:02:01.177 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
661
|
paos 2018.06.05 15:02:01.177 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
662
|
paos 2018.06.05 15:02:01.177 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
663
|
paos 2018.06.05 15:02:01.177 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
664
|
paos 2018.06.05 15:02:01.177 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
665
|
paos 2018.06.05 15:02:01.177 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
666
|
paos 2018.06.05 15:02:01.177 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
667
|
paos 2018.06.05 15:02:01.177 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
668
|
paos 2018.06.05 15:02:01.178 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
669
|
paos 2018.06.05 15:02:01.178 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
670
|
paos 2018.06.05 15:02:01.178 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
671
|
paos 2018.06.05 15:02:01.178 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
672
|
paos 2018.06.05 15:02:01.178 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
673
|
paos 2018.06.05 15:02:01.178 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
674
|
paos 2018.06.05 15:02:01.178 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
675
|
paos 2018.06.05 15:02:01.178 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
676
|
paos 2018.06.05 15:02:01.178 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
677
|
paos 2018.06.05 15:02:01.178 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
678
|
paos 2018.06.05 15:02:01.178 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
679
|
paos 2018.06.05 15:02:01.178 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
680
|
paos 2018.06.05 15:02:01.178 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
681
|
paos 2018.06.05 15:02:01.178 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
682
|
paos 2018.06.05 15:02:01.178 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
683
|
paos 2018.06.05 15:02:01.178 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
684
|
network 2018.06.05 15:02:01.179 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: TRANSMIT
|
685
|
statema... 2018.06.05 15:02:01.179 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendTransmitResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
686
|
statema... 2018.06.05 15:02:01.179 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateTransmit"
|
687
|
statema... 2018.06.05 15:02:01.179 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateTransmit"
|
688
|
card_pcsc 2018.06.05 15:02:01.179 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101cea20efddb4183852841775f53d972b38e089bfa8f920540484100"
|
689
|
card_pcsc 2018.06.05 15:02:01.208 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
690
|
card_pcsc 2018.06.05 15:02:01.208 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08c65e297951cdcc7a9000"
|
691
|
card_pcsc 2018.06.05 15:02:01.208 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08ee714cbf7208a5f20000"
|
692
|
card_pcsc 2018.06.05 15:02:01.232 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
693
|
card_pcsc 2018.06.05 15:02:01.232 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8711016fe8e25d6eb6fcbe15d870ddbd1ee1b5990290008e0883d0f9c2a5b681e19000"
|
694
|
card_pcsc 2018.06.05 15:02:01.233 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101a7c333e97a9d7c7c8665e61a99e4a76a8e084b2a8accaa037cc800"
|
695
|
card_pcsc 2018.06.05 15:02:01.257 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
696
|
card_pcsc 2018.06.05 15:02:01.257 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e082278a2ad6b1020709000"
|
697
|
card_pcsc 2018.06.05 15:02:01.258 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08705311ec633a41d80000"
|
698
|
card_pcsc 2018.06.05 15:02:01.281 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
699
|
card_pcsc 2018.06.05 15:02:01.281 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8711013acf0837c4c8bf55a743c126e6f13828990290008e089c63c4642f98fc6a9000"
|
700
|
card_pcsc 2018.06.05 15:02:01.282 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101b67186fdba9b07a66bbae9019931e61e8e08d35e694d6019f7c800"
|
701
|
card_pcsc 2018.06.05 15:02:01.311 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
702
|
card_pcsc 2018.06.05 15:02:01.311 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e086123fc3f15b9e0759000"
|
703
|
card_pcsc 2018.06.05 15:02:01.311 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e082966825bdf92c49e0000"
|
704
|
card_pcsc 2018.06.05 15:02:01.335 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
705
|
card_pcsc 2018.06.05 15:02:01.336 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8721017c3ab20962756105b4d7c14e65b43f88bda6cbd85e0b2be3ae3157908e58e315990290008e085e585835bb14efed9000"
|
706
|
card_pcsc 2018.06.05 15:02:01.336 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d8711013a076d986463bc211cfddeb9e77675708e0847000562c8de55af00"
|
707
|
card_pcsc 2018.06.05 15:02:01.360 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
708
|
card_pcsc 2018.06.05 15:02:01.360 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0807bfa2846b414fed9000"
|
709
|
card_pcsc 2018.06.05 15:02:01.361 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e084c9fe7d09d14cf350000"
|
710
|
card_pcsc 2018.06.05 15:02:01.385 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
711
|
card_pcsc 2018.06.05 15:02:01.385 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "871101e1d8c2589c29fc9b027fa704e7867f16990290008e08198ee16589d8824d9000"
|
712
|
card_pcsc 2018.06.05 15:02:01.385 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101d3fd24962708f561705fa8dcd2c9fac58e08f56b25eb93de652600"
|
713
|
card_pcsc 2018.06.05 15:02:01.414 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
714
|
card_pcsc 2018.06.05 15:02:01.414 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0860b0ae4ef7768e1a9000"
|
715
|
card_pcsc 2018.06.05 15:02:01.415 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e0850f74b32fe0ba5ee0000"
|
716
|
card_pcsc 2018.06.05 15:02:01.439 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
717
|
card_pcsc 2018.06.05 15:02:01.439 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8711011f0b9ccf6cc950fcbd6b1f663881132b990290008e08772545cdd99fd1dd9000"
|
718
|
card_pcsc 2018.06.05 15:02:01.439 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101a4d5e1f5bfde2d3a0e1e26b13c3bbaf08e087b14da1b19d2a73c00"
|
719
|
card_pcsc 2018.06.05 15:02:01.464 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
720
|
card_pcsc 2018.06.05 15:02:01.464 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0855ec2916594692389000"
|
721
|
card_pcsc 2018.06.05 15:02:01.464 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e0827b823c584aafb0e0000"
|
722
|
card_pcsc 2018.06.05 15:02:01.489 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
723
|
card_pcsc 2018.06.05 15:02:01.489 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "871101c7660039d3d4d7bb07577545658d73de990290008e080127efba355568139000"
|
724
|
card_pcsc 2018.06.05 15:02:01.489 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d87110164781fd5caf72bc1c5343c4e64ef11a88e089eda9ef500680a8a00"
|
725
|
card_pcsc 2018.06.05 15:02:01.518 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
726
|
card_pcsc 2018.06.05 15:02:01.518 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e083bd7e9e733fa4f269000"
|
727
|
card_pcsc 2018.06.05 15:02:01.518 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08ada0d07c243043a80000"
|
728
|
card_pcsc 2018.06.05 15:02:01.542 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
729
|
card_pcsc 2018.06.05 15:02:01.542 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8711012980af56659c4e903cf49eedbfb1d9ff990290008e08760d05cc1ce6acbd9000"
|
730
|
card_pcsc 2018.06.05 15:02:01.543 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101314e365996bbd9ec98e9e5c164c22c088e082fadf94e068550a800"
|
731
|
card_pcsc 2018.06.05 15:02:01.568 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
732
|
card_pcsc 2018.06.05 15:02:01.568 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08f0a5d0ce2fbc5e8f9000"
|
733
|
card_pcsc 2018.06.05 15:02:01.568 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e089900d78637d0fdff0000"
|
734
|
card_pcsc 2018.06.05 15:02:01.593 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
735
|
card_pcsc 2018.06.05 15:02:01.593 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "872101a5e512f7f3a83a01436258ae5d9d4a5abe6e6e3a068079584c7cd110a96d7b57990290008e080ca24a9586397eb99000"
|
736
|
card_pcsc 2018.06.05 15:02:01.593 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d8711014ec8d4f5a77b2ad20f46f45617acb0c88e08e9d5d6c134c4432000"
|
737
|
card_pcsc 2018.06.05 15:02:01.611 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
738
|
card_pcsc 2018.06.05 15:02:01.611 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "99026a828e08890a19675db479316a82"
|
739
|
card_pcsc 2018.06.05 15:02:01.611 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e085d8a034fd8b57f3f0000"
|
740
|
card_pcsc 2018.06.05 15:02:01.636 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
741
|
card_pcsc 2018.06.05 15:02:01.637 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8721019c6a1cde9450687fdada4b136e68880abfbe2a6e7154a649774916da94b3a160990290008e089630d1e3905bfd249000"
|
742
|
card_pcsc 2018.06.05 15:02:01.637 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101cd72782ffabe8bbc5420449c60d62b848e08ea41fb155ec2b14700"
|
743
|
card_pcsc 2018.06.05 15:02:01.668 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
744
|
card_pcsc 2018.06.05 15:02:01.668 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08623dc1f5adee33069000"
|
745
|
card_pcsc 2018.06.05 15:02:01.668 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08dfefacbf137ca4f40000"
|
746
|
card_pcsc 2018.06.05 15:02:01.696 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
747
|
card_pcsc 2018.06.05 15:02:01.696 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8741017c82efcb7e6edc741208c116bdef3ce9dda1360eaebcfc84abaf7ad717603af2ed5d76a5842a4da1a45ce59e530832de61be3a269adcc1966143f054d42d25df990290008e08eb72599421eb049d9000"
|
748
|
card_pcsc 2018.06.05 15:02:01.696 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101d5a12b7faafaa634b3f6d7f7e315abbc8e08f7546e644b93dadf00"
|
749
|
card_pcsc 2018.06.05 15:02:01.714 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
750
|
card_pcsc 2018.06.05 15:02:01.714 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "99026a828e081325a83115f9dc766a82"
|
751
|
card_pcsc 2018.06.05 15:02:01.714 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08562160cee15be9be0000"
|
752
|
card_pcsc 2018.06.05 15:02:01.742 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
753
|
card_pcsc 2018.06.05 15:02:01.742 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "87410134c2bf3d0d27ff6ebdaf88820bb367c8045b7b1e2f315d5186b8f94efcd2319a65bf75ad10f6ebb5bb5d648666039cc64717cd198d7f58f4386bfac681266019990290008e08df189c96a643ee2b9000"
|
754
|
card 2018.06.05 15:02:01.743 TransmitCommand::internalExecute(card/base/command/TransmitCommand.cpp:74) : transmit end
|
755
|
card 2018.06.05 15:02:01.743 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK
|
756
|
statema... 2018.06.05 15:02:01.743 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateTransmit" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
757
|
statema... 2018.06.05 15:02:01.743 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendTransmitResponse"
|
758
|
statema... 2018.06.05 15:02:01.743 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendTransmitResponse"
|
759
|
network 2018.06.05 15:02:01.744 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data:
|
760
|
"<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n <paos:EndpointReference>\n <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n <paos:MetaData>\n <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n </paos:MetaData>\n </paos:EndpointReference>\n </paos:PAOS>\n <wsa:ReplyTo>\n <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n </wsa:ReplyTo>\n <wsa:MessageID>urn:uuid:b9e9bba8-d11d-4993-b626-1175be000339</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n <TransmitResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n </Result>\n <OutputAPDU>990290008e08c65e297951cdcc7a9000</OutputAPDU>\n <OutputAPDU>8711016fe8e25d6eb6fcbe15d870ddbd1ee1b5990290008e0883d0f9c2a5b681e19000</OutputAPDU>\n <OutputAPDU>990290008e082278a2ad6b1020709000</OutputAPDU>\n <OutputAPDU>8711013acf0837c4c8bf55a743c126e6f13828990290008e089c63c4642f98fc6a9000</OutputAPDU>\n <OutputAPDU>990290008e086123fc3f15b9e0759000</OutputAPDU>\n <OutputAPDU>8721017c3ab20962756105b4d7c14e65b43f88bda6cbd85e0b2be3ae3157908e58e315990290008e085e585835bb14efed9000</OutputAPDU>\n <OutputAPDU>990290008e0807bfa2846b414fed9000</OutputAPDU>\n <OutputAPDU>871101e1d8c2589c29fc9b027fa704e7867f16990290008e08198ee16589d8824d9000</OutputAPDU>\n <OutputAPDU>990290008e0860b0ae4ef7768e1a9000</OutputAPDU>\n <OutputAPDU>8711011f0b9ccf6cc950fcbd6b1f663881132b990290008e08772545cdd99fd1dd9000</OutputAPDU>\n <OutputAPDU>990290008e0855ec2916594692389000</OutputAPDU>\n <OutputAPDU>871101c7660039d3d4d7bb07577545658d73de990290008e080127efba355568139000</OutputAPDU>\n <OutputAPDU>990290008e083bd7e9e733fa4f269000</OutputAPDU>\n <OutputAPDU>8711012980af56659c4e903cf49eedbfb1d9ff990290008e08760d05cc1ce6acbd9000</OutputAPDU>\n <OutputAPDU>990290008e08f0a5d0ce2fbc5e8f9000</OutputAPDU>\n <OutputAPDU>872101a5e512f7f3a83a01436258ae5d9d4a5abe6e6e3a068079584c7cd110a96d7b57990290008e080ca24a9586397eb99000</OutputAPDU>\n <OutputAPDU>99026a828e08890a19675db479316a82</OutputAPDU>\n <OutputAPDU>8721019c6a1cde9450687fdada4b136e68880abfbe2a6e7154a649774916da94b3a160990290008e089630d1e3905bfd249000</OutputAPDU>\n <OutputAPDU>990290008e08623dc1f5adee33069000</OutputAPDU>\n <OutputAPDU>8741017c82efcb7e6edc741208c116bdef3ce9dda1360eaebcfc84abaf7ad717603af2ed5d76a5842a4da1a45ce59e530832de61be3a269adcc1966143f054d42d25df990290008e08eb72599421eb049d9000</OutputAPDU>\n <OutputAPDU>99026a828e081325a83115f9dc766a82</OutputAPDU>\n <OutputAPDU>87410134c2bf3d0d27ff6ebdaf88820bb367c8045b7b1e2f315d5186b8f94efcd2319a65bf75ad10f6ebb5bb5d648666039cc64717cd198d7f58f4386bfac681266019990290008e08df189c96a643ee2b9000</OutputAPDU>\n </TransmitResponse>\n </soap:Body>\n</soap:Envelope>\n"
|
761
|
network 2018.06.05 15:02:01.744 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
|
762
|
network 2018.06.05 15:02:01.744 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
763
|
network 2018.06.05 15:02:01.795 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
|
764
|
network 2018.06.05 15:02:01.795 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
|
765
|
network 2018.06.05 15:02:01.795 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
|
766
|
network 2018.06.05 15:02:01.795 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
|
767
|
network 2018.06.05 15:02:01.795 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:02:01 GMT"
|
768
|
network 2018.06.05 15:02:01.796 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
|
769
|
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n <soap:Header>\n <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id982\" refToMessageID=\"cbd5ac4bf2b50fb720032320c0b7b59290646fa\"/>\n </soap:Header>\n <soap:Body>\n <Disconnect xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<SlotHandle>00</SlotHandle>\n</Disconnect>\n</soap:Body>\n</soap:Envelope>\n"
|
770
|
network 2018.06.05 15:02:01.796 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DISCONNECT
|
771
|
statema... 2018.06.05 15:02:01.796 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendTransmitResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
772
|
statema... 2018.06.05 15:02:01.796 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendDisconnectResponse"
|
773
|
statema... 2018.06.05 15:02:01.796 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendDisconnectResponse"
|
774
|
network 2018.06.05 15:02:01.796 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data:
|
775
|
"<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n <paos:EndpointReference>\n <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n <paos:MetaData>\n <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n </paos:MetaData>\n </paos:EndpointReference>\n </paos:PAOS>\n <wsa:ReplyTo>\n <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n </wsa:ReplyTo>\n <wsa:MessageID>urn:uuid:a8d2cd6e-c83f-4645-bb1c-a5e7447d0988</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n <DisconnectResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n </Result>\n </DisconnectResponse>\n </soap:Body>\n</soap:Envelope>\n"
|
776
|
network 2018.06.05 15:02:01.796 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
|
777
|
network 2018.06.05 15:02:01.796 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
778
|
network 2018.06.05 15:02:01.838 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
|
779
|
network 2018.06.05 15:02:01.838 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
|
780
|
network 2018.06.05 15:02:01.838 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
|
781
|
network 2018.06.05 15:02:01.838 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
|
782
|
network 2018.06.05 15:02:01.838 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:02:01 GMT"
|
783
|
network 2018.06.05 15:02:01.838 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
|
784
|
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n <soap:Header>\n <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id983\" refToMessageID=\"cbd5ac4bf2b50fb720032320c0b7b59290646fa\"/>\n </soap:Header>\n <soap:Body>\n <StartPAOSResponse Profile=\"http://www.bsi.bund.de/ecard/api/1.1\" xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n<ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n</Result>\n</StartPAOSResponse>\n</soap:Body>\n</soap:Envelope>\n"
|
785
|
network 2018.06.05 15:02:01.838 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: STARTPAOS_RESPONSE
|
786
|
statema... 2018.06.05 15:02:01.838 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendDisconnectResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
787
|
statema... 2018.06.05 15:02:01.838 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateStartPaosResponse"
|
788
|
statema... 2018.06.05 15:02:01.838 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateStartPaosResponse"
|
789
|
statema... 2018.06.05 15:02:01.839 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateStartPaosResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
790
|
statema... 2018.06.05 15:02:01.839 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateUpdateRetryCounter"
|
791
|
statema... 2018.06.05 15:02:01.839 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateUpdateRetryCounter"
|
792
|
default 2018.06.05 15:02:01.839 StateUpdateRetryCounter::run(core/states/StateUpdateRetryCounter.cpp:22) : StateUpdateRetryCounter::run()
|
793
|
card_pcsc 2018.06.05 15:02:01.839 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4020c02011c"
|
794
|
card_pcsc 2018.06.05 15:02:01.846 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
795
|
card_pcsc 2018.06.05 15:02:01.846 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "6a82"
|
796
|
card_pcsc 2018.06.05 15:02:01.846 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0022c1a412800a04007f0007020204020283010384010d"
|
797
|
card_pcsc 2018.06.05 15:02:01.872 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
798
|
card_pcsc 2018.06.05 15:02:01.872 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000"
|
799
|
card 2018.06.05 15:02:01.872 Reader::getRetryCounter(card/base/Reader.cpp:151) : StatusCode: SUCCESS
|
800
|
support 2018.06.05 15:02:01.872 I Reader::updateRetryCounter(card/base/Reader.cpp:103) : retrieved retry counter: 3 , was: 3 , PIN deactivated: false
|
801
|
card 2018.06.05 15:02:01.872 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK
|
802
|
default 2018.06.05 15:02:01.872 ...r::onUpdateRetryCounterDone(core/states/StateUpdateRetryCounter.cpp:39) : StateUpdateRetryCounter::onUpdateRetryCounterDone()
|
803
|
statema... 2018.06.05 15:02:01.872 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateUpdateRetryCounter" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
804
|
statema... 2018.06.05 15:02:01.872 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateCleanUpReaderManager"
|
805
|
statema... 2018.06.05 15:02:01.872 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateCleanUpReaderManager"
|
806
|
default 2018.06.05 15:02:01.872 ...CleanUpReaderManager::run(core/states/StateCleanUpReaderManager.cpp:24) : Going to disconnect card connection
|
807
|
card 2018.06.05 15:02:01.872 ReaderManagerWorker::stopScan(card/base/ReaderManagerWorker.cpp:130) : Stop scan on plugin: governikus::PcscReaderManagerPlugIn
|
808
|
default 2018.06.05 15:02:01.872 ...CleanUpReaderManager::run(core/states/StateCleanUpReaderManager.cpp:28) : Going to disconnect readers
|
809
|
card 2018.06.05 15:02:01.872 ReaderManagerWorker::stopScan(card/base/ReaderManagerWorker.cpp:130) : Stop scan on plugin: governikus::RemoteReaderManagerPlugIn
|
810
|
statema... 2018.06.05 15:02:01.872 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateCleanUpReaderManager" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
811
|
statema... 2018.06.05 15:02:01.872 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateCheckRefreshAddress"
|
812
|
statema... 2018.06.05 15:02:01.874 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateCheckRefreshAddress"
|
813
|
default 2018.06.05 15:02:01.889 StateCheckRefreshAddress::run(core/states/StateCheckRefreshAddress.cpp:80) : Current URL: "https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=cbd5ac4bf2b50fb720032320c0b7b59290646fa"
|
814
|
default 2018.06.05 15:02:01.889 StateCheckRefreshAddress::run(core/states/StateCheckRefreshAddress.cpp:82) : SubjectUrl: "https://eid-prod.connect.verwalt-berlin.de"
|
815
|
network 2018.06.05 15:02:01.889 UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46) : SOP-Check( "https://eid-prod.verwalt-berlin.de:8443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= false
|
816
|
default 2018.06.05 15:02:01.889 StateCheckRefreshAddress::run(core/states/StateCheckRefreshAddress.cpp:91) : SOP-Check failed, start process
|
817
|
default 2018.06.05 15:02:01.889 ...shAddress::sendGetRequest(core/states/StateCheckRefreshAddress.cpp:133) : Send GET request to URL: "https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=cbd5ac4bf2b50fb720032320c0b7b59290646fa"
|
818
|
network 2018.06.05 15:02:01.889 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8443, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=cbd5ac4bf2b50fb720032320c0b7b59290646fa"))
|
819
|
network 2018.06.05 15:02:01.889 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
820
|
network 2018.06.05 15:02:01.892 ...amHandlerImpl::~DatagramHandlerImpl(network/DatagramHandlerImpl.cpp:70) : Shutdown socket
|
821
|
card_pcsc 2018.06.05 15:02:01.895 PcscCard::disconnect(card/pcsc/PcscCard.cpp:143) : SCardEndTransaction for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
822
|
card_pcsc 2018.06.05 15:02:01.958 PcscCard::disconnect(card/pcsc/PcscCard.cpp:148) : SCardDisconnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
823
|
network 2018.06.05 15:02:02.064 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
|
824
|
network 2018.06.05 15:02:02.064 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors
|
825
|
network 2018.06.05 15:02:02.064 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-SHA384, bits=256, proto=TLSv1.2)
|
826
|
network 2018.06.05 15:02:02.064 I (:0) : Used session protocol: "TlsV1_2"
|
827
|
network 2018.06.05 15:02:02.064 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
|
828
|
network 2018.06.05 15:02:02.064 I (:0) : Used peer certificate: QSslCertificate("3", "3c:3f:e6:1c:7c:28:28:d9", "Kfl3PTkdwoi1P7sQWG1dvQ==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.verwalt-berlin.de")), QDateTime(2017-10-16 13:01:51.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-10-21 23:59:59.000 UTC Qt::TimeSpec(UTC)))
|
829
|
network 2018.06.05 15:02:02.065 I ...dress::onSslHandshakeDone(core/states/StateCheckRefreshAddress.cpp:162) : Handshake of tls connection done!
|
830
|
default 2018.06.05 15:02:02.065 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048
|
831
|
default 2018.06.05 15:02:02.065 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000
|
832
|
default 2018.06.05 15:02:02.065 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9"
|
833
|
default 2018.06.05 15:02:02.065 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "0546c2b01048cb77669003ab0743255f94582f010baa85308133f514e218ff3c"
|
834
|
default 2018.06.05 15:02:02.065 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
|
835
|
default 2018.06.05 15:02:02.065 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" for URL origin QUrl("https://eid-prod.verwalt-berlin.de:8443")
|
836
|
default 2018.06.05 15:02:02.065 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384
|
837
|
default 2018.06.05 15:02:02.065 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224
|
838
|
card_pcsc 2018.06.05 15:02:02.110 PcscReader::updateCard(card/pcsc/PcscReader.cpp:194) : old state: "(0x20122) CHANGED PRESENT INUSE" | new state: "(0x20022) CHANGED PRESENT"
|
839
|
default 2018.06.05 15:02:02.203 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:212) : Status Code: 303 | redirect URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1omGhJc1NIlWCSRfv1R3j7bZe%2B%2FYtXzKIMIJ9%2BPhftyDP%2F357Luf9mJZX%2BPwy1f4Z%2BjrT8WQjflrqH756nviN%2Brrn3%2F905r0HTJ9d4p1Goe1%2BOleNKzffx%2F95et7Gb6Pyfpavw9JX6zft%2By7yxj6d%2BRn6Pu0jNuYjd3Xn%2Fhi3V5Dsv32onrbpvU7CBav%2FNs9Jf85G4ehyLaf760cSbd9S4ulew0%2F5wXIvoulKhZtHLYxLFLwh2inyIrXXrjFsnfF9ue1WH%2FsX8l%2FgcgUzlCa%2BpZlJPkNS2nkGw0hybciz8uUJoqUQMqvPyn8L1%2FzIi2T7H4EQWV2z0TxbymFlN8gEk1wNCuIMsPvmcNfdPbGX77%2Bd1qgJVKW6DcYSpBvGJXR31KUzL4RCEyTEAohJVTci9b1XSjDuiXD9stXBIKpbxDxDcI9GP0OId8h%2BGeCwuKvPwV%2FMfttqK9%2FGPn7b4uXv7fw%2F27gZF2L5YdRv%2F76V2P%2BixH%2FBP6G1R%2FC%2F4qnuyXbe%2F2nv9yYFz8FSfcu%2FvcX3%2Brdi7%2B77yy7zf8V%2FPWPl0zf%2F0Hsd2HIls%2B0FTnzl53%2BR8r96bz98m%2FC%2BGRL%2FpDz48HvHnU71HEcPx%2Foz%2BNSgQgEwSCEgbez3jP%2B68YlvyGEyiJJioxC7l9GJUVRkCRNwkWGUCmZoujXn7zPdKv%2Bf5QndEVfDNsN3N%2Fv7AbCKLZ6zH9iumpcXlvd%2F1%2FISooVRm6nTbMfdszX71rxUYZy%2FEPDfP03MiAQon%2Fol6%2Bv6r%2F%2BaSdFfgv5XWcMh1AExnIMhfGMxrPbZTMcT9AMxm9bpNT%2FFx2WNfkG%2Fzf%2Bjwr8pswTh%2BgfeP31D%2FfDY8tXlmzFr4ai8BfPccziVsyhsEylcIxtHLwdqdoYK%2FWePRhb0FmbOap4PLmLUdnqEbBM5DGtIxo29WMuH9i28kU4Yi5%2BqmsSYid%2FMY%2FfJ2Ye26pd1p9T2gi%2BwSoSA%2FsCVxu6GzhC%2BGL%2FtoZntN%2FXrN4XBgqkRyO8DI75bQFzHLEPiQ9PpLsktLdMVveYw5sUwd9x%2BICeUGDal1AbLCVx7iy5SorytqAyTuR%2BicOutaUOiuVxi%2Frgk0rdW%2B%2BdzmCxJ%2B8JqOEJx%2BMSYONSDkMc7zHln8f%2Bqv6Xf6f%2Ff6L%2Bl3%2Bn%2F3%2Bi%2Fpd%2Fp%2F%2B%2FVV9RWKX5AVQ71%2B1Log%2BIvdEWGcbkvjA2xdzuwXKVdruEwCDmx0qVZM8L2S1BnqEOzaSj0vE%2FCMYpeJ5g8Mt8VoMejGDC2ZV%2FbVhjKS54NswXWdWvSCAcUgkkLrMvzS6u5OR92jYbRx8NwV0JvoiCp5yYPSXSgf1g9vSTowXQuDH6LEz9kyKbhqr78OVdgWEaz5ZRBBvIiMqSJQWypmf7IeO9cos69hqv4SN3DFiFe5%2B%2B3UKPtxsNqes0yb7UnICPTJzjWDt%2BoVQLx72Qd89zJGepw0BEtUMkB5x0%2BchYdQxCoQ3kGJSQusjICyRmAWEr39CCxsLiPa3Yc4DDyjM%2B4hes0KYqj5ENwAVG3RbfEodYwKIkEEj5k%2BOF3%2BCpH7ErRfEYfLYYAyb9ofCMzbDjOR4S%2F%2Fvxkh1D%2BMI0DGMw6w%2Fvz%2FnjRuBQhJb%2FZ7TW39D6AdBiPULGBy4%2BGZ0l1eWpAedaGxJKFYIvTlOXM05SiwQSw4M%2BptLvS8iDWwFbOZGR38uspg6ZSaXglKkC1E%2BHiJyGqOCNad5ocFWj8Xgj43ukqy8YChB025fNUx7oih%2FaaSgJEGc23mZGIx9nqT5ltiiXgBx2HIja1%2FZOB971YhbQLF2jwUOm8g3pwaj4Qr%2FN6xC33IwNSIWRZ%2FkUNNWufSrJAT9m8762%2FO08AUI4ziwG6hOkiZxTqUr2JGmtxsONiEI3URZY3l%2BKbR5f4diR91b2%2FuV%2BAHV8FcZGo1nv6HRryBHGaBrUj6zhayWIWO%2BGUGEbsaDc0lJUx99qSW8X3onclywviYCMnO745Zc%2FgX%2BE0r%2BPnn8d%2FD2%2B%2FpjyR%2Br4Iy1xr6kult%2Bf%2Fpanfh%2F4Lb%2F%2Fqqgpl6z81hWV8uqiajqKdKy9AtAAypaf4TptjOlv6dB0AeRJRNLH8UauVSXOTt9Rz563yP5EOdG4%2BMP9FNT%2BbLNLemkRrc5NYCHj4Apy26CgKZmNLM4vYY%2FM1ZFhZXqKByoGJHsV2h4Rk7VD9ExXnvmQp8%2FTt0wIlIZBC8tYljfBGFOJ6Do6%2F2RPTV9YGvtMTLRICNu8wustpA8HcXqTmMMZMvoN3OJjer4Y1%2FrI6id0WehpQsCjRKrrqe7soqhGuYO96g0PgW0alEfMKwxPowttXK30Ku41BGW0ZHWbD%2FoYeVgmMWs7iUtlnu2QN1rSa2UlhE6nWLsQlSaTsyO9PrIEj2b7B1T%2FYup%2FGPoDrH9kNDdu%2F88APqaKHjP1iOGV7WV1CT6Fzeb5C0AVjUvx1hFkamNo3eS1BNarvpvuWJpERZPQXhfVE47EJr9reV%2FcoYa05ey9TEXdCngzIW3XuZdIVUhgNxGo0BidjPlUNEP%2B2F388%2BBoT7qNZTX1KZC47H6UQJM9%2FxAfE6mhsT7FnnJHFX4lF76nYsCaXD8tSJfZZkK7ameTL2oZHq3zvpwu4XWFXl5v29aYPG0e0PpcZ%2BQjlItsPcMm6Ci5hjpjvaatp65NKoB25qieuQGkaCCmNqPmTrHKia6h0Zez0ImNyysD61OAO4R%2B%2BUZFKlpUVesdDGN9k9n8gD%2B4pqN%2B%2BhAbrY%2B6g4TcApMlx4tnB1C3XW7PA%2BwjVim8Rk1JjVgT34e3lkQkccLGAH0oLUFP4pM2fYkUTsKTRxF%2B7RXpLXNT8PlmHOGD5%2BjPnknqqge7KuPN%2BjnKcnyHuvd4hYLD%2BMfEP%2Fi0aUxlnKfyzW1jh6jp3iiSYD6A%2Bn2NF7sB5fy0zkyeRm8x3irt%2Bwoz9tpsiVRp4XRb2D1jb6CPrA%2BQkL046N92Jk2PPisjiFr4zXm8lqbxYQUje2qi65TEx9eypfEAHow5l%2F6T18agSQGfpbo8ArIXQ34u1ICf49G2uypMJpcVG0KXx5Gw%2FqR7DZs3K1NYnsuXXkV76XR1ZqH0llcfHAUlu2ppuezOC9zUh4mPdManoJCvF1d1rE8VH2jgzx5JpxNYmw%2BdohrwLuPm0WLnY%2FAoyh%2BrzHyMXblg44hlAkbEiKcqKuCSDMFGYzLxAB1U2lCu3Xp81oLIkfJKz3Ij97r71Lyu3mCfd%2Fatn6WlWx9OUxaZDODAQBYmxJPepcUFK4WdFV3Xk7bxrA3b9R7Y5O%2Fqna1L9CMAdJKpioe%2FN2eKmc3zGWGIacHbrfequYLdawD3THMzQ6cNXO%2FgoJSYy2n69alsYZRln41lFvC1bN36wa4cE6cVZus2GmRVx3bSIIqCEK7AR0RL21p4JUJGInx9LqNqDbhtNDzj5b65QDDfgNUQ6isciEcsr1W%2FPDbUDd7Fi9Zo%2BjWBui2cITlIueA6L15VcijVLY8OP1NYFnQExvK8bGWPCPIrdMH4rUOZGIjK6Pj1MUfJZQGZK6rdmqDOjGxg%2FcmEqNsZsqRJnu4c9o0tchMfg%2FwSQacGkDcCX1DkDNo7sq3AmOvi6fYsMT%2BCjNLWfFIzJS6R5YWlSGm6iGLE4Z0w3NU5rcknujJsOWiTpYaU56dYEGrKilGhdJP7Nm82hmcdahoh7iYC2NcSDUu25ui1JcvDOsWfYCJS9dIVnFBeYVi1aDigT3zpGonQcH9GC%2BOEAZ3tWDQ0jXfxXKwM1io0dJuxwKUtc1g%2BuzMPAvlNIAIiU7erH064Fu8Uig9P3t605nY2XRRj72TQ9oPWBGmTOikxTXUl7ye10O3oY7JBo2COLTBHMCgVvgy39wFeJik4oCKdVkjlvCRDX9XkWAGJN1haWrGgFea1UwkMRuoKGHEeW3WRgfkKTxm32iwxiTfKfHQq2rUkzdaOQhFkG4OaCI83e5PZjTQvaO%2FX%2FcQep6MYSPVY%2BkIrurFFxL032QTQ2Lw8BCVzaucO885LWYPhIa%2FDefupJgRc5Yy5thX4VS%2BuhcT9IwOkT4DTpjJAdzn08UhOLY69lBV1HCDB6X1fsEHokkRvwcD0KZL%2BakM6985FqBgE6vOo8BvYE%2BEtu%2FNJz31MZZI8dzR%2Fogmtr3ceat4M6%2Bawvpl18FJkpVRopIR1dmw9iYcvwCum%2BVG1vh5bpMgdQQcM5hF5uEoasKqsNk%2BSHySpeSZ%2F8WOTUqi59YAKB4zlpu6rLMuluGO7GG0T%2FYkg63gO8eqnb9C69GybnsBxwmJTeEmP7zWAhviaWJiNtLX%2BKFyOsciFWAoZQ0jrcgUpIdDXDIQSPw5CqlWqQufwMkcRlbjSxQpBks73cZ6eIbRMDESpu4H1N6fAX3U8SXxaJTkpNp95pAkIq12aDtqwBZo7%2FP2IcymvCdLMvVXAGPEMuJ5YYXvLZRIfGkZOjTsyBjfpaQA1qq0GqN%2BAQ%2FTdUvMkl8ZbleY%2BvlI2A4qpudVp0rIDKYNZlKLYU9QSzV7ndymJluFdlN4xQ1Le5qcEw1FjVrhIZsApniz0GtibgnKF5%2BvN8py5FeNn1cx01vc11ABMD2It4ROX7vvdkhWN6qgUPcsYlXptVe86ZvnEGntiDmxfkk3Ne6i9vPHNDTEUOsFYBd4j0tlCeJmGpFsZnZl%2Br7YqhGuiiDJvQE%2BYR7PV73BDkV1dWVM9nzLRTuiBgjiJ05NVYQsKd490Z4M4Cww8Jug64WCCE20VGSCG9UFo%2FjTIMeK%2B%2BiQMHC1FUN622LqZJOmXz3BE%2BNeWdKPHQAoz9zwXEIUlZPGOOV0ZoHo6T2j3ICBiLq5tMgJLn5%2FpYT2x%2FHKZhH551jQr6va%2BFu1lNzQ%2FcNzZBe%2B9skHTyAqMSQt7N8oPHW%2FgM7E0bKFxhH2Yj1UZinIbpXKNpYW58IH2zBct1pWJpXyTK1YDlfXwNO8eJ00PLXBnynf8CgAni4SyDcyAbTFRPh93hblCgb5wx1s%2FdXdHmzpdGJibJjJnzqOUFt4GYfolczF3RsSR509T56f6tNjVPIscUo8zEmprXZ448RCDNiL0M6zJp03me8YvpnlNuRQeT9KjsSoKk9Xo54VJu903cF9ZALlFdISoZsq%2F6CTS1vZmA0HmTNpjm%2FQPHTm49%2By09kls6mHgK%2Fnm8iWDNjASGck4nQx87JQsj9yQBnNzUyiSMQ6Y8i07P2eJm2%2Bwqrt674qDRVbMZ7L6nBwqswuABGQAaEbVl4AomqcKvugo8vTzuek3tS1YFNgsOsa02YN2blX9RD%2BYLMikx4iubMAZcvfarKM4FlicBCWnG2FM81W26Rl1Syw22b3vPiOVILjIfaDGVlyyWSmfB4jSZ14R5bZ9w8SRE0j8qSxq44uP4YmeWVi6IfJpFYujWJwQZ7DcifdU8%2BuJ0PXY%2By8EAm2RFu3eu4y%2BUSdp2boLm9vXIr4mY0ngEU1C6RBAd7M3lOyJkAsCeEdOZHq7z8Kbbp5l3PXVcDZxVr%2FvLrn1jNVO8bIonfok06NGWRuzMTYLH0YkEduiJBFAIjGTioDoU9JAsISQbcoKJFCrJ4NW%2BUQ8qcYz59klqHtTsmJEFMYiKm2tFwdWXYrsoE7tZr591h2xk9H7wHH1eTcdXIXI7AqyyBD0mMMer9nXkKSoPSM01AiGySSrPCXCbDmm3Lr%2ByMjcCKiLNpA7GpxBOSVhYENpLSxRm6B1Cg3jrLAlTrHqfG7eXp%2Fmo9Us0BAeoloPGMLiB1UrCR3hR640Jk25wJjVtX%2BEIXIzn5xF4BesfzY3nB8kKlbVG0KFqb9AOwM6nPLVmnDuiOm0Pjm2slgCnJyU8BnnvqzniXCkZ2FqpSRLBInVTgk%2FlLoeqE08kbf%2FKTDomh5a2yOr9znHvEPog0U1li9LslRyxJWNl0fwL%2FX9OuRrSaJ3NDhTwn1sDX2thMFygliPRgqoVXPCYDdD6RQH8mjoVLokuCO%2Fpb26af%2Foi3PknaxWFFIw1v3zwp2OTA6IOn3sgAeyo4lgGNlcf0nd0i%2Fledbra3otTD2u9VG1Bc%2BUnxcD%2BXQr75%2FYfgmtUUs4H4o0ZprjHMf005TwRX3iLlLdBW0J3hlghzdAXxWRHe9zO5DkEEyNeSfvAvI3LfDyyXYt%2BcGNrK4D%2FLsL4zTweceK7gxhMQMzcuYa6ILjHcwEuo9HgeQCr5tSEi1LqHbaCzs5l7ClClSQxVgJ0wlREZM67Wl%2Bxhdxd2ETwM39rGsvZztSlc%2BLSG0w387dPhRs3S9VdngzBTVnva08Hufq0u%2BtCxAh9pXj8k4ZqihXLoIypZZdYC8QMwscj6%2BzSUaxz%2FxssrLxZA0MpfYwzJQUvlvStA67MwAuA3EdbapgbOFFxDr%2FqEgROQNtq0eIdQLuTgLUKnbYgiRJClGIev5YbB38PgNyAaYrZ40kqZiAMevPaFF0DemgvZgh8dGW%2BdhK3hwpGVr2NKN15dnCCKspkJ3FGLrV1UPrV2W1iuQVl54K3mQH%2FSAVzvjWvAy4JLLiyjiKQGfec2nJkX2SSj6M3gXX08qipBY6NBlbjUm2Q5SRO7sa2247diQG3HbakAB2HHuElnofF%2F%2BU2GBd9yeCO9ETtVxfQlT%2FDpof7PUKYhcwSLJ4bss2B3hwFWgmMPX%2BKFAq5VtY7UD08fTYgGoh6RjgMgOQkCFgeZyG83152LStP9otZgKL56OLyeEoi%2FbmcmTF2g2wSZKovKm3eITbrjdWx8DuQxpb9toQcnw0iPICwn3PObDK86HKo6HiriQbw1cSwFKgBDSj0Pu0WMnxGHMOys%2Faxawn9%2BDuFgzTJHFL9sJka9MWjyM6r2%2BEIYoXSy4sKlSISuzGodxEqd%2BCAMHuV%2BWQKUq%2B%2F0kgyCHENn%2BvQtD4YacEtZG3BRJzzDjrd3tTOuWGfxfxDi%2FZY7H1m5RpTMx96ACU3tsgHsjEbkEKZhB%2B4LqOXFAaFib3OCuxyaR9fPd7M%2FZGkHXVnGIthCieDAGZf58OVufdraJ2c2SaUdG19IlzRaCEziXVQ%2F2BnVcuAe%2B9JFuYvj2po7lKjnipoXfJoY4Ma3eJatNXgK13cUKHrly7U9uAujkbRng6GPcAzDTmDlGCWprRzSDlOcZh9EGi%2BHQM7xJv531pgMRtGqSPILqwHyvmTjUEkBz3nQsXgP3dTEZtzDx4UUkI7NlEawicPpFWKPVW5BqQ5jQmQIbSpgEfA3sJrtnIYMwr9R2%2FS%2FHjlek2WzAlbFBN%2FYxmii13w%2Fdu19b5d9nQ11LnFvAYr8%2FoVblYNeuME0LGtk1%2FoazcKo7nLjcTfWxV10%2F2iAUbGt%2BtdM9m3duLjaOI72a0qe1rNn%2BGD%2FER6fC4mNkxADo%2FpZCX7718Ns%2B6HNbn4dX6UMazDSISLUFWA42rJsa56KuVrj7oqwqlmQdzPzBlS7mb95%2FnpSAEVXfZBQx4i%2BkhcHWSvJJ7Y233bdLWOlT80TWnLlnFIqaX4gtzFq%2BxdbH0kVoz%2F8gonRFRRJ11SA0eUf2Sgo0Y3Mf12VD4RBH7LhHLafCYbXLe1FDkYI9ZfNI9WI5tkMcd0F%2FF3JoaPhPgSUcDvRKqY%2Bq4W9ApKat42lX8%2FnFlAJT9t7PybxF1Lnxm1tGTgPWwTcjgzRkR6alI4ktzb2%2BQ%2B2Rp4jcYLESeEjPMf1RJAQqZ82KHoiiFLkCQH1NeUm06edss7uWpkZFBprz7MmTANni%2BNVaZy7GK7uuCDBxrxTAcbY5W1cxPCLOw6C58SPqhDNHdBKnL8MliRoCl%2BA6lJLrcTXqXjDUes0ZI9MGZ3P2mfH8uoOvf%2FUsxIG1yNcWXKGfEy%2FzhWCH%2BacH0Va6IwqNWNuyPanFFHZtqC8idEfC715483pzZ6TI1EhwVAt47gRWIgFkHJijm%2BdEhqn6kb3pKX8X2Li98sYatBFeGovV8rwitlwUkDMlgJ2zngWKfVuvtEJhUQHgEkFZLp5tfCK5pFpMzZtcOCfRRwvD10axKF6yNu%2BPpNb863Er1%2FGWZomw5ETEW8rLSC00eON8COlqwb3uw8qCqCgxQNnh4J97NJaE3xehpMdBgC8t05D80KYPNcF%2FIZVY4g%2BvQPC0KG4VIa9UZwkdy2W6laTo77LAP5RTGYdH6l7eZhS3XsLsb5OvZyQGCkEm%2BAp%2FKinB6bVytT1n0TgCKGoHOyT2eYEIUOLUC6NWzJPS4r4u4XvJTA7RnWq7bNKDvaqAa6JtFPKEjOHNkU5UlAMxl7gmJbRQMqK4ehJFXl0zda1kIRoH1l60YJVmZfjbyivV6PqeaU0HQxJEWB4LAUveGIAXvDUY0x0ZvrZW121%2FG2idVV7OTuL%2FPsbfVzxzGrySQ%2BUW0RFQAD02PvRXPuaPl83g3BdsujsE4xwD3X%2BJoR9juHfnLP7Bw51PabgVDJHN9DyFILEuglxvNUepujsScPS9vchSSYcv7PqD9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=G3Q%2BjzFaEwmal2YdOPC%2FnOr%2B60CpKL%2BgfE15Zqb9HPkaFGMGvJnJXTTJZnq%2Fk39%2BdxYr%2B%2BGxURMn%0AvQiCxIoQJALN06iIEMPVr6Ihvp%2BYBCmTxfJenbiJpr1eUUQL4fC7qmZ8xWWbuX4z882omXpcpwyJ%0A7KBZaimyq%2FRkTy4QazvrfldEuPj5x0DpDkKOVoxjZQIUn5155U%2FS1Wyb%2BUNnAoSx4vELycvxs8zj%0A1C4O189P9kDa3VkJd7CwF%2B7neTofd1L5jQBqB1JeaSgFyNhMLZ0FcUSymVM1wNbeLuvbfcSpFhCC%0AWbzr3rlL8O%2BSs1nMZcebHBrYOz7xiuhIWl8mcA%3D%3D")
|
840
|
network 2018.06.05 15:02:02.204 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Server": "Apache-Coyote/1.1"
|
841
|
network 2018.06.05 15:02:02.204 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Location": "https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1omGhJc1NIlWCSRfv1R3j7bZe%2B%2FYtXzKIMIJ9%2BPhftyDP%2F357Luf9mJZX%2BPwy1f4Z%2BjrT8WQjflrqH756nviN%2Brrn3%2F905r0HTJ9d4p1Goe1%2BOleNKzffx%2F95et7Gb6Pyfpavw9JX6zft%2By7yxj6d%2BRn6Pu0jNuYjd3Xn%2Fhi3V5Dsv32onrbpvU7CBav%2FNs9Jf85G4ehyLaf760cSbd9S4ulew0%2F5wXIvoulKhZtHLYxLFLwh2inyIrXXrjFsnfF9ue1WH%2FsX8l%2FgcgUzlCa%2BpZlJPkNS2nkGw0hybciz8uUJoqUQMqvPyn8L1%2FzIi2T7H4EQWV2z0TxbymFlN8gEk1wNCuIMsPvmcNfdPbGX77%2Bd1qgJVKW6DcYSpBvGJXR31KUzL4RCEyTEAohJVTci9b1XSjDuiXD9stXBIKpbxDxDcI9GP0OId8h%2BGeCwuKvPwV%2FMfttqK9%2FGPn7b4uXv7fw%2F27gZF2L5YdRv%2F76V2P%2BixH%2FBP6G1R%2FC%2F4qnuyXbe%2F2nv9yYFz8FSfcu%2FvcX3%2Brdi7%2B77yy7zf8V%2FPWPl0zf%2F0Hsd2HIls%2B0FTnzl53%2BR8r96bz98m%2FC%2BGRL%2FpDz48HvHnU71HEcPx%2Foz%2BNSgQgEwSCEgbez3jP%2B68YlvyGEyiJJioxC7l9GJUVRkCRNwkWGUCmZoujXn7zPdKv%2Bf5QndEVfDNsN3N%2Fv7AbCKLZ6zH9iumpcXlvd%2F1%2FISooVRm6nTbMfdszX71rxUYZy%2FEPDfP03MiAQon%2Fol6%2Bv6r%2F%2BaSdFfgv5XWcMh1AExnIMhfGMxrPbZTMcT9AMxm9bpNT%2FFx2WNfkG%2Fzf%2Bjwr8pswTh%2BgfeP31D%2FfDY8tXlmzFr4ai8BfPccziVsyhsEylcIxtHLwdqdoYK%2FWePRhb0FmbOap4PLmLUdnqEbBM5DGtIxo29WMuH9i28kU4Yi5%2BqmsSYid%2FMY%2FfJ2Ye26pd1p9T2gi%2BwSoSA%2FsCVxu6GzhC%2BGL%2FtoZntN%2FXrN4XBgqkRyO8DI75bQFzHLEPiQ9PpLsktLdMVveYw5sUwd9x%2BICeUGDal1AbLCVx7iy5SorytqAyTuR%2BicOutaUOiuVxi%2Frgk0rdW%2B%2BdzmCxJ%2B8JqOEJx%2BMSYONSDkMc7zHln8f%2Bqv6Xf6f%2Ff6L%2Bl3%2Bn%2F3%2Bi%2Fpd%2Fp%2F%2B%2FVV9RWKX5AVQ71%2B1Log%2BIvdEWGcbkvjA2xdzuwXKVdruEwCDmx0qVZM8L2S1BnqEOzaSj0vE%2FCMYpeJ5g8Mt8VoMejGDC2ZV%2FbVhjKS54NswXWdWvSCAcUgkkLrMvzS6u5OR92jYbRx8NwV0JvoiCp5yYPSXSgf1g9vSTowXQuDH6LEz9kyKbhqr78OVdgWEaz5ZRBBvIiMqSJQWypmf7IeO9cos69hqv4SN3DFiFe5%2B%2B3UKPtxsNqes0yb7UnICPTJzjWDt%2BoVQLx72Qd89zJGepw0BEtUMkB5x0%2BchYdQxCoQ3kGJSQusjICyRmAWEr39CCxsLiPa3Yc4DDyjM%2B4hes0KYqj5ENwAVG3RbfEodYwKIkEEj5k%2BOF3%2BCpH7ErRfEYfLYYAyb9ofCMzbDjOR4S%2F%2Fvxkh1D%2BMI0DGMw6w%2Fvz%2FnjRuBQhJb%2FZ7TW39D6AdBiPULGBy4%2BGZ0l1eWpAedaGxJKFYIvTlOXM05SiwQSw4M%2BptLvS8iDWwFbOZGR38uspg6ZSaXglKkC1E%2BHiJyGqOCNad5ocFWj8Xgj43ukqy8YChB025fNUx7oih%2FaaSgJEGc23mZGIx9nqT5ltiiXgBx2HIja1%2FZOB971YhbQLF2jwUOm8g3pwaj4Qr%2FN6xC33IwNSIWRZ%2FkUNNWufSrJAT9m8762%2FO08AUI4ziwG6hOkiZxTqUr2JGmtxsONiEI3URZY3l%2BKbR5f4diR91b2%2FuV%2BAHV8FcZGo1nv6HRryBHGaBrUj6zhayWIWO%2BGUGEbsaDc0lJUx99qSW8X3onclywviYCMnO745Zc%2FgX%2BE0r%2BPnn8d%2FD2%2B%2FpjyR%2Br4Iy1xr6kult%2Bf%2Fpanfh%2F4Lb%2F%2Fqqgpl6z81hWV8uqiajqKdKy9AtAAypaf4TptjOlv6dB0AeRJRNLH8UauVSXOTt9Rz563yP5EOdG4%2BMP9FNT%2BbLNLemkRrc5NYCHj4Apy26CgKZmNLM4vYY%2FM1ZFhZXqKByoGJHsV2h4Rk7VD9ExXnvmQp8%2FTt0wIlIZBC8tYljfBGFOJ6Do6%2F2RPTV9YGvtMTLRICNu8wustpA8HcXqTmMMZMvoN3OJjer4Y1%2FrI6id0WehpQsCjRKrrqe7soqhGuYO96g0PgW0alEfMKwxPowttXK30Ku41BGW0ZHWbD%2FoYeVgmMWs7iUtlnu2QN1rSa2UlhE6nWLsQlSaTsyO9PrIEj2b7B1T%2FYup%2FGPoDrH9kNDdu%2F88APqaKHjP1iOGV7WV1CT6Fzeb5C0AVjUvx1hFkamNo3eS1BNarvpvuWJpERZPQXhfVE47EJr9reV%2FcoYa05ey9TEXdCngzIW3XuZdIVUhgNxGo0BidjPlUNEP%2B2F388%2BBoT7qNZTX1KZC47H6UQJM9%2FxAfE6mhsT7FnnJHFX4lF76nYsCaXD8tSJfZZkK7ameTL2oZHq3zvpwu4XWFXl5v29aYPG0e0PpcZ%2BQjlItsPcMm6Ci5hjpjvaatp65NKoB25qieuQGkaCCmNqPmTrHKia6h0Zez0ImNyysD61OAO4R%2B%2BUZFKlpUVesdDGN9k9n8gD%2B4pqN%2B%2BhAbrY%2B6g4TcApMlx4tnB1C3XW7PA%2BwjVim8Rk1JjVgT34e3lkQkccLGAH0oLUFP4pM2fYkUTsKTRxF%2B7RXpLXNT8PlmHOGD5%2BjPnknqqge7KuPN%2BjnKcnyHuvd4hYLD%2BMfEP%2Fi0aUxlnKfyzW1jh6jp3iiSYD6A%2Bn2NF7sB5fy0zkyeRm8x3irt%2Bwoz9tpsiVRp4XRb2D1jb6CPrA%2BQkL046N92Jk2PPisjiFr4zXm8lqbxYQUje2qi65TEx9eypfEAHow5l%2F6T18agSQGfpbo8ArIXQ34u1ICf49G2uypMJpcVG0KXx5Gw%2FqR7DZs3K1NYnsuXXkV76XR1ZqH0llcfHAUlu2ppuezOC9zUh4mPdManoJCvF1d1rE8VH2jgzx5JpxNYmw%2BdohrwLuPm0WLnY%2FAoyh%2BrzHyMXblg44hlAkbEiKcqKuCSDMFGYzLxAB1U2lCu3Xp81oLIkfJKz3Ij97r71Lyu3mCfd%2Fatn6WlWx9OUxaZDODAQBYmxJPepcUFK4WdFV3Xk7bxrA3b9R7Y5O%2Fqna1L9CMAdJKpioe%2FN2eKmc3zGWGIacHbrfequYLdawD3THMzQ6cNXO%2FgoJSYy2n69alsYZRln41lFvC1bN36wa4cE6cVZus2GmRVx3bSIIqCEK7AR0RL21p4JUJGInx9LqNqDbhtNDzj5b65QDDfgNUQ6isciEcsr1W%2FPDbUDd7Fi9Zo%2BjWBui2cITlIueA6L15VcijVLY8OP1NYFnQExvK8bGWPCPIrdMH4rUOZGIjK6Pj1MUfJZQGZK6rdmqDOjGxg%2FcmEqNsZsqRJnu4c9o0tchMfg%2FwSQacGkDcCX1DkDNo7sq3AmOvi6fYsMT%2BCjNLWfFIzJS6R5YWlSGm6iGLE4Z0w3NU5rcknujJsOWiTpYaU56dYEGrKilGhdJP7Nm82hmcdahoh7iYC2NcSDUu25ui1JcvDOsWfYCJS9dIVnFBeYVi1aDigT3zpGonQcH9GC%2BOEAZ3tWDQ0jXfxXKwM1io0dJuxwKUtc1g%2BuzMPAvlNIAIiU7erH064Fu8Uig9P3t605nY2XRRj72TQ9oPWBGmTOikxTXUl7ye10O3oY7JBo2COLTBHMCgVvgy39wFeJik4oCKdVkjlvCRDX9XkWAGJN1haWrGgFea1UwkMRuoKGHEeW3WRgfkKTxm32iwxiTfKfHQq2rUkzdaOQhFkG4OaCI83e5PZjTQvaO%2FX%2FcQep6MYSPVY%2BkIrurFFxL032QTQ2Lw8BCVzaucO885LWYPhIa%2FDefupJgRc5Yy5thX4VS%2BuhcT9IwOkT4DTpjJAdzn08UhOLY69lBV1HCDB6X1fsEHokkRvwcD0KZL%2BakM6985FqBgE6vOo8BvYE%2BEtu%2FNJz31MZZI8dzR%2Fogmtr3ceat4M6%2Bawvpl18FJkpVRopIR1dmw9iYcvwCum%2BVG1vh5bpMgdQQcM5hF5uEoasKqsNk%2BSHySpeSZ%2F8WOTUqi59YAKB4zlpu6rLMuluGO7GG0T%2FYkg63gO8eqnb9C69GybnsBxwmJTeEmP7zWAhviaWJiNtLX%2BKFyOsciFWAoZQ0jrcgUpIdDXDIQSPw5CqlWqQufwMkcRlbjSxQpBks73cZ6eIbRMDESpu4H1N6fAX3U8SXxaJTkpNp95pAkIq12aDtqwBZo7%2FP2IcymvCdLMvVXAGPEMuJ5YYXvLZRIfGkZOjTsyBjfpaQA1qq0GqN%2BAQ%2FTdUvMkl8ZbleY%2BvlI2A4qpudVp0rIDKYNZlKLYU9QSzV7ndymJluFdlN4xQ1Le5qcEw1FjVrhIZsApniz0GtibgnKF5%2BvN8py5FeNn1cx01vc11ABMD2It4ROX7vvdkhWN6qgUPcsYlXptVe86ZvnEGntiDmxfkk3Ne6i9vPHNDTEUOsFYBd4j0tlCeJmGpFsZnZl%2Br7YqhGuiiDJvQE%2BYR7PV73BDkV1dWVM9nzLRTuiBgjiJ05NVYQsKd490Z4M4Cww8Jug64WCCE20VGSCG9UFo%2FjTIMeK%2B%2BiQMHC1FUN622LqZJOmXz3BE%2BNeWdKPHQAoz9zwXEIUlZPGOOV0ZoHo6T2j3ICBiLq5tMgJLn5%2FpYT2x%2FHKZhH551jQr6va%2BFu1lNzQ%2FcNzZBe%2B9skHTyAqMSQt7N8oPHW%2FgM7E0bKFxhH2Yj1UZinIbpXKNpYW58IH2zBct1pWJpXyTK1YDlfXwNO8eJ00PLXBnynf8CgAni4SyDcyAbTFRPh93hblCgb5wx1s%2FdXdHmzpdGJibJjJnzqOUFt4GYfolczF3RsSR509T56f6tNjVPIscUo8zEmprXZ448RCDNiL0M6zJp03me8YvpnlNuRQeT9KjsSoKk9Xo54VJu903cF9ZALlFdISoZsq%2F6CTS1vZmA0HmTNpjm%2FQPHTm49%2By09kls6mHgK%2Fnm8iWDNjASGck4nQx87JQsj9yQBnNzUyiSMQ6Y8i07P2eJm2%2Bwqrt674qDRVbMZ7L6nBwqswuABGQAaEbVl4AomqcKvugo8vTzuek3tS1YFNgsOsa02YN2blX9RD%2BYLMikx4iubMAZcvfarKM4FlicBCWnG2FM81W26Rl1Syw22b3vPiOVILjIfaDGVlyyWSmfB4jSZ14R5bZ9w8SRE0j8qSxq44uP4YmeWVi6IfJpFYujWJwQZ7DcifdU8%2BuJ0PXY%2By8EAm2RFu3eu4y%2BUSdp2boLm9vXIr4mY0ngEU1C6RBAd7M3lOyJkAsCeEdOZHq7z8Kbbp5l3PXVcDZxVr%2FvLrn1jNVO8bIonfok06NGWRuzMTYLH0YkEduiJBFAIjGTioDoU9JAsISQbcoKJFCrJ4NW%2BUQ8qcYz59klqHtTsmJEFMYiKm2tFwdWXYrsoE7tZr591h2xk9H7wHH1eTcdXIXI7AqyyBD0mMMer9nXkKSoPSM01AiGySSrPCXCbDmm3Lr%2ByMjcCKiLNpA7GpxBOSVhYENpLSxRm6B1Cg3jrLAlTrHqfG7eXp%2Fmo9Us0BAeoloPGMLiB1UrCR3hR640Jk25wJjVtX%2BEIXIzn5xF4BesfzY3nB8kKlbVG0KFqb9AOwM6nPLVmnDuiOm0Pjm2slgCnJyU8BnnvqzniXCkZ2FqpSRLBInVTgk%2FlLoeqE08kbf%2FKTDomh5a2yOr9znHvEPog0U1li9LslRyxJWNl0fwL%2FX9OuRrSaJ3NDhTwn1sDX2thMFygliPRgqoVXPCYDdD6RQH8mjoVLokuCO%2Fpb26af%2Foi3PknaxWFFIw1v3zwp2OTA6IOn3sgAeyo4lgGNlcf0nd0i%2Fledbra3otTD2u9VG1Bc%2BUnxcD%2BXQr75%2FYfgmtUUs4H4o0ZprjHMf005TwRX3iLlLdBW0J3hlghzdAXxWRHe9zO5DkEEyNeSfvAvI3LfDyyXYt%2BcGNrK4D%2FLsL4zTweceK7gxhMQMzcuYa6ILjHcwEuo9HgeQCr5tSEi1LqHbaCzs5l7ClClSQxVgJ0wlREZM67Wl%2Bxhdxd2ETwM39rGsvZztSlc%2BLSG0w387dPhRs3S9VdngzBTVnva08Hufq0u%2BtCxAh9pXj8k4ZqihXLoIypZZdYC8QMwscj6%2BzSUaxz%2FxssrLxZA0MpfYwzJQUvlvStA67MwAuA3EdbapgbOFFxDr%2FqEgROQNtq0eIdQLuTgLUKnbYgiRJClGIev5YbB38PgNyAaYrZ40kqZiAMevPaFF0DemgvZgh8dGW%2BdhK3hwpGVr2NKN15dnCCKspkJ3FGLrV1UPrV2W1iuQVl54K3mQH%2FSAVzvjWvAy4JLLiyjiKQGfec2nJkX2SSj6M3gXX08qipBY6NBlbjUm2Q5SRO7sa2247diQG3HbakAB2HHuElnofF%2F%2BU2GBd9yeCO9ETtVxfQlT%2FDpof7PUKYhcwSLJ4bss2B3hwFWgmMPX%2BKFAq5VtY7UD08fTYgGoh6RjgMgOQkCFgeZyG83152LStP9otZgKL56OLyeEoi%2FbmcmTF2g2wSZKovKm3eITbrjdWx8DuQxpb9toQcnw0iPICwn3PObDK86HKo6HiriQbw1cSwFKgBDSj0Pu0WMnxGHMOys%2Faxawn9%2BDuFgzTJHFL9sJka9MWjyM6r2%2BEIYoXSy4sKlSISuzGodxEqd%2BCAMHuV%2BWQKUq%2B%2F0kgyCHENn%2BvQtD4YacEtZG3BRJzzDjrd3tTOuWGfxfxDi%2FZY7H1m5RpTMx96ACU3tsgHsjEbkEKZhB%2B4LqOXFAaFib3OCuxyaR9fPd7M%2FZGkHXVnGIthCieDAGZf58OVufdraJ2c2SaUdG19IlzRaCEziXVQ%2F2BnVcuAe%2B9JFuYvj2po7lKjnipoXfJoY4Ma3eJatNXgK13cUKHrly7U9uAujkbRng6GPcAzDTmDlGCWprRzSDlOcZh9EGi%2BHQM7xJv531pgMRtGqSPILqwHyvmTjUEkBz3nQsXgP3dTEZtzDx4UUkI7NlEawicPpFWKPVW5BqQ5jQmQIbSpgEfA3sJrtnIYMwr9R2%2FS%2FHjlek2WzAlbFBN%2FYxmii13w%2Fdu19b5d9nQ11LnFvAYr8%2FoVblYNeuME0LGtk1%2FoazcKo7nLjcTfWxV10%2F2iAUbGt%2BtdM9m3duLjaOI72a0qe1rNn%2BGD%2FER6fC4mNkxADo%2FpZCX7718Ns%2B6HNbn4dX6UMazDSISLUFWA42rJsa56KuVrj7oqwqlmQdzPzBlS7mb95%2FnpSAEVXfZBQx4i%2BkhcHWSvJJ7Y233bdLWOlT80TWnLlnFIqaX4gtzFq%2BxdbH0kVoz%2F8gonRFRRJ11SA0eUf2Sgo0Y3Mf12VD4RBH7LhHLafCYbXLe1FDkYI9ZfNI9WI5tkMcd0F%2FF3JoaPhPgSUcDvRKqY%2Bq4W9ApKat42lX8%2FnFlAJT9t7PybxF1Lnxm1tGTgPWwTcjgzRkR6alI4ktzb2%2BQ%2B2Rp4jcYLESeEjPMf1RJAQqZ82KHoiiFLkCQH1NeUm06edss7uWpkZFBprz7MmTANni%2BNVaZy7GK7uuCDBxrxTAcbY5W1cxPCLOw6C58SPqhDNHdBKnL8MliRoCl%2BA6lJLrcTXqXjDUes0ZI9MGZ3P2mfH8uoOvf%2FUsxIG1yNcWXKGfEy%2FzhWCH%2BacH0Va6IwqNWNuyPanFFHZtqC8idEfC715483pzZ6TI1EhwVAt47gRWIgFkHJijm%2BdEhqn6kb3pKX8X2Li98sYatBFeGovV8rwitlwUkDMlgJ2zngWKfVuvtEJhUQHgEkFZLp5tfCK5pFpMzZtcOCfRRwvD10axKF6yNu%2BPpNb863Er1%2FGWZomw5ETEW8rLSC00eON8COlqwb3uw8qCqCgxQNnh4J97NJaE3xehpMdBgC8t05D80KYPNcF%2FIZVY4g%2BvQPC0KG4VIa9UZwkdy2W6laTo77LAP5RTGYdH6l7eZhS3XsLsb5OvZyQGCkEm%2BAp%2FKinB6bVytT1n0TgCKGoHOyT2eYEIUOLUC6NWzJPS4r4u4XvJTA7RnWq7bNKDvaqAa6JtFPKEjOHNkU5UlAMxl7gmJbRQMqK4ehJFXl0zda1kIRoH1l60YJVmZfjbyivV6PqeaU0HQxJEWB4LAUveGIAXvDUY0x0ZvrZW121%2FG2idVV7OTuL%2FPsbfVzxzGrySQ%2BUW0RFQAD02PvRXPuaPl83g3BdsujsE4xwD3X%2BJoR9juHfnLP7Bw51PabgVDJHN9DyFILEuglxvNUepujsScPS9vchSSYcv7PqD9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=G3Q%2BjzFaEwmal2YdOPC%2FnOr%2B60CpKL%2BgfE15Zqb9HPkaFGMGvJnJXTTJZnq%2Fk39%2BdxYr%2B%2BGxURMn%0AvQiCxIoQJALN06iIEMPVr6Ihvp%2BYBCmTxfJenbiJpr1eUUQL4fC7qmZ8xWWbuX4z882omXpcpwyJ%0A7KBZaimyq%2FRkTy4QazvrfldEuPj5x0DpDkKOVoxjZQIUn5155U%2FS1Wyb%2BUNnAoSx4vELycvxs8zj%0A1C4O189P9kDa3VkJd7CwF%2B7neTofd1L5jQBqB1JeaSgFyNhMLZ0FcUSymVM1wNbeLuvbfcSpFhCC%0AWbzr3rlL8O%2BSs1nMZcebHBrYOz7xiuhIWl8mcA%3D%3D"
|
842
|
network 2018.06.05 15:02:02.204 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Cache-Control": "no-cache, no-store"
|
843
|
network 2018.06.05 15:02:02.204 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Pragma": "no-cache"
|
844
|
network 2018.06.05 15:02:02.204 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Content-Length": "0"
|
845
|
network 2018.06.05 15:02:02.204 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Date": "Tue, 05 Jun 2018 13:02:01 GMT"
|
846
|
network 2018.06.05 15:02:02.205 UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46) : SOP-Check( "https://eid-prod.verwalt-berlin.de:8443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= false
|
847
|
default 2018.06.05 15:02:02.205 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:291) : SOP-Check failed, continue process
|
848
|
default 2018.06.05 15:02:02.205 ...shAddress::sendGetRequest(core/states/StateCheckRefreshAddress.cpp:133) : Send GET request to URL: "https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1omGhJc1NIlWCSRfv1R3j7bZe%2B%2FYtXzKIMIJ9%2BPhftyDP%2F357Luf9mJZX%2BPwy1f4Z%2BjrT8WQjflrqH756nviN%2Brrn3%2F905r0HTJ9d4p1Goe1%2BOleNKzffx%2F95et7Gb6Pyfpavw9JX6zft%2By7yxj6d%2BRn6Pu0jNuYjd3Xn%2Fhi3V5Dsv32onrbpvU7CBav%2FNs9Jf85G4ehyLaf760cSbd9S4ulew0%2F5wXIvoulKhZtHLYxLFLwh2inyIrXXrjFsnfF9ue1WH%2FsX8l%2FgcgUzlCa%2BpZlJPkNS2nkGw0hybciz8uUJoqUQMqvPyn8L1%2FzIi2T7H4EQWV2z0TxbymFlN8gEk1wNCuIMsPvmcNfdPbGX77%2Bd1qgJVKW6DcYSpBvGJXR31KUzL4RCEyTEAohJVTci9b1XSjDuiXD9stXBIKpbxDxDcI9GP0OId8h%2BGeCwuKvPwV%2FMfttqK9%2FGPn7b4uXv7fw%2F27gZF2L5YdRv%2F76V2P%2BixH%2FBP6G1R%2FC%2F4qnuyXbe%2F2nv9yYFz8FSfcu%2FvcX3%2Brdi7%2B77yy7zf8V%2FPWPl0zf%2F0Hsd2HIls%2B0FTnzl53%2BR8r96bz98m%2FC%2BGRL%2FpDz48HvHnU71HEcPx%2Foz%2BNSgQgEwSCEgbez3jP%2B68YlvyGEyiJJioxC7l9GJUVRkCRNwkWGUCmZoujXn7zPdKv%2Bf5QndEVfDNsN3N%2Fv7AbCKLZ6zH9iumpcXlvd%2F1%2FISooVRm6nTbMfdszX71rxUYZy%2FEPDfP03MiAQon%2Fol6%2Bv6r%2F%2BaSdFfgv5XWcMh1AExnIMhfGMxrPbZTMcT9AMxm9bpNT%2FFx2WNfkG%2Fzf%2Bjwr8pswTh%2BgfeP31D%2FfDY8tXlmzFr4ai8BfPccziVsyhsEylcIxtHLwdqdoYK%2FWePRhb0FmbOap4PLmLUdnqEbBM5DGtIxo29WMuH9i28kU4Yi5%2BqmsSYid%2FMY%2FfJ2Ye26pd1p9T2gi%2BwSoSA%2FsCVxu6GzhC%2BGL%2FtoZntN%2FXrN4XBgqkRyO8DI75bQFzHLEPiQ9PpLsktLdMVveYw5sUwd9x%2BICeUGDal1AbLCVx7iy5SorytqAyTuR%2BicOutaUOiuVxi%2Frgk0rdW%2B%2BdzmCxJ%2B8JqOEJx%2BMSYONSDkMc7zHln8f%2Bqv6Xf6f%2Ff6L%2Bl3%2Bn%2F3%2Bi%2Fpd%2Fp%2F%2B%2FVV9RWKX5AVQ71%2B1Log%2BIvdEWGcbkvjA2xdzuwXKVdruEwCDmx0qVZM8L2S1BnqEOzaSj0vE%2FCMYpeJ5g8Mt8VoMejGDC2ZV%2FbVhjKS54NswXWdWvSCAcUgkkLrMvzS6u5OR92jYbRx8NwV0JvoiCp5yYPSXSgf1g9vSTowXQuDH6LEz9kyKbhqr78OVdgWEaz5ZRBBvIiMqSJQWypmf7IeO9cos69hqv4SN3DFiFe5%2B%2B3UKPtxsNqes0yb7UnICPTJzjWDt%2BoVQLx72Qd89zJGepw0BEtUMkB5x0%2BchYdQxCoQ3kGJSQusjICyRmAWEr39CCxsLiPa3Yc4DDyjM%2B4hes0KYqj5ENwAVG3RbfEodYwKIkEEj5k%2BOF3%2BCpH7ErRfEYfLYYAyb9ofCMzbDjOR4S%2F%2Fvxkh1D%2BMI0DGMw6w%2Fvz%2FnjRuBQhJb%2FZ7TW39D6AdBiPULGBy4%2BGZ0l1eWpAedaGxJKFYIvTlOXM05SiwQSw4M%2BptLvS8iDWwFbOZGR38uspg6ZSaXglKkC1E%2BHiJyGqOCNad5ocFWj8Xgj43ukqy8YChB025fNUx7oih%2FaaSgJEGc23mZGIx9nqT5ltiiXgBx2HIja1%2FZOB971YhbQLF2jwUOm8g3pwaj4Qr%2FN6xC33IwNSIWRZ%2FkUNNWufSrJAT9m8762%2FO08AUI4ziwG6hOkiZxTqUr2JGmtxsONiEI3URZY3l%2BKbR5f4diR91b2%2FuV%2BAHV8FcZGo1nv6HRryBHGaBrUj6zhayWIWO%2BGUGEbsaDc0lJUx99qSW8X3onclywviYCMnO745Zc%2FgX%2BE0r%2BPnn8d%2FD2%2B%2FpjyR%2Br4Iy1xr6kult%2Bf%2Fpanfh%2F4Lb%2F%2Fqqgpl6z81hWV8uqiajqKdKy9AtAAypaf4TptjOlv6dB0AeRJRNLH8UauVSXOTt9Rz563yP5EOdG4%2BMP9FNT%2BbLNLemkRrc5NYCHj4Apy26CgKZmNLM4vYY%2FM1ZFhZXqKByoGJHsV2h4Rk7VD9ExXnvmQp8%2FTt0wIlIZBC8tYljfBGFOJ6Do6%2F2RPTV9YGvtMTLRICNu8wustpA8HcXqTmMMZMvoN3OJjer4Y1%2FrI6id0WehpQsCjRKrrqe7soqhGuYO96g0PgW0alEfMKwxPowttXK30Ku41BGW0ZHWbD%2FoYeVgmMWs7iUtlnu2QN1rSa2UlhE6nWLsQlSaTsyO9PrIEj2b7B1T%2FYup%2FGPoDrH9kNDdu%2F88APqaKHjP1iOGV7WV1CT6Fzeb5C0AVjUvx1hFkamNo3eS1BNarvpvuWJpERZPQXhfVE47EJr9reV%2FcoYa05ey9TEXdCngzIW3XuZdIVUhgNxGo0BidjPlUNEP%2B2F388%2BBoT7qNZTX1KZC47H6UQJM9%2FxAfE6mhsT7FnnJHFX4lF76nYsCaXD8tSJfZZkK7ameTL2oZHq3zvpwu4XWFXl5v29aYPG0e0PpcZ%2BQjlItsPcMm6Ci5hjpjvaatp65NKoB25qieuQGkaCCmNqPmTrHKia6h0Zez0ImNyysD61OAO4R%2B%2BUZFKlpUVesdDGN9k9n8gD%2B4pqN%2B%2BhAbrY%2B6g4TcApMlx4tnB1C3XW7PA%2BwjVim8Rk1JjVgT34e3lkQkccLGAH0oLUFP4pM2fYkUTsKTRxF%2B7RXpLXNT8PlmHOGD5%2BjPnknqqge7KuPN%2BjnKcnyHuvd4hYLD%2BMfEP%2Fi0aUxlnKfyzW1jh6jp3iiSYD6A%2Bn2NF7sB5fy0zkyeRm8x3irt%2Bwoz9tpsiVRp4XRb2D1jb6CPrA%2BQkL046N92Jk2PPisjiFr4zXm8lqbxYQUje2qi65TEx9eypfEAHow5l%2F6T18agSQGfpbo8ArIXQ34u1ICf49G2uypMJpcVG0KXx5Gw%2FqR7DZs3K1NYnsuXXkV76XR1ZqH0llcfHAUlu2ppuezOC9zUh4mPdManoJCvF1d1rE8VH2jgzx5JpxNYmw%2BdohrwLuPm0WLnY%2FAoyh%2BrzHyMXblg44hlAkbEiKcqKuCSDMFGYzLxAB1U2lCu3Xp81oLIkfJKz3Ij97r71Lyu3mCfd%2Fatn6WlWx9OUxaZDODAQBYmxJPepcUFK4WdFV3Xk7bxrA3b9R7Y5O%2Fqna1L9CMAdJKpioe%2FN2eKmc3zGWGIacHbrfequYLdawD3THMzQ6cNXO%2FgoJSYy2n69alsYZRln41lFvC1bN36wa4cE6cVZus2GmRVx3bSIIqCEK7AR0RL21p4JUJGInx9LqNqDbhtNDzj5b65QDDfgNUQ6isciEcsr1W%2FPDbUDd7Fi9Zo%2BjWBui2cITlIueA6L15VcijVLY8OP1NYFnQExvK8bGWPCPIrdMH4rUOZGIjK6Pj1MUfJZQGZK6rdmqDOjGxg%2FcmEqNsZsqRJnu4c9o0tchMfg%2FwSQacGkDcCX1DkDNo7sq3AmOvi6fYsMT%2BCjNLWfFIzJS6R5YWlSGm6iGLE4Z0w3NU5rcknujJsOWiTpYaU56dYEGrKilGhdJP7Nm82hmcdahoh7iYC2NcSDUu25ui1JcvDOsWfYCJS9dIVnFBeYVi1aDigT3zpGonQcH9GC%2BOEAZ3tWDQ0jXfxXKwM1io0dJuxwKUtc1g%2BuzMPAvlNIAIiU7erH064Fu8Uig9P3t605nY2XRRj72TQ9oPWBGmTOikxTXUl7ye10O3oY7JBo2COLTBHMCgVvgy39wFeJik4oCKdVkjlvCRDX9XkWAGJN1haWrGgFea1UwkMRuoKGHEeW3WRgfkKTxm32iwxiTfKfHQq2rUkzdaOQhFkG4OaCI83e5PZjTQvaO%2FX%2FcQep6MYSPVY%2BkIrurFFxL032QTQ2Lw8BCVzaucO885LWYPhIa%2FDefupJgRc5Yy5thX4VS%2BuhcT9IwOkT4DTpjJAdzn08UhOLY69lBV1HCDB6X1fsEHokkRvwcD0KZL%2BakM6985FqBgE6vOo8BvYE%2BEtu%2FNJz31MZZI8dzR%2Fogmtr3ceat4M6%2Bawvpl18FJkpVRopIR1dmw9iYcvwCum%2BVG1vh5bpMgdQQcM5hF5uEoasKqsNk%2BSHySpeSZ%2F8WOTUqi59YAKB4zlpu6rLMuluGO7GG0T%2FYkg63gO8eqnb9C69GybnsBxwmJTeEmP7zWAhviaWJiNtLX%2BKFyOsciFWAoZQ0jrcgUpIdDXDIQSPw5CqlWqQufwMkcRlbjSxQpBks73cZ6eIbRMDESpu4H1N6fAX3U8SXxaJTkpNp95pAkIq12aDtqwBZo7%2FP2IcymvCdLMvVXAGPEMuJ5YYXvLZRIfGkZOjTsyBjfpaQA1qq0GqN%2BAQ%2FTdUvMkl8ZbleY%2BvlI2A4qpudVp0rIDKYNZlKLYU9QSzV7ndymJluFdlN4xQ1Le5qcEw1FjVrhIZsApniz0GtibgnKF5%2BvN8py5FeNn1cx01vc11ABMD2It4ROX7vvdkhWN6qgUPcsYlXptVe86ZvnEGntiDmxfkk3Ne6i9vPHNDTEUOsFYBd4j0tlCeJmGpFsZnZl%2Br7YqhGuiiDJvQE%2BYR7PV73BDkV1dWVM9nzLRTuiBgjiJ05NVYQsKd490Z4M4Cww8Jug64WCCE20VGSCG9UFo%2FjTIMeK%2B%2BiQMHC1FUN622LqZJOmXz3BE%2BNeWdKPHQAoz9zwXEIUlZPGOOV0ZoHo6T2j3ICBiLq5tMgJLn5%2FpYT2x%2FHKZhH551jQr6va%2BFu1lNzQ%2FcNzZBe%2B9skHTyAqMSQt7N8oPHW%2FgM7E0bKFxhH2Yj1UZinIbpXKNpYW58IH2zBct1pWJpXyTK1YDlfXwNO8eJ00PLXBnynf8CgAni4SyDcyAbTFRPh93hblCgb5wx1s%2FdXdHmzpdGJibJjJnzqOUFt4GYfolczF3RsSR509T56f6tNjVPIscUo8zEmprXZ448RCDNiL0M6zJp03me8YvpnlNuRQeT9KjsSoKk9Xo54VJu903cF9ZALlFdISoZsq%2F6CTS1vZmA0HmTNpjm%2FQPHTm49%2By09kls6mHgK%2Fnm8iWDNjASGck4nQx87JQsj9yQBnNzUyiSMQ6Y8i07P2eJm2%2Bwqrt674qDRVbMZ7L6nBwqswuABGQAaEbVl4AomqcKvugo8vTzuek3tS1YFNgsOsa02YN2blX9RD%2BYLMikx4iubMAZcvfarKM4FlicBCWnG2FM81W26Rl1Syw22b3vPiOVILjIfaDGVlyyWSmfB4jSZ14R5bZ9w8SRE0j8qSxq44uP4YmeWVi6IfJpFYujWJwQZ7DcifdU8%2BuJ0PXY%2By8EAm2RFu3eu4y%2BUSdp2boLm9vXIr4mY0ngEU1C6RBAd7M3lOyJkAsCeEdOZHq7z8Kbbp5l3PXVcDZxVr%2FvLrn1jNVO8bIonfok06NGWRuzMTYLH0YkEduiJBFAIjGTioDoU9JAsISQbcoKJFCrJ4NW%2BUQ8qcYz59klqHtTsmJEFMYiKm2tFwdWXYrsoE7tZr591h2xk9H7wHH1eTcdXIXI7AqyyBD0mMMer9nXkKSoPSM01AiGySSrPCXCbDmm3Lr%2ByMjcCKiLNpA7GpxBOSVhYENpLSxRm6B1Cg3jrLAlTrHqfG7eXp%2Fmo9Us0BAeoloPGMLiB1UrCR3hR640Jk25wJjVtX%2BEIXIzn5xF4BesfzY3nB8kKlbVG0KFqb9AOwM6nPLVmnDuiOm0Pjm2slgCnJyU8BnnvqzniXCkZ2FqpSRLBInVTgk%2FlLoeqE08kbf%2FKTDomh5a2yOr9znHvEPog0U1li9LslRyxJWNl0fwL%2FX9OuRrSaJ3NDhTwn1sDX2thMFygliPRgqoVXPCYDdD6RQH8mjoVLokuCO%2Fpb26af%2Foi3PknaxWFFIw1v3zwp2OTA6IOn3sgAeyo4lgGNlcf0nd0i%2Fledbra3otTD2u9VG1Bc%2BUnxcD%2BXQr75%2FYfgmtUUs4H4o0ZprjHMf005TwRX3iLlLdBW0J3hlghzdAXxWRHe9zO5DkEEyNeSfvAvI3LfDyyXYt%2BcGNrK4D%2FLsL4zTweceK7gxhMQMzcuYa6ILjHcwEuo9HgeQCr5tSEi1LqHbaCzs5l7ClClSQxVgJ0wlREZM67Wl%2Bxhdxd2ETwM39rGsvZztSlc%2BLSG0w387dPhRs3S9VdngzBTVnva08Hufq0u%2BtCxAh9pXj8k4ZqihXLoIypZZdYC8QMwscj6%2BzSUaxz%2FxssrLxZA0MpfYwzJQUvlvStA67MwAuA3EdbapgbOFFxDr%2FqEgROQNtq0eIdQLuTgLUKnbYgiRJClGIev5YbB38PgNyAaYrZ40kqZiAMevPaFF0DemgvZgh8dGW%2BdhK3hwpGVr2NKN15dnCCKspkJ3FGLrV1UPrV2W1iuQVl54K3mQH%2FSAVzvjWvAy4JLLiyjiKQGfec2nJkX2SSj6M3gXX08qipBY6NBlbjUm2Q5SRO7sa2247diQG3HbakAB2HHuElnofF%2F%2BU2GBd9yeCO9ETtVxfQlT%2FDpof7PUKYhcwSLJ4bss2B3hwFWgmMPX%2BKFAq5VtY7UD08fTYgGoh6RjgMgOQkCFgeZyG83152LStP9otZgKL56OLyeEoi%2FbmcmTF2g2wSZKovKm3eITbrjdWx8DuQxpb9toQcnw0iPICwn3PObDK86HKo6HiriQbw1cSwFKgBDSj0Pu0WMnxGHMOys%2Faxawn9%2BDuFgzTJHFL9sJka9MWjyM6r2%2BEIYoXSy4sKlSISuzGodxEqd%2BCAMHuV%2BWQKUq%2B%2F0kgyCHENn%2BvQtD4YacEtZG3BRJzzDjrd3tTOuWGfxfxDi%2FZY7H1m5RpTMx96ACU3tsgHsjEbkEKZhB%2B4LqOXFAaFib3OCuxyaR9fPd7M%2FZGkHXVnGIthCieDAGZf58OVufdraJ2c2SaUdG19IlzRaCEziXVQ%2F2BnVcuAe%2B9JFuYvj2po7lKjnipoXfJoY4Ma3eJatNXgK13cUKHrly7U9uAujkbRng6GPcAzDTmDlGCWprRzSDlOcZh9EGi%2BHQM7xJv531pgMRtGqSPILqwHyvmTjUEkBz3nQsXgP3dTEZtzDx4UUkI7NlEawicPpFWKPVW5BqQ5jQmQIbSpgEfA3sJrtnIYMwr9R2%2FS%2FHjlek2WzAlbFBN%2FYxmii13w%2Fdu19b5d9nQ11LnFvAYr8%2FoVblYNeuME0LGtk1%2FoazcKo7nLjcTfWxV10%2F2iAUbGt%2BtdM9m3duLjaOI72a0qe1rNn%2BGD%2FER6fC4mNkxADo%2FpZCX7718Ns%2B6HNbn4dX6UMazDSISLUFWA42rJsa56KuVrj7oqwqlmQdzPzBlS7mb95%2FnpSAEVXfZBQx4i%2BkhcHWSvJJ7Y233bdLWOlT80TWnLlnFIqaX4gtzFq%2BxdbH0kVoz%2F8gonRFRRJ11SA0eUf2Sgo0Y3Mf12VD4RBH7LhHLafCYbXLe1FDkYI9ZfNI9WI5tkMcd0F%2FF3JoaPhPgSUcDvRKqY%2Bq4W9ApKat42lX8%2FnFlAJT9t7PybxF1Lnxm1tGTgPWwTcjgzRkR6alI4ktzb2%2BQ%2B2Rp4jcYLESeEjPMf1RJAQqZ82KHoiiFLkCQH1NeUm06edss7uWpkZFBprz7MmTANni%2BNVaZy7GK7uuCDBxrxTAcbY5W1cxPCLOw6C58SPqhDNHdBKnL8MliRoCl%2BA6lJLrcTXqXjDUes0ZI9MGZ3P2mfH8uoOvf%2FUsxIG1yNcWXKGfEy%2FzhWCH%2BacH0Va6IwqNWNuyPanFFHZtqC8idEfC715483pzZ6TI1EhwVAt47gRWIgFkHJijm%2BdEhqn6kb3pKX8X2Li98sYatBFeGovV8rwitlwUkDMlgJ2zngWKfVuvtEJhUQHgEkFZLp5tfCK5pFpMzZtcOCfRRwvD10axKF6yNu%2BPpNb863Er1%2FGWZomw5ETEW8rLSC00eON8COlqwb3uw8qCqCgxQNnh4J97NJaE3xehpMdBgC8t05D80KYPNcF%2FIZVY4g%2BvQPC0KG4VIa9UZwkdy2W6laTo77LAP5RTGYdH6l7eZhS3XsLsb5OvZyQGCkEm%2BAp%2FKinB6bVytT1n0TgCKGoHOyT2eYEIUOLUC6NWzJPS4r4u4XvJTA7RnWq7bNKDvaqAa6JtFPKEjOHNkU5UlAMxl7gmJbRQMqK4ehJFXl0zda1kIRoH1l60YJVmZfjbyivV6PqeaU0HQxJEWB4LAUveGIAXvDUY0x0ZvrZW121%2FG2idVV7OTuL%2FPsbfVzxzGrySQ%2BUW0RFQAD02PvRXPuaPl83g3BdsujsE4xwD3X%2BJoR9juHfnLP7Bw51PabgVDJHN9DyFILEuglxvNUepujsScPS9vchSSYcv7PqD9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=G3Q%2BjzFaEwmal2YdOPC%2FnOr%2B60CpKL%2BgfE15Zqb9HPkaFGMGvJnJXTTJZnq%2Fk39%2BdxYr%2B%2BGxURMn%0AvQiCxIoQJALN06iIEMPVr6Ihvp%2BYBCmTxfJenbiJpr1eUUQL4fC7qmZ8xWWbuX4z882omXpcpwyJ%0A7KBZaimyq%2FRkTy4QazvrfldEuPj5x0DpDkKOVoxjZQIUn5155U%2FS1Wyb%2BUNnAoSx4vELycvxs8zj%0A1C4O189P9kDa3VkJd7CwF%2B7neTofd1L5jQBqB1JeaSgFyNhMLZ0FcUSymVM1wNbeLuvbfcSpFhCC%0AWbzr3rlL8O%2BSs1nMZcebHBrYOz7xiuhIWl8mcA%3D%3D"
|
849
|
network 2018.06.05 15:02:02.205 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "eid-prod.connect.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1omGhJc1NIlWCSRfv1R3j7bZe%2B%2FYtXzKIMIJ9%2BPhftyDP%2F357Luf9mJZX%2BPwy1f4Z%2BjrT8WQjflrqH756nviN%2Brrn3%2F905r0HTJ9d4p1Goe1%2BOleNKzffx%2F95et7Gb6Pyfpavw9JX6zft%2By7yxj6d%2BRn6Pu0jNuYjd3Xn%2Fhi3V5Dsv32onrbpvU7CBav%2FNs9Jf85G4ehyLaf760cSbd9S4ulew0%2F5wXIvoulKhZtHLYxLFLwh2inyIrXXrjFsnfF9ue1WH%2FsX8l%2FgcgUzlCa%2BpZlJPkNS2nkGw0hybciz8uUJoqUQMqvPyn8L1%2FzIi2T7H4EQWV2z0TxbymFlN8gEk1wNCuIMsPvmcNfdPbGX77%2Bd1qgJVKW6DcYSpBvGJXR31KUzL4RCEyTEAohJVTci9b1XSjDuiXD9stXBIKpbxDxDcI9GP0OId8h%2BGeCwuKvPwV%2FMfttqK9%2FGPn7b4uXv7fw%2F27gZF2L5YdRv%2F76V2P%2BixH%2FBP6G1R%2FC%2F4qnuyXbe%2F2nv9yYFz8FSfcu%2FvcX3%2Brdi7%2B77yy7zf8V%2FPWPl0zf%2F0Hsd2HIls%2B0FTnzl53%2BR8r96bz98m%2FC%2BGRL%2FpDz48HvHnU71HEcPx%2Foz%2BNSgQgEwSCEgbez3jP%2B68YlvyGEyiJJioxC7l9GJUVRkCRNwkWGUCmZoujXn7zPdKv%2Bf5QndEVfDNsN3N%2Fv7AbCKLZ6zH9iumpcXlvd%2F1%2FISooVRm6nTbMfdszX71rxUYZy%2FEPDfP03MiAQon%2Fol6%2Bv6r%2F%2BaSdFfgv5XWcMh1AExnIMhfGMxrPbZTMcT9AMxm9bpNT%2FFx2WNfkG%2Fzf%2Bjwr8pswTh%2BgfeP31D%2FfDY8tXlmzFr4ai8BfPccziVsyhsEylcIxtHLwdqdoYK%2FWePRhb0FmbOap4PLmLUdnqEbBM5DGtIxo29WMuH9i28kU4Yi5%2BqmsSYid%2FMY%2FfJ2Ye26pd1p9T2gi%2BwSoSA%2FsCVxu6GzhC%2BGL%2FtoZntN%2FXrN4XBgqkRyO8DI75bQFzHLEPiQ9PpLsktLdMVveYw5sUwd9x%2BICeUGDal1AbLCVx7iy5SorytqAyTuR%2BicOutaUOiuVxi%2Frgk0rdW%2B%2BdzmCxJ%2B8JqOEJx%2BMSYONSDkMc7zHln8f%2Bqv6Xf6f%2Ff6L%2Bl3%2Bn%2F3%2Bi%2Fpd%2Fp%2F%2B%2FVV9RWKX5AVQ71%2B1Log%2BIvdEWGcbkvjA2xdzuwXKVdruEwCDmx0qVZM8L2S1BnqEOzaSj0vE%2FCMYpeJ5g8Mt8VoMejGDC2ZV%2FbVhjKS54NswXWdWvSCAcUgkkLrMvzS6u5OR92jYbRx8NwV0JvoiCp5yYPSXSgf1g9vSTowXQuDH6LEz9kyKbhqr78OVdgWEaz5ZRBBvIiMqSJQWypmf7IeO9cos69hqv4SN3DFiFe5%2B%2B3UKPtxsNqes0yb7UnICPTJzjWDt%2BoVQLx72Qd89zJGepw0BEtUMkB5x0%2BchYdQxCoQ3kGJSQusjICyRmAWEr39CCxsLiPa3Yc4DDyjM%2B4hes0KYqj5ENwAVG3RbfEodYwKIkEEj5k%2BOF3%2BCpH7ErRfEYfLYYAyb9ofCMzbDjOR4S%2F%2Fvxkh1D%2BMI0DGMw6w%2Fvz%2FnjRuBQhJb%2FZ7TW39D6AdBiPULGBy4%2BGZ0l1eWpAedaGxJKFYIvTlOXM05SiwQSw4M%2BptLvS8iDWwFbOZGR38uspg6ZSaXglKkC1E%2BHiJyGqOCNad5ocFWj8Xgj43ukqy8YChB025fNUx7oih%2FaaSgJEGc23mZGIx9nqT5ltiiXgBx2HIja1%2FZOB971YhbQLF2jwUOm8g3pwaj4Qr%2FN6xC33IwNSIWRZ%2FkUNNWufSrJAT9m8762%2FO08AUI4ziwG6hOkiZxTqUr2JGmtxsONiEI3URZY3l%2BKbR5f4diR91b2%2FuV%2BAHV8FcZGo1nv6HRryBHGaBrUj6zhayWIWO%2BGUGEbsaDc0lJUx99qSW8X3onclywviYCMnO745Zc%2FgX%2BE0r%2BPnn8d%2FD2%2B%2FpjyR%2Br4Iy1xr6kult%2Bf%2Fpanfh%2F4Lb%2F%2Fqqgpl6z81hWV8uqiajqKdKy9AtAAypaf4TptjOlv6dB0AeRJRNLH8UauVSXOTt9Rz563yP5EOdG4%2BMP9FNT%2BbLNLemkRrc5NYCHj4Apy26CgKZmNLM4vYY%2FM1ZFhZXqKByoGJHsV2h4Rk7VD9ExXnvmQp8%2FTt0wIlIZBC8tYljfBGFOJ6Do6%2F2RPTV9YGvtMTLRICNu8wustpA8HcXqTmMMZMvoN3OJjer4Y1%2FrI6id0WehpQsCjRKrrqe7soqhGuYO96g0PgW0alEfMKwxPowttXK30Ku41BGW0ZHWbD%2FoYeVgmMWs7iUtlnu2QN1rSa2UlhE6nWLsQlSaTsyO9PrIEj2b7B1T%2FYup%2FGPoDrH9kNDdu%2F88APqaKHjP1iOGV7WV1CT6Fzeb5C0AVjUvx1hFkamNo3eS1BNarvpvuWJpERZPQXhfVE47EJr9reV%2FcoYa05ey9TEXdCngzIW3XuZdIVUhgNxGo0BidjPlUNEP%2B2F388%2BBoT7qNZTX1KZC47H6UQJM9%2FxAfE6mhsT7FnnJHFX4lF76nYsCaXD8tSJfZZkK7ameTL2oZHq3zvpwu4XWFXl5v29aYPG0e0PpcZ%2BQjlItsPcMm6Ci5hjpjvaatp65NKoB25qieuQGkaCCmNqPmTrHKia6h0Zez0ImNyysD61OAO4R%2B%2BUZFKlpUVesdDGN9k9n8gD%2B4pqN%2B%2BhAbrY%2B6g4TcApMlx4tnB1C3XW7PA%2BwjVim8Rk1JjVgT34e3lkQkccLGAH0oLUFP4pM2fYkUTsKTRxF%2B7RXpLXNT8PlmHOGD5%2BjPnknqqge7KuPN%2BjnKcnyHuvd4hYLD%2BMfEP%2Fi0aUxlnKfyzW1jh6jp3iiSYD6A%2Bn2NF7sB5fy0zkyeRm8x3irt%2Bwoz9tpsiVRp4XRb2D1jb6CPrA%2BQkL046N92Jk2PPisjiFr4zXm8lqbxYQUje2qi65TEx9eypfEAHow5l%2F6T18agSQGfpbo8ArIXQ34u1ICf49G2uypMJpcVG0KXx5Gw%2FqR7DZs3K1NYnsuXXkV76XR1ZqH0llcfHAUlu2ppuezOC9zUh4mPdManoJCvF1d1rE8VH2jgzx5JpxNYmw%2BdohrwLuPm0WLnY%2FAoyh%2BrzHyMXblg44hlAkbEiKcqKuCSDMFGYzLxAB1U2lCu3Xp81oLIkfJKz3Ij97r71Lyu3mCfd%2Fatn6WlWx9OUxaZDODAQBYmxJPepcUFK4WdFV3Xk7bxrA3b9R7Y5O%2Fqna1L9CMAdJKpioe%2FN2eKmc3zGWGIacHbrfequYLdawD3THMzQ6cNXO%2FgoJSYy2n69alsYZRln41lFvC1bN36wa4cE6cVZus2GmRVx3bSIIqCEK7AR0RL21p4JUJGInx9LqNqDbhtNDzj5b65QDDfgNUQ6isciEcsr1W%2FPDbUDd7Fi9Zo%2BjWBui2cITlIueA6L15VcijVLY8OP1NYFnQExvK8bGWPCPIrdMH4rUOZGIjK6Pj1MUfJZQGZK6rdmqDOjGxg%2FcmEqNsZsqRJnu4c9o0tchMfg%2FwSQacGkDcCX1DkDNo7sq3AmOvi6fYsMT%2BCjNLWfFIzJS6R5YWlSGm6iGLE4Z0w3NU5rcknujJsOWiTpYaU56dYEGrKilGhdJP7Nm82hmcdahoh7iYC2NcSDUu25ui1JcvDOsWfYCJS9dIVnFBeYVi1aDigT3zpGonQcH9GC%2BOEAZ3tWDQ0jXfxXKwM1io0dJuxwKUtc1g%2BuzMPAvlNIAIiU7erH064Fu8Uig9P3t605nY2XRRj72TQ9oPWBGmTOikxTXUl7ye10O3oY7JBo2COLTBHMCgVvgy39wFeJik4oCKdVkjlvCRDX9XkWAGJN1haWrGgFea1UwkMRuoKGHEeW3WRgfkKTxm32iwxiTfKfHQq2rUkzdaOQhFkG4OaCI83e5PZjTQvaO%2FX%2FcQep6MYSPVY%2BkIrurFFxL032QTQ2Lw8BCVzaucO885LWYPhIa%2FDefupJgRc5Yy5thX4VS%2BuhcT9IwOkT4DTpjJAdzn08UhOLY69lBV1HCDB6X1fsEHokkRvwcD0KZL%2BakM6985FqBgE6vOo8BvYE%2BEtu%2FNJz31MZZI8dzR%2Fogmtr3ceat4M6%2Bawvpl18FJkpVRopIR1dmw9iYcvwCum%2BVG1vh5bpMgdQQcM5hF5uEoasKqsNk%2BSHySpeSZ%2F8WOTUqi59YAKB4zlpu6rLMuluGO7GG0T%2FYkg63gO8eqnb9C69GybnsBxwmJTeEmP7zWAhviaWJiNtLX%2BKFyOsciFWAoZQ0jrcgUpIdDXDIQSPw5CqlWqQufwMkcRlbjSxQpBks73cZ6eIbRMDESpu4H1N6fAX3U8SXxaJTkpNp95pAkIq12aDtqwBZo7%2FP2IcymvCdLMvVXAGPEMuJ5YYXvLZRIfGkZOjTsyBjfpaQA1qq0GqN%2BAQ%2FTdUvMkl8ZbleY%2BvlI2A4qpudVp0rIDKYNZlKLYU9QSzV7ndymJluFdlN4xQ1Le5qcEw1FjVrhIZsApniz0GtibgnKF5%2BvN8py5FeNn1cx01vc11ABMD2It4ROX7vvdkhWN6qgUPcsYlXptVe86ZvnEGntiDmxfkk3Ne6i9vPHNDTEUOsFYBd4j0tlCeJmGpFsZnZl%2Br7YqhGuiiDJvQE%2BYR7PV73BDkV1dWVM9nzLRTuiBgjiJ05NVYQsKd490Z4M4Cww8Jug64WCCE20VGSCG9UFo%2FjTIMeK%2B%2BiQMHC1FUN622LqZJOmXz3BE%2BNeWdKPHQAoz9zwXEIUlZPGOOV0ZoHo6T2j3ICBiLq5tMgJLn5%2FpYT2x%2FHKZhH551jQr6va%2BFu1lNzQ%2FcNzZBe%2B9skHTyAqMSQt7N8oPHW%2FgM7E0bKFxhH2Yj1UZinIbpXKNpYW58IH2zBct1pWJpXyTK1YDlfXwNO8eJ00PLXBnynf8CgAni4SyDcyAbTFRPh93hblCgb5wx1s%2FdXdHmzpdGJibJjJnzqOUFt4GYfolczF3RsSR509T56f6tNjVPIscUo8zEmprXZ448RCDNiL0M6zJp03me8YvpnlNuRQeT9KjsSoKk9Xo54VJu903cF9ZALlFdISoZsq%2F6CTS1vZmA0HmTNpjm%2FQPHTm49%2By09kls6mHgK%2Fnm8iWDNjASGck4nQx87JQsj9yQBnNzUyiSMQ6Y8i07P2eJm2%2Bwqrt674qDRVbMZ7L6nBwqswuABGQAaEbVl4AomqcKvugo8vTzuek3tS1YFNgsOsa02YN2blX9RD%2BYLMikx4iubMAZcvfarKM4FlicBCWnG2FM81W26Rl1Syw22b3vPiOVILjIfaDGVlyyWSmfB4jSZ14R5bZ9w8SRE0j8qSxq44uP4YmeWVi6IfJpFYujWJwQZ7DcifdU8%2BuJ0PXY%2By8EAm2RFu3eu4y%2BUSdp2boLm9vXIr4mY0ngEU1C6RBAd7M3lOyJkAsCeEdOZHq7z8Kbbp5l3PXVcDZxVr%2FvLrn1jNVO8bIonfok06NGWRuzMTYLH0YkEduiJBFAIjGTioDoU9JAsISQbcoKJFCrJ4NW%2BUQ8qcYz59klqHtTsmJEFMYiKm2tFwdWXYrsoE7tZr591h2xk9H7wHH1eTcdXIXI7AqyyBD0mMMer9nXkKSoPSM01AiGySSrPCXCbDmm3Lr%2ByMjcCKiLNpA7GpxBOSVhYENpLSxRm6B1Cg3jrLAlTrHqfG7eXp%2Fmo9Us0BAeoloPGMLiB1UrCR3hR640Jk25wJjVtX%2BEIXIzn5xF4BesfzY3nB8kKlbVG0KFqb9AOwM6nPLVmnDuiOm0Pjm2slgCnJyU8BnnvqzniXCkZ2FqpSRLBInVTgk%2FlLoeqE08kbf%2FKTDomh5a2yOr9znHvEPog0U1li9LslRyxJWNl0fwL%2FX9OuRrSaJ3NDhTwn1sDX2thMFygliPRgqoVXPCYDdD6RQH8mjoVLokuCO%2Fpb26af%2Foi3PknaxWFFIw1v3zwp2OTA6IOn3sgAeyo4lgGNlcf0nd0i%2Fledbra3otTD2u9VG1Bc%2BUnxcD%2BXQr75%2FYfgmtUUs4H4o0ZprjHMf005TwRX3iLlLdBW0J3hlghzdAXxWRHe9zO5DkEEyNeSfvAvI3LfDyyXYt%2BcGNrK4D%2FLsL4zTweceK7gxhMQMzcuYa6ILjHcwEuo9HgeQCr5tSEi1LqHbaCzs5l7ClClSQxVgJ0wlREZM67Wl%2Bxhdxd2ETwM39rGsvZztSlc%2BLSG0w387dPhRs3S9VdngzBTVnva08Hufq0u%2BtCxAh9pXj8k4ZqihXLoIypZZdYC8QMwscj6%2BzSUaxz%2FxssrLxZA0MpfYwzJQUvlvStA67MwAuA3EdbapgbOFFxDr%2FqEgROQNtq0eIdQLuTgLUKnbYgiRJClGIev5YbB38PgNyAaYrZ40kqZiAMevPaFF0DemgvZgh8dGW%2BdhK3hwpGVr2NKN15dnCCKspkJ3FGLrV1UPrV2W1iuQVl54K3mQH%2FSAVzvjWvAy4JLLiyjiKQGfec2nJkX2SSj6M3gXX08qipBY6NBlbjUm2Q5SRO7sa2247diQG3HbakAB2HHuElnofF%2F%2BU2GBd9yeCO9ETtVxfQlT%2FDpof7PUKYhcwSLJ4bss2B3hwFWgmMPX%2BKFAq5VtY7UD08fTYgGoh6RjgMgOQkCFgeZyG83152LStP9otZgKL56OLyeEoi%2FbmcmTF2g2wSZKovKm3eITbrjdWx8DuQxpb9toQcnw0iPICwn3PObDK86HKo6HiriQbw1cSwFKgBDSj0Pu0WMnxGHMOys%2Faxawn9%2BDuFgzTJHFL9sJka9MWjyM6r2%2BEIYoXSy4sKlSISuzGodxEqd%2BCAMHuV%2BWQKUq%2B%2F0kgyCHENn%2BvQtD4YacEtZG3BRJzzDjrd3tTOuWGfxfxDi%2FZY7H1m5RpTMx96ACU3tsgHsjEbkEKZhB%2B4LqOXFAaFib3OCuxyaR9fPd7M%2FZGkHXVnGIthCieDAGZf58OVufdraJ2c2SaUdG19IlzRaCEziXVQ%2F2BnVcuAe%2B9JFuYvj2po7lKjnipoXfJoY4Ma3eJatNXgK13cUKHrly7U9uAujkbRng6GPcAzDTmDlGCWprRzSDlOcZh9EGi%2BHQM7xJv531pgMRtGqSPILqwHyvmTjUEkBz3nQsXgP3dTEZtzDx4UUkI7NlEawicPpFWKPVW5BqQ5jQmQIbSpgEfA3sJrtnIYMwr9R2%2FS%2FHjlek2WzAlbFBN%2FYxmii13w%2Fdu19b5d9nQ11LnFvAYr8%2FoVblYNeuME0LGtk1%2FoazcKo7nLjcTfWxV10%2F2iAUbGt%2BtdM9m3duLjaOI72a0qe1rNn%2BGD%2FER6fC4mNkxADo%2FpZCX7718Ns%2B6HNbn4dX6UMazDSISLUFWA42rJsa56KuVrj7oqwqlmQdzPzBlS7mb95%2FnpSAEVXfZBQx4i%2BkhcHWSvJJ7Y233bdLWOlT80TWnLlnFIqaX4gtzFq%2BxdbH0kVoz%2F8gonRFRRJ11SA0eUf2Sgo0Y3Mf12VD4RBH7LhHLafCYbXLe1FDkYI9ZfNI9WI5tkMcd0F%2FF3JoaPhPgSUcDvRKqY%2Bq4W9ApKat42lX8%2FnFlAJT9t7PybxF1Lnxm1tGTgPWwTcjgzRkR6alI4ktzb2%2BQ%2B2Rp4jcYLESeEjPMf1RJAQqZ82KHoiiFLkCQH1NeUm06edss7uWpkZFBprz7MmTANni%2BNVaZy7GK7uuCDBxrxTAcbY5W1cxPCLOw6C58SPqhDNHdBKnL8MliRoCl%2BA6lJLrcTXqXjDUes0ZI9MGZ3P2mfH8uoOvf%2FUsxIG1yNcWXKGfEy%2FzhWCH%2BacH0Va6IwqNWNuyPanFFHZtqC8idEfC715483pzZ6TI1EhwVAt47gRWIgFkHJijm%2BdEhqn6kb3pKX8X2Li98sYatBFeGovV8rwitlwUkDMlgJ2zngWKfVuvtEJhUQHgEkFZLp5tfCK5pFpMzZtcOCfRRwvD10axKF6yNu%2BPpNb863Er1%2FGWZomw5ETEW8rLSC00eON8COlqwb3uw8qCqCgxQNnh4J97NJaE3xehpMdBgC8t05D80KYPNcF%2FIZVY4g%2BvQPC0KG4VIa9UZwkdy2W6laTo77LAP5RTGYdH6l7eZhS3XsLsb5OvZyQGCkEm%2BAp%2FKinB6bVytT1n0TgCKGoHOyT2eYEIUOLUC6NWzJPS4r4u4XvJTA7RnWq7bNKDvaqAa6JtFPKEjOHNkU5UlAMxl7gmJbRQMqK4ehJFXl0zda1kIRoH1l60YJVmZfjbyivV6PqeaU0HQxJEWB4LAUveGIAXvDUY0x0ZvrZW121%2FG2idVV7OTuL%2FPsbfVzxzGrySQ%2BUW0RFQAD02PvRXPuaPl83g3BdsujsE4xwD3X%2BJoR9juHfnLP7Bw51PabgVDJHN9DyFILEuglxvNUepujsScPS9vchSSYcv7PqD9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=G3Q%2BjzFaEwmal2YdOPC%2FnOr%2B60CpKL%2BgfE15Zqb9HPkaFGMGvJnJXTTJZnq%2Fk39%2BdxYr%2B%2BGxURMn%0AvQiCxIoQJALN06iIEMPVr6Ihvp%2BYBCmTxfJenbiJpr1eUUQL4fC7qmZ8xWWbuX4z882omXpcpwyJ%0A7KBZaimyq%2FRkTy4QazvrfldEuPj5x0DpDkKOVoxjZQIUn5155U%2FS1Wyb%2BUNnAoSx4vELycvxs8zj%0A1C4O189P9kDa3VkJd7CwF%2B7neTofd1L5jQBqB1JeaSgFyNhMLZ0FcUSymVM1wNbeLuvbfcSpFhCC%0AWbzr3rlL8O%2BSs1nMZcebHBrYOz7xiuhIWl8mcA%3D%3D"))
|
850
|
network 2018.06.05 15:02:02.205 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
851
|
network 2018.06.05 15:02:02.324 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
|
852
|
network 2018.06.05 15:02:02.324 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors
|
853
|
network 2018.06.05 15:02:02.324 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-GCM-SHA384, bits=256, proto=TLSv1.2)
|
854
|
network 2018.06.05 15:02:02.324 I (:0) : Used session protocol: "TlsV1_2"
|
855
|
network 2018.06.05 15:02:02.324 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
|
856
|
network 2018.06.05 15:02:02.324 I (:0) : Used peer certificate: QSslCertificate("3", "e7:08:a6:d2:a3:00:be:42", "7d4jrw+Ie/197bX/lQTapw==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.connect.verwalt-berlin.de")), QDateTime(2016-07-20 04:59:12.000 UTC Qt::TimeSpec(UTC)), QDateTime(2019-07-25 23:59:59.000 UTC Qt::TimeSpec(UTC)))
|
857
|
network 2018.06.05 15:02:02.324 I ...dress::onSslHandshakeDone(core/states/StateCheckRefreshAddress.cpp:162) : Handshake of tls connection done!
|
858
|
default 2018.06.05 15:02:02.324 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048
|
859
|
default 2018.06.05 15:02:02.325 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000
|
860
|
default 2018.06.05 15:02:02.325 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42"
|
861
|
default 2018.06.05 15:02:02.325 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "774af1694f2280b09d0d640948b22a77ea638f1157f517923c255bd2aae56b94"
|
862
|
default 2018.06.05 15:02:02.325 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
|
863
|
default 2018.06.05 15:02:02.325 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" for URL origin QUrl("https://eid-prod.connect.verwalt-berlin.de:443")
|
864
|
default 2018.06.05 15:02:02.325 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384
|
865
|
default 2018.06.05 15:02:02.325 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224
|
866
|
default 2018.06.05 15:02:02.421 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:212) : Status Code: 303 | redirect URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f")
|
867
|
network 2018.06.05 15:02:02.422 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Location": "https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f"
|
868
|
network 2018.06.05 15:02:02.422 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Cache-Control": "no-cache, no-store"
|
869
|
network 2018.06.05 15:02:02.422 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Pragma": "no-cache"
|
870
|
network 2018.06.05 15:02:02.422 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Content-Length": "0"
|
871
|
network 2018.06.05 15:02:02.422 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Date": "Tue, 05 Jun 2018 13:02:02 GMT"
|
872
|
network 2018.06.05 15:02:02.422 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Set-Cookie": "TS015f2d62=01d33437f96092ea00ce1bf9d1a67ceedbea601dcce261a9ef510cb657ac22bddf92e81c9ab4b7a5a7c393d2a6ab8a1b11950e9724; Path=/"
|
873
|
network 2018.06.05 15:02:02.422 UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46) : SOP-Check( "https://eid-prod.connect.verwalt-berlin.de:443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= true
|
874
|
default 2018.06.05 15:02:02.422 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:285) : SOP-Check succeeded, abort process
|
875
|
default 2018.06.05 15:02:02.422 ...s::fetchServerCertificate(core/states/StateCheckRefreshAddress.cpp:321) : Fetch TLS certificate for URL QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f")
|
876
|
network 2018.06.05 15:02:02.423 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "eid-prod.connect.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f"))
|
877
|
network 2018.06.05 15:02:02.424 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
878
|
network 2018.06.05 15:02:02.541 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
|
879
|
network 2018.06.05 15:02:02.541 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors
|
880
|
network 2018.06.05 15:02:02.541 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-GCM-SHA384, bits=256, proto=TLSv1.2)
|
881
|
network 2018.06.05 15:02:02.541 I (:0) : Used session protocol: "TlsV1_2"
|
882
|
network 2018.06.05 15:02:02.541 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
|
883
|
network 2018.06.05 15:02:02.541 I (:0) : Used peer certificate: QSslCertificate("3", "e7:08:a6:d2:a3:00:be:42", "7d4jrw+Ie/197bX/lQTapw==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.connect.verwalt-berlin.de")), QDateTime(2016-07-20 04:59:12.000 UTC Qt::TimeSpec(UTC)), QDateTime(2019-07-25 23:59:59.000 UTC Qt::TimeSpec(UTC)))
|
884
|
network 2018.06.05 15:02:02.541 I ...FetchingServerCertificate(core/states/StateCheckRefreshAddress.cpp:340) : Handshake of tls connection done!
|
885
|
default 2018.06.05 15:02:02.541 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048
|
886
|
default 2018.06.05 15:02:02.542 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000
|
887
|
default 2018.06.05 15:02:02.542 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42"
|
888
|
default 2018.06.05 15:02:02.542 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "774af1694f2280b09d0d640948b22a77ea638f1157f517923c255bd2aae56b94"
|
889
|
default 2018.06.05 15:02:02.542 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
|
890
|
default 2018.06.05 15:02:02.542 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" for URL origin QUrl("https://eid-prod.connect.verwalt-berlin.de:443")
|
891
|
default 2018.06.05 15:02:02.542 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384
|
892
|
default 2018.06.05 15:02:02.542 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224
|
893
|
default 2018.06.05 15:02:02.542 ...freshAddress::doneSuccess(core/states/StateCheckRefreshAddress.cpp:359) : Determined RefreshUrl: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f")
|
894
|
statema... 2018.06.05 15:02:02.542 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateCheckRefreshAddress" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
895
|
statema... 2018.06.05 15:02:02.542 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateWriteHistory"
|
896
|
statema... 2018.06.05 15:02:02.543 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateWriteHistory"
|
897
|
statema... 2018.06.05 15:02:02.628 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateWriteHistory" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
898
|
statema... 2018.06.05 15:02:02.628 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateRedirectBrowser"
|
899
|
statema... 2018.06.05 15:02:02.628 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateRedirectBrowser"
|
900
|
activation 2018.06.05 15:02:02.628 ...sendRedirect(activation/webservice/WebserviceActivationContext.cpp:126) : Redirect URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f&ResultMajor=ok")
|
901
|
activation 2018.06.05 15:02:02.628 ...sendRedirect(activation/webservice/WebserviceActivationContext.cpp:135) : Redirecting now to URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f&ResultMajor=ok")
|
902
|
statema... 2018.06.05 15:02:02.628 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateRedirectBrowser" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
903
|
statema... 2018.06.05 15:02:02.628 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "FinalState"
|
904
|
card_dr... 2018.06.05 15:02:02.631 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
|
905
|
statema... 2018.06.05 15:02:04.587 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "FinalState"
|
906
|
statema... 2018.06.05 15:02:04.587 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "FinalState" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
907
|
default 2018.06.05 15:02:04.610 AppController::onWorkflowFinished(core/controller/AppController.cpp:144) : governikus::AuthController done
|
908
|
support 2018.06.05 15:02:04.612 I AppController::onWorkflowFinished(core/controller/AppController.cpp:150) : Finished workflow AUTH
|
909
|
card_pcsc 2018.06.05 15:02:12.112 PcscReader::updateCard(card/pcsc/PcscReader.cpp:194) : old state: "(0x20022) CHANGED PRESENT" | new state: "(0x20422) CHANGED PRESENT UNPOWERED"
|
910
|
network 2018.06.05 17:03:02.250 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Host": "127.0.0.1:24727"
|
911
|
network 2018.06.05 17:03:02.250 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0"
|
912
|
network 2018.06.05 17:03:02.251 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8"
|
913
|
network 2018.06.05 17:03:02.251 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Accept-Language": "de,en-US;q=0.7,en;q=0.3"
|
914
|
network 2018.06.05 17:03:02.251 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Accept-Encoding": "gzip, deflate"
|
915
|
network 2018.06.05 17:03:02.251 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Connection": "keep-alive"
|
916
|
network 2018.06.05 17:03:02.251 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Upgrade-Insecure-Requests": "1"
|
917
|
network 2018.06.05 17:03:02.251 HttpRequest::onHeadersComplete(network/HttpRequest.cpp:153) : "GET" | QUrl("/eID-Client?tcTokenURL=https%3A%2F%2Feid-prod.connect.verwalt-berlin.de%2FBuergerKontoWeb%2FSAMLRequestServlet%3FsessionId%3D516d12bb-0894-4d35-b041-ca094178cf3e")
|
918
|
network 2018.06.05 17:03:02.251 HttpRequest::onHeadersComplete(network/HttpRequest.cpp:154) : Header completed
|
919
|
network 2018.06.05 17:03:02.251 HttpRequest::onMessageComplete(network/HttpRequest.cpp:144) : Message completed
|
920
|
activation 2018.06.05 17:03:02.251 ...onNewRequest(activation/webservice/WebserviceActivationHandler.cpp:101) : Request type: authentication
|
921
|
default 2018.06.05 17:03:02.251 ...troller::onAuthenticationRequest(core/controller/AppController.cpp:258) : authentication requested
|
922
|
card 2018.06.05 17:03:02.251 W ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:42) : No valid chains could be built
|
923
|
card 2018.06.05 17:03:02.251 W ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:42) : No valid chains could be built
|
924
|
support 2018.06.05 17:03:02.251 I EnumAction::Action](core/controller/AppController.cpp:399) : Starting new workflow AUTH
|
925
|
default 2018.06.05 17:03:02.252 EnumAction::Action](core/controller/AppController.cpp:405) : Start governikus::AuthController
|
926
|
statema... 2018.06.05 17:03:02.281 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateProcessing"
|
927
|
statema... 2018.06.05 17:03:02.281 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateProcessing"
|
928
|
statema... 2018.06.05 17:03:02.282 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateProcessing" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
929
|
statema... 2018.06.05 17:03:02.282 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateParseTcTokenUrl"
|
930
|
statema... 2018.06.05 17:03:02.282 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateParseTcTokenUrl"
|
931
|
statema... 2018.06.05 17:03:02.282 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateParseTcTokenUrl" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
932
|
statema... 2018.06.05 17:03:02.282 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateGetTcToken"
|
933
|
statema... 2018.06.05 17:03:02.282 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateGetTcToken"
|
934
|
default 2018.06.05 17:03:02.282 StateGetTcToken::run(core/states/StateGetTcToken.cpp:42) : Got TC Token URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLRequestServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e")
|
935
|
network 2018.06.05 17:03:02.283 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "eid-prod.connect.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLRequestServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e"))
|
936
|
network 2018.06.05 17:03:02.283 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
937
|
network 2018.06.05 17:03:02.494 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
|
938
|
network 2018.06.05 17:03:02.494 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors
|
939
|
network 2018.06.05 17:03:02.495 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-GCM-SHA384, bits=256, proto=TLSv1.2)
|
940
|
network 2018.06.05 17:03:02.495 I (:0) : Used session protocol: "TlsV1_2"
|
941
|
network 2018.06.05 17:03:02.495 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
|
942
|
network 2018.06.05 17:03:02.495 I (:0) : Used peer certificate: QSslCertificate("3", "e7:08:a6:d2:a3:00:be:42", "7d4jrw+Ie/197bX/lQTapw==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.connect.verwalt-berlin.de")), QDateTime(2016-07-20 04:59:12.000 UTC Qt::TimeSpec(UTC)), QDateTime(2019-07-25 23:59:59.000 UTC Qt::TimeSpec(UTC)))
|
943
|
network 2018.06.05 17:03:02.495 I StateGetTcToken::onSslHandshakeDone(core/states/StateGetTcToken.cpp:110) : Handshake of tls connection done!
|
944
|
default 2018.06.05 17:03:02.495 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048
|
945
|
default 2018.06.05 17:03:02.495 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000
|
946
|
default 2018.06.05 17:03:02.495 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384
|
947
|
default 2018.06.05 17:03:02.495 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224
|
948
|
default 2018.06.05 17:03:02.495 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" for URL origin QUrl("https://eid-prod.connect.verwalt-berlin.de:443")
|
949
|
default 2018.06.05 17:03:02.553 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:139) : Status Code: 303 | RedirectUrl: QUrl("https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?SAMLRequest=nZLRbtsgFIZfxeIeG2wcOyhOlM6bZK2bpqTtpN1YGJ%2BklpxDBtjb3r6kS6VNq3ox7hAc%2Fu%2FwndXm52mMZrBuMFgRHjMSAWrTD3isyP3dB1qSzXrl1GlMz3I7%2BUfcwfcJnI9CITr5%2B6Qik0VplBucRHUCJ72W%2B%2B2nW5nGTJ6t8UabkURb58D6EPXOoJtOYPdg50HD%2Fe62Io%2Fen51MEhh6Gkr6WBtE0D4OeD%2FU6GkHdhww7iG5mcAewX406M1X6JJL1A40DDNcXhzBbxy4S09NX%2BV80fO06ygrl4KKPstpxwSnWrGl4EWpDxmQqA49DagucK%2Bg%2FIMgSyGy5GjmVk0e0CfK%2FUJNoqauSFsUiwwAUqqhZ1SEXNot%2BZKmqswLdlimWRESG%2BcmaNB5hb4iKeMlZQvK8jueS5ZJlsacsW8k%2BmLNPPRgP4ePrUj9noUlyqLdAzaI9b5V4wi1ChQHGMO99uFwQ1lQyeOQuRBlSkWWCkGihxfPwQq5WpXPGPZPnW%2FbVC8Oyfr%2FWVbJ8%2BBcw9fX7d8Ttn4C&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=CnE9h9OqiiS41tdzbTAu6cIEUSRe3OZLQUUp341OS%2FAwW9ejKR3fM35EjqtxORgwz9ZFUqHa6RU4n2Fie64pJghHKV7287a3Lm%2F7QP6tk%2FhAn507LmQvIQpX5EAA3W7vlxKvaiYRXKW4YTqIJuXi17Esir5K9UynSKr273ULn1P2xvjCxhAAVoYaeO420tIYSxpA5LXqnu7kYf79ltajj2%2FaS47uWFeLyb9o%2FXkAMILwVhHROMapEp7z8cx%2B9jH5ItuYy3YOZn2bBBVjXMW3peWbEKqB7q5eNv%2BxV4wyAJCZxX4SwnX4rQ6gIQPDexWQMEBRfDKcEwQmljgjJ61qow%3D%3D")
|
950
|
network 2018.06.05 17:03:02.553 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Cache-Control": "no-cache, no-store"
|
951
|
network 2018.06.05 17:03:02.553 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Pragma": "no-cache"
|
952
|
network 2018.06.05 17:03:02.553 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Location": "https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?SAMLRequest=nZLRbtsgFIZfxeIeG2wcOyhOlM6bZK2bpqTtpN1YGJ%2BklpxDBtjb3r6kS6VNq3ox7hAc%2Fu%2FwndXm52mMZrBuMFgRHjMSAWrTD3isyP3dB1qSzXrl1GlMz3I7%2BUfcwfcJnI9CITr5%2B6Qik0VplBucRHUCJ72W%2B%2B2nW5nGTJ6t8UabkURb58D6EPXOoJtOYPdg50HD%2Fe62Io%2Fen51MEhh6Gkr6WBtE0D4OeD%2FU6GkHdhww7iG5mcAewX406M1X6JJL1A40DDNcXhzBbxy4S09NX%2BV80fO06ygrl4KKPstpxwSnWrGl4EWpDxmQqA49DagucK%2Bg%2FIMgSyGy5GjmVk0e0CfK%2FUJNoqauSFsUiwwAUqqhZ1SEXNot%2BZKmqswLdlimWRESG%2BcmaNB5hb4iKeMlZQvK8jueS5ZJlsacsW8k%2BmLNPPRgP4ePrUj9noUlyqLdAzaI9b5V4wi1ChQHGMO99uFwQ1lQyeOQuRBlSkWWCkGihxfPwQq5WpXPGPZPnW%2FbVC8Oyfr%2FWVbJ8%2BBcw9fX7d8Ttn4C&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=CnE9h9OqiiS41tdzbTAu6cIEUSRe3OZLQUUp341OS%2FAwW9ejKR3fM35EjqtxORgwz9ZFUqHa6RU4n2Fie64pJghHKV7287a3Lm%2F7QP6tk%2FhAn507LmQvIQpX5EAA3W7vlxKvaiYRXKW4YTqIJuXi17Esir5K9UynSKr273ULn1P2xvjCxhAAVoYaeO420tIYSxpA5LXqnu7kYf79ltajj2%2FaS47uWFeLyb9o%2FXkAMILwVhHROMapEp7z8cx%2B9jH5ItuYy3YOZn2bBBVjXMW3peWbEKqB7q5eNv%2BxV4wyAJCZxX4SwnX4rQ6gIQPDexWQMEBRfDKcEwQmljgjJ61qow%3D%3D"
|
953
|
network 2018.06.05 17:03:02.553 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Content-Type": "text/html"
|
954
|
network 2018.06.05 17:03:02.553 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Content-Length": "0"
|
955
|
network 2018.06.05 17:03:02.553 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Date": "Tue, 05 Jun 2018 15:03:01 GMT"
|
956
|
network 2018.06.05 17:03:02.553 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Set-Cookie": "TS015f2d62=01d33437f99f830f21e1cdc71a11b77fe6b9aeedcd7b0848b7009167cacf04fac5c3cce811437943cfe8a82a6647be80f47766aece; Path=/"
|
957
|
network 2018.06.05 17:03:02.553 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8443, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?SAMLRequest=nZLRbtsgFIZfxeIeG2wcOyhOlM6bZK2bpqTtpN1YGJ%2BklpxDBtjb3r6kS6VNq3ox7hAc%2Fu%2FwndXm52mMZrBuMFgRHjMSAWrTD3isyP3dB1qSzXrl1GlMz3I7%2BUfcwfcJnI9CITr5%2B6Qik0VplBucRHUCJ72W%2B%2B2nW5nGTJ6t8UabkURb58D6EPXOoJtOYPdg50HD%2Fe62Io%2Fen51MEhh6Gkr6WBtE0D4OeD%2FU6GkHdhww7iG5mcAewX406M1X6JJL1A40DDNcXhzBbxy4S09NX%2BV80fO06ygrl4KKPstpxwSnWrGl4EWpDxmQqA49DagucK%2Bg%2FIMgSyGy5GjmVk0e0CfK%2FUJNoqauSFsUiwwAUqqhZ1SEXNot%2BZKmqswLdlimWRESG%2BcmaNB5hb4iKeMlZQvK8jueS5ZJlsacsW8k%2BmLNPPRgP4ePrUj9noUlyqLdAzaI9b5V4wi1ChQHGMO99uFwQ1lQyeOQuRBlSkWWCkGihxfPwQq5WpXPGPZPnW%2FbVC8Oyfr%2FWVbJ8%2BBcw9fX7d8Ttn4C&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=CnE9h9OqiiS41tdzbTAu6cIEUSRe3OZLQUUp341OS%2FAwW9ejKR3fM35EjqtxORgwz9ZFUqHa6RU4n2Fie64pJghHKV7287a3Lm%2F7QP6tk%2FhAn507LmQvIQpX5EAA3W7vlxKvaiYRXKW4YTqIJuXi17Esir5K9UynSKr273ULn1P2xvjCxhAAVoYaeO420tIYSxpA5LXqnu7kYf79ltajj2%2FaS47uWFeLyb9o%2FXkAMILwVhHROMapEp7z8cx%2B9jH5ItuYy3YOZn2bBBVjXMW3peWbEKqB7q5eNv%2BxV4wyAJCZxX4SwnX4rQ6gIQPDexWQMEBRfDKcEwQmljgjJ61qow%3D%3D"))
|
958
|
network 2018.06.05 17:03:02.554 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
959
|
network 2018.06.05 17:03:02.810 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
|
960
|
network 2018.06.05 17:03:02.810 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors
|
961
|
network 2018.06.05 17:03:02.810 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-SHA384, bits=256, proto=TLSv1.2)
|
962
|
network 2018.06.05 17:03:02.810 I (:0) : Used session protocol: "TlsV1_2"
|
963
|
network 2018.06.05 17:03:02.810 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
|
964
|
network 2018.06.05 17:03:02.810 I (:0) : Used peer certificate: QSslCertificate("3", "3c:3f:e6:1c:7c:28:28:d9", "Kfl3PTkdwoi1P7sQWG1dvQ==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.verwalt-berlin.de")), QDateTime(2017-10-16 13:01:51.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-10-21 23:59:59.000 UTC Qt::TimeSpec(UTC)))
|
965
|
network 2018.06.05 17:03:02.810 I StateGetTcToken::onSslHandshakeDone(core/states/StateGetTcToken.cpp:110) : Handshake of tls connection done!
|
966
|
default 2018.06.05 17:03:02.810 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048
|
967
|
default 2018.06.05 17:03:02.810 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000
|
968
|
default 2018.06.05 17:03:02.811 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384
|
969
|
default 2018.06.05 17:03:02.811 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224
|
970
|
default 2018.06.05 17:03:02.811 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" for URL origin QUrl("https://eid-prod.verwalt-berlin.de:8443")
|
971
|
default 2018.06.05 17:03:02.987 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:139) : Status Code: 303 | RedirectUrl: QUrl("https://eid-prod.verwalt-berlin.de:8443/ecardpaos/startauthentication?RestrictedId=true&idProviderUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8443%2Fgov_autent%2Fasync&IssuingState=true&FamilyNames=true&ArtisticName=true&PlaceOfBirth=true&AcademicTitle=true&PlaceOfResidence=true&Signature=Zeb2W0YvAHdKS2VViQ4a1jZkG%2FGjSpcgAnH7fwYvWr0OyRwdxLArXR%2BsInIsPECtwSyOdf9QBw3f%0AOyFWKXHrVacDZ6vIccWeWAFcFzWSljEANLlKT71vtWfBC02iYq3hMc2bxOk2tA3MY39EDQTi19Kb%0Ay4J4GC19dk79%2BzvsjPPnxPR0%2FseJN7GINJQxIW3H5jcknAarLJVJCmn0PTkRa%2B%2BmWdPOJDtTbbUR%0AWc0DE84EpODCacXyQk72l3FuDL239zcgusF3NtrskB7jdjhmkNVYN0lI1SPwyHYCg7UbXV7EQ5bM%0AjP5LMH2Ljf4I6lyQcurylODDYbO09IXppCmfzw%3D%3D&Nationality=true&DateOfBirth=true&GivenNames=true&requestID=1ae20737a5f5e3dad602d47ee10111f5610d1845&receiverUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8445%2Fecardpaos%2Fpaosreceiver&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%2Frsa-sha256&DocumentType=true&ResidencePermitI=true")
|
972
|
network 2018.06.05 17:03:02.988 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Server": "Apache-Coyote/1.1"
|
973
|
network 2018.06.05 17:03:02.988 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Location": "https://eid-prod.verwalt-berlin.de:8443/ecardpaos/startauthentication?RestrictedId=true&idProviderUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8443%2Fgov_autent%2Fasync&IssuingState=true&FamilyNames=true&ArtisticName=true&PlaceOfBirth=true&AcademicTitle=true&PlaceOfResidence=true&Signature=Zeb2W0YvAHdKS2VViQ4a1jZkG%2FGjSpcgAnH7fwYvWr0OyRwdxLArXR%2BsInIsPECtwSyOdf9QBw3f%0AOyFWKXHrVacDZ6vIccWeWAFcFzWSljEANLlKT71vtWfBC02iYq3hMc2bxOk2tA3MY39EDQTi19Kb%0Ay4J4GC19dk79%2BzvsjPPnxPR0%2FseJN7GINJQxIW3H5jcknAarLJVJCmn0PTkRa%2B%2BmWdPOJDtTbbUR%0AWc0DE84EpODCacXyQk72l3FuDL239zcgusF3NtrskB7jdjhmkNVYN0lI1SPwyHYCg7UbXV7EQ5bM%0AjP5LMH2Ljf4I6lyQcurylODDYbO09IXppCmfzw%3D%3D&Nationality=true&DateOfBirth=true&GivenNames=true&requestID=1ae20737a5f5e3dad602d47ee10111f5610d1845&receiverUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8445%2Fecardpaos%2Fpaosreceiver&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%2Frsa-sha256&DocumentType=true&ResidencePermitI=true"
|
974
|
network 2018.06.05 17:03:02.988 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Cache-Control": "no-cache, no-store"
|
975
|
network 2018.06.05 17:03:02.988 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Pragma": "no-cache"
|
976
|
network 2018.06.05 17:03:02.988 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Content-Length": "0"
|
977
|
network 2018.06.05 17:03:02.988 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Date": "Tue, 05 Jun 2018 15:03:02 GMT"
|
978
|
network 2018.06.05 17:03:02.988 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8443, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8443/ecardpaos/startauthentication?RestrictedId=true&idProviderUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8443%2Fgov_autent%2Fasync&IssuingState=true&FamilyNames=true&ArtisticName=true&PlaceOfBirth=true&AcademicTitle=true&PlaceOfResidence=true&Signature=Zeb2W0YvAHdKS2VViQ4a1jZkG%2FGjSpcgAnH7fwYvWr0OyRwdxLArXR%2BsInIsPECtwSyOdf9QBw3f%0AOyFWKXHrVacDZ6vIccWeWAFcFzWSljEANLlKT71vtWfBC02iYq3hMc2bxOk2tA3MY39EDQTi19Kb%0Ay4J4GC19dk79%2BzvsjPPnxPR0%2FseJN7GINJQxIW3H5jcknAarLJVJCmn0PTkRa%2B%2BmWdPOJDtTbbUR%0AWc0DE84EpODCacXyQk72l3FuDL239zcgusF3NtrskB7jdjhmkNVYN0lI1SPwyHYCg7UbXV7EQ5bM%0AjP5LMH2Ljf4I6lyQcurylODDYbO09IXppCmfzw%3D%3D&Nationality=true&DateOfBirth=true&GivenNames=true&requestID=1ae20737a5f5e3dad602d47ee10111f5610d1845&receiverUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8445%2Fecardpaos%2Fpaosreceiver&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%2Frsa-sha256&DocumentType=true&ResidencePermitI=true"))
|
979
|
network 2018.06.05 17:03:02.988 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
980
|
default 2018.06.05 17:03:03.033 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:139) : Status Code: 200 | RedirectUrl: QUrl("")
|
981
|
network 2018.06.05 17:03:03.033 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Server": "Apache-Coyote/1.1"
|
982
|
network 2018.06.05 17:03:03.033 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Content-Length": "640"
|
983
|
network 2018.06.05 17:03:03.033 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Date": "Tue, 05 Jun 2018 15:03:02 GMT"
|
984
|
default 2018.06.05 17:03:03.033 TcToken::parse(core/TcToken.cpp:39) : Parsing TcToken:
|
985
|
default 2018.06.05 17:03:03.033 TcToken::parse(core/TcToken.cpp:40) : "<TCTokenType>\n<ServerAddress>https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver</ServerAddress>\n<SessionIdentifier>1ae20737a5f5e3dad602d47ee10111f5610d1845</SessionIdentifier>\n<RefreshAddress>https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=1ae20737a5f5e3dad602d47ee10111f5610d1845</RefreshAddress>\n<Binding>urn:liberty:paos:2006-08</Binding>\n<PathSecurity-Protocol>urn:ietf:rfc:4279</PathSecurity-Protocol>\n<PathSecurity-Parameter>\n<PSK>3C0DA83E8AC57AD17B225E06D57494B2A80EA78CCA1B0D16028F95842DE23DC28F2DB96D154AF240935C86B51D2BE863EFF5E81B7BBFB5FF62A2F85C41CF56C6</PSK>\n</PathSecurity-Parameter>\n</TCTokenType>\n"
|
986
|
statema... 2018.06.05 17:03:03.034 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateGetTcToken" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
987
|
statema... 2018.06.05 17:03:03.034 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateStartPaos"
|
988
|
statema... 2018.06.05 17:03:03.034 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateStartPaos"
|
989
|
statema... 2018.06.05 17:03:03.034 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateStartPaos" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
990
|
statema... 2018.06.05 17:03:03.034 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendStartPaos"
|
991
|
statema... 2018.06.05 17:03:03.035 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendStartPaos"
|
992
|
network 2018.06.05 17:03:03.035 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data:
|
993
|
"<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n <paos:EndpointReference>\n <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n <paos:MetaData>\n <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n </paos:MetaData>\n </paos:EndpointReference>\n </paos:PAOS>\n <wsa:ReplyTo>\n <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n </wsa:ReplyTo>\n <wsa:MessageID>urn:uuid:ac05ad57-94e8-4ac0-ab3e-c5a3696a759a</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n <StartPAOS xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n <SessionIdentifier>1ae20737a5f5e3dad602d47ee10111f5610d1845</SessionIdentifier>\n <ConnectionHandle xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"ConnectionHandleType\">\n <CardApplication>e80704007f00070302</CardApplication>\n <SlotHandle>00</SlotHandle>\n </ConnectionHandle>\n <UserAgent>\n <Name>AusweisApp2</Name>\n <VersionMajor>1</VersionMajor>\n <VersionMinor>14</VersionMinor>\n <VersionSubminor>0</VersionSubminor>\n </UserAgent>\n <SupportedAPIVersions>\n <Major>1</Major>\n <Minor>1</Minor>\n <Subminor>5</Subminor>\n </SupportedAPIVersions>\n </StartPAOS>\n </soap:Body>\n</soap:Envelope>\n"
|
994
|
network 2018.06.05 17:03:03.035 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
|
995
|
network 2018.06.05 17:03:03.035 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
996
|
network 2018.06.05 17:03:03.144 ...dKeyAuthenticationRequired(core/states/StateGenericSendReceive.cpp:141) : pre-shared key authentication requested: "Hint"
|
997
|
network 2018.06.05 17:03:03.200 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
|
998
|
network 2018.06.05 17:03:03.200 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors
|
999
|
network 2018.06.05 17:03:03.200 I (:0) : Used session cipher QSslCipher(name=RSA-PSK-AES256-CBC-SHA, bits=256, proto=SSLv3)
|
1000
|
network 2018.06.05 17:03:03.200 I (:0) : Used session protocol: "TlsV1_2"
|
1001
|
network 2018.06.05 17:03:03.200 I (:0) : Used ephemeral server key:
|
1002
|
network 2018.06.05 17:03:03.200 I (:0) : Used peer certificate: QSslCertificate("3", "3c:3f:e6:1c:7c:28:28:d9", "Kfl3PTkdwoi1P7sQWG1dvQ==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.verwalt-berlin.de")), QDateTime(2017-10-16 13:01:51.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-10-21 23:59:59.000 UTC Qt::TimeSpec(UTC)))
|
1003
|
network 2018.06.05 17:03:03.200 I ...eceive::onSslHandshakeDone(core/states/StateGenericSendReceive.cpp:115) : Handshake of tls connection done!
|
1004
|
default 2018.06.05 17:03:03.200 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048
|
1005
|
default 2018.06.05 17:03:03.200 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000
|
1006
|
default 2018.06.05 17:03:03.201 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" for URL origin QUrl("https://eid-prod.verwalt-berlin.de:8445")
|
1007
|
network 2018.06.05 17:03:03.242 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
|
1008
|
network 2018.06.05 17:03:03.242 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
|
1009
|
network 2018.06.05 17:03:03.242 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
|
1010
|
network 2018.06.05 17:03:03.242 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
|
1011
|
network 2018.06.05 17:03:03.242 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:02 GMT"
|
1012
|
network 2018.06.05 17:03:03.242 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
|
1013
|
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n <soap:Header>\n <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id984\" refToMessageID=\"1ae20737a5f5e3dad602d47ee10111f5610d1845\"/>\n </soap:Header>\n <soap:Body>\n <InitializeFramework xmlns=\"http://www.bsi.bund.de/ecard/api/1.1\"/>\n</soap:Body>\n</soap:Envelope>\n"
|
1014
|
network 2018.06.05 17:03:03.242 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: INITIALIZE_FRAMEWORK
|
1015
|
statema... 2018.06.05 17:03:03.242 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendStartPaos" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1016
|
statema... 2018.06.05 17:03:03.242 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateInitializeFramework"
|
1017
|
statema... 2018.06.05 17:03:03.242 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateInitializeFramework"
|
1018
|
statema... 2018.06.05 17:03:03.242 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateInitializeFramework" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1019
|
statema... 2018.06.05 17:03:03.242 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendInitializeFrameworkResponse"
|
1020
|
statema... 2018.06.05 17:03:03.243 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendInitializeFrameworkResponse"
|
1021
|
network 2018.06.05 17:03:03.243 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data:
|
1022
|
"<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n <paos:EndpointReference>\n <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n <paos:MetaData>\n <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n </paos:MetaData>\n </paos:EndpointReference>\n </paos:PAOS>\n <wsa:ReplyTo>\n <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n </wsa:ReplyTo>\n <wsa:MessageID>urn:uuid:276ae287-3cce-4cfb-9b08-98197a79f49c</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n <InitializeFrameworkResponse xmlns=\"http://www.bsi.bund.de/ecard/api/1.1\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n </Result>\n <Version>\n <Major>1</Major>\n <Minor>1</Minor>\n <SubMinor>5</SubMinor>\n </Version>\n </InitializeFrameworkResponse>\n </soap:Body>\n</soap:Envelope>\n"
|
1023
|
network 2018.06.05 17:03:03.243 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
|
1024
|
network 2018.06.05 17:03:03.243 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
1025
|
network 2018.06.05 17:03:03.284 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
|
1026
|
network 2018.06.05 17:03:03.284 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
|
1027
|
network 2018.06.05 17:03:03.284 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
|
1028
|
network 2018.06.05 17:03:03.284 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
|
1029
|
network 2018.06.05 17:03:03.285 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:02 GMT"
|
1030
|
network 2018.06.05 17:03:03.285 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
|
1031
|
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n <soap:Header>\n <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id985\" refToMessageID=\"1ae20737a5f5e3dad602d47ee10111f5610d1845\"/>\n </soap:Header>\n <soap:Body>\n <DIDList xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<ConnectionHandle xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"ConnectionHandle\">\n<CardApplication>E80704007F00070302</CardApplication>\n<SlotHandle>00</SlotHandle>\n</ConnectionHandle>\n</DIDList>\n</soap:Body>\n</soap:Envelope>\n"
|
1032
|
network 2018.06.05 17:03:03.285 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DID_LIST
|
1033
|
statema... 2018.06.05 17:03:03.285 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendInitializeFrameworkResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1034
|
statema... 2018.06.05 17:03:03.285 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateDidList"
|
1035
|
statema... 2018.06.05 17:03:03.285 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateDidList"
|
1036
|
statema... 2018.06.05 17:03:03.285 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateDidList" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1037
|
statema... 2018.06.05 17:03:03.285 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendDIDListResponse"
|
1038
|
statema... 2018.06.05 17:03:03.285 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendDIDListResponse"
|
1039
|
network 2018.06.05 17:03:03.286 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data:
|
1040
|
"<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n <paos:EndpointReference>\n <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n <paos:MetaData>\n <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n </paos:MetaData>\n </paos:EndpointReference>\n </paos:PAOS>\n <wsa:ReplyTo>\n <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n </wsa:ReplyTo>\n <wsa:MessageID>urn:uuid:f2994bbc-3012-4c23-9676-7f34d1b50623</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n <DIDListResponse xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n </Result>\n <DIDNameList>\n <DIDName>PIN</DIDName>\n </DIDNameList>\n </DIDListResponse>\n </soap:Body>\n</soap:Envelope>\n"
|
1041
|
network 2018.06.05 17:03:03.286 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
|
1042
|
network 2018.06.05 17:03:03.286 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
1043
|
network 2018.06.05 17:03:03.368 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
|
1044
|
network 2018.06.05 17:03:03.368 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
|
1045
|
network 2018.06.05 17:03:03.368 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
|
1046
|
network 2018.06.05 17:03:03.368 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
|
1047
|
network 2018.06.05 17:03:03.368 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:02 GMT"
|
1048
|
network 2018.06.05 17:03:03.368 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
|
1049
|
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n <soap:Header>\n <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id986\" refToMessageID=\"1ae20737a5f5e3dad602d47ee10111f5610d1845\"/>\n </soap:Header>\n <soap:Body>\n <DIDAuthenticate xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<ConnectionHandle xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"ConnectionHandle\">\n<CardApplication>E80704007F00070302</CardApplication>\n<SlotHandle>00</SlotHandle>\n</ConnectionHandle>\n<DIDName>PIN</DIDName>\n<AuthenticationProtocolData Protocol=\"urn:oid:1.3.162.15480.3.0.14.2\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"EAC1InputType\">\n<Certificate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ertificate>\n<Certificate>7F2181E77F4E81A05F290100420E44454356434165494430303130347F494F060A04007F00070202020203864104623D7CEBFF7918590B4D5C53D507DCF1EE3AE9E20A5E62AFEB8DBFC958F7EFFB4CCF7952FDA2B3F6254E9DC34FE5ECD1E084D4C23658319EC5BBE5A009D1E0EC5F2010444544566549444454523130313433337F4C12060904007F0007030102025305400513FF975F25060108000501075F24060108000801055F374054483CEF8791A094D40343B753FA83689C2B56256BB8428C56DDCDAB94709CAE8107DE8649DC37F7D130D75E36936CD85DAC818D1297C348BA408DA179A20CE4</Certificate>\n<Certificate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ertificate>\n<Certificate>7F218201B67F4E82016E5F290100420E44454356434165494430303130327F4982011D060A04007F000702020202038120A9FB57DBA1EEA9BC3E660A909D838D726E3BF623D52620282013481D1F6E537782207D5A0975FC2C3057EEF67530417AFFE7FB8055C126DC5C6CE94A4B44F330B5D9832026DC5C6CE94A4B44F330B5D9BBD77CBF958416295CF7E1CE6BCCDC18FF8C07B68441048BD2AEB9CB7E57CB2C4B482FFC81B7AFB9DE27E1E3BD23C23A4453BD9ACE3262547EF835C3DAC4FD97F8461A14611DC9C27745132DED8E545C1D54C72F0469978520A9FB57DBA1EEA9BC3E660A909D838D718C397AA3B561A6F7901E0E82974856A78641048925419FC7F194922CFC6B8DD25AE6A19C1B59216E6CF06270E5D75CFD64205F55CF867BBFEFEEFD6E680E1FD197F18AB684484901362568EFC9ADB5C6018D728701015F200E44454356434165494430303130337F4C12060904007F0007030102025305FC0F13FFFF5F25060102010200035F24060105010200035F37404D6F08A86A4F18409F6685387DD3C6A7FF5D68EA4F7714A861BBB3BB721D05D3014ADF1763C9292F715D8E94EE9B3E1B73AB1382414EBF39DFB3B0FB6C09DBEB</Certificate>\n<CertificateDescription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ertificateDescription>\n<RequiredCHAT>7F4C12060904007F0007030102025305000503FB04</RequiredCHAT>\n<OptionalCHAT>7F4C12060904007F00070301020253050000000000</OptionalCHAT>\n<AuthenticatedAuxiliaryData>67177315060904007F00070301040253083230313830363035</AuthenticatedAuxiliaryData>\n</AuthenticationProtocolData>\n</DIDAuthenticate>\n</soap:Body>\n</soap:Envelope>\n"
|
1050
|
paos 2018.06.05 17:03:03.369 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:36) : "ConnectionHandle"
|
1051
|
paos 2018.06.05 17:03:03.369 ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "CardApplication"
|
1052
|
paos 2018.06.05 17:03:03.369 ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "SlotHandle"
|
1053
|
paos 2018.06.05 17:03:03.369 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:36) : "DIDName"
|
1054
|
paos 2018.06.05 17:03:03.369 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:36) : "AuthenticationProtocolData"
|
1055
|
paos 2018.06.05 17:03:03.369 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate"
|
1056
|
paos 2018.06.05 17:03:03.369 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate"
|
1057
|
paos 2018.06.05 17:03:03.369 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate"
|
1058
|
paos 2018.06.05 17:03:03.369 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate"
|
1059
|
paos 2018.06.05 17:03:03.370 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "CertificateDescription"
|
1060
|
paos 2018.06.05 17:03:03.370 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "RequiredCHAT"
|
1061
|
paos 2018.06.05 17:03:03.370 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "OptionalCHAT"
|
1062
|
paos 2018.06.05 17:03:03.370 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "AuthenticatedAuxiliaryData"
|
1063
|
network 2018.06.05 17:03:03.370 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DID_AUTHENTICATE_EAC1
|
1064
|
statema... 2018.06.05 17:03:03.370 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendDIDListResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1065
|
statema... 2018.06.05 17:03:03.370 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateExtractCvcsFromEac1InputType"
|
1066
|
statema... 2018.06.05 17:03:03.370 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateExtractCvcsFromEac1InputType"
|
1067
|
card 2018.06.05 17:03:03.370 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])
|
1068
|
card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"])
|
1069
|
card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"])
|
1070
|
card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"])
|
1071
|
card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"])
|
1072
|
card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"])
|
1073
|
card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"])
|
1074
|
card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
|
1075
|
card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
|
1076
|
card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
|
1077
|
card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
|
1078
|
card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])
|
1079
|
card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"])
|
1080
|
card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"])
|
1081
|
card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"])
|
1082
|
card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00001", chr="DETESTeID00001", valid=["2010-08-13","2013-08-13"])
|
1083
|
card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00001", chr="DETESTeID00002", valid=["2010-09-21","2013-09-21"])
|
1084
|
card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00002", chr="DETESTeID00004", valid=["2012-05-11","2015-05-11"])
|
1085
|
card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00004", chr="DETESTeID00005", valid=["2015-05-04","2018-05-04"])
|
1086
|
card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeIDCTL0401", chr="DECVCAeIDCTL0402", valid=["2016-03-01","2019-03-01"])
|
1087
|
card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeIDCT00001", chr="DECVCAeIDCTL0401", valid=["2016-03-01","2019-03-01"])
|
1088
|
card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeIDCT00001", chr="DECVCAeIDCT00001", valid=["2016-03-01","2019-03-01"])
|
1089
|
card 2018.06.05 17:03:03.373 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
|
1090
|
statema... 2018.06.05 17:03:03.373 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateExtractCvcsFromEac1InputType" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1091
|
statema... 2018.06.05 17:03:03.373 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StatePreVerification"
|
1092
|
statema... 2018.06.05 17:03:03.373 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StatePreVerification"
|
1093
|
default 2018.06.05 17:03:03.373 StatePreVerification::run(core/states/StatePreVerification.cpp:33) : Try to build a cvc chain for one of the known trust points
|
1094
|
card 2018.06.05 17:03:03.373 const(card/base/asn1/CVCertificateChainBuilder.cpp:109) : Get chain for root CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"])
|
1095
|
card 2018.06.05 17:03:03.373 const(card/base/asn1/CVCertificateChainBuilder.cpp:119) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
|
1096
|
default 2018.06.05 17:03:03.379 StatePreVerification::isValid(core/states/StatePreVerification.cpp:97) : Check certificate chain validity on "2018-06-05T17:03:02"
|
1097
|
default 2018.06.05 17:03:03.379 StatePreVerification::isValid(core/states/StatePreVerification.cpp:108) : CVC "DE000048700233" AT | valid from/to [ "2018-06-05" , "2018-06-06" ]
|
1098
|
default 2018.06.05 17:03:03.379 StatePreVerification::isValid(core/states/StatePreVerification.cpp:108) : CVC "DEDVeIDDTR101433" DV_no_f | valid from/to [ "2018-05-17" , "2018-08-15" ]
|
1099
|
default 2018.06.05 17:03:03.379 StatePreVerification::isValid(core/states/StatePreVerification.cpp:108) : CVC "DECVCAeID00104" CVCA | valid from/to [ "2015-09-14" , "2018-09-14" ]
|
1100
|
statema... 2018.06.05 17:03:03.387 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StatePreVerification" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1101
|
statema... 2018.06.05 17:03:03.387 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateCertificateDescriptionCheck"
|
1102
|
statema... 2018.06.05 17:03:03.387 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateCertificateDescriptionCheck"
|
1103
|
network 2018.06.05 17:03:03.387 UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46) : SOP-Check( "https://eid-prod.connect.verwalt-berlin.de:443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= true
|
1104
|
statema... 2018.06.05 17:03:03.387 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateCertificateDescriptionCheck" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1105
|
statema... 2018.06.05 17:03:03.387 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateCheckCertificates"
|
1106
|
statema... 2018.06.05 17:03:03.387 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateCheckCertificates"
|
1107
|
default 2018.06.05 17:03:03.388 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42"
|
1108
|
default 2018.06.05 17:03:03.388 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "774af1694f2280b09d0d640948b22a77ea638f1157f517923c255bd2aae56b94"
|
1109
|
default 2018.06.05 17:03:03.388 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
|
1110
|
default 2018.06.05 17:03:03.388 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9"
|
1111
|
default 2018.06.05 17:03:03.388 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "0546c2b01048cb77669003ab0743255f94582f010baa85308133f514e218ff3c"
|
1112
|
default 2018.06.05 17:03:03.388 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
|
1113
|
default 2018.06.05 17:03:03.388 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9"
|
1114
|
default 2018.06.05 17:03:03.388 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "0546c2b01048cb77669003ab0743255f94582f010baa85308133f514e218ff3c"
|
1115
|
default 2018.06.05 17:03:03.388 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
|
1116
|
statema... 2018.06.05 17:03:03.388 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateCheckCertificates" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1117
|
statema... 2018.06.05 17:03:03.388 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateEditAccessRights"
|
1118
|
statema... 2018.06.05 17:03:06.025 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateEditAccessRights"
|
1119
|
statema... 2018.06.05 17:03:06.025 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateEditAccessRights" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1120
|
statema... 2018.06.05 17:03:06.025 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSelectReader"
|
1121
|
statema... 2018.06.05 17:03:06.026 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSelectReader"
|
1122
|
statema... 2018.06.05 17:03:06.026 ...SelectReader::onReaderInfoChanged(core/states/StateSelectReader.cpp:71) : Select first found reader "REINER SCT cyberJack RFID basis 0" of type PCSC
|
1123
|
card 2018.06.05 17:03:06.026 ReaderManagerWorker::startScan(card/base/ReaderManagerWorker.cpp:114) : Start scan on plugin: governikus::PcscReaderManagerPlugIn
|
1124
|
card 2018.06.05 17:03:06.026 ReaderManagerWorker::startScan(card/base/ReaderManagerWorker.cpp:114) : Start scan on plugin: governikus::RemoteReaderManagerPlugIn
|
1125
|
statema... 2018.06.05 17:03:06.026 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSelectReader" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1126
|
statema... 2018.06.05 17:03:06.026 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateConnectCard"
|
1127
|
statema... 2018.06.05 17:03:06.027 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateConnectCard"
|
1128
|
statema... 2018.06.05 17:03:06.027 StateConnectCard::run(core/states/StateConnectCard.cpp:24) : StateConnectCard::run()
|
1129
|
card_dr... 2018.06.05 17:03:06.030 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
|
1130
|
statema... 2018.06.05 17:03:06.030 StateConnectCard::onCardInserted(core/states/StateConnectCard.cpp:40) : Card has been inserted, trying to connect
|
1131
|
network 2018.06.05 17:03:06.031 ...ramHandlerImpl::DatagramHandlerImpl(network/DatagramHandlerImpl.cpp:57) : Bound on port: 24727
|
1132
|
card_pcsc 2018.06.05 17:03:06.035 PcscCard::connect(card/pcsc/PcscCard.cpp:111) : SCardConnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" | cardHandle: 3926196224 | protocol: "SCARD_PROTOCOL_T1"
|
1133
|
card_pcsc 2018.06.05 17:03:06.035 PcscCard::connect(card/pcsc/PcscCard.cpp:118) : SCardBeginTransaction for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1134
|
card_pcsc 2018.06.05 17:03:06.036 PcscReader::updateCard(card/pcsc/PcscReader.cpp:194) : old state: "(0x20422) CHANGED PRESENT UNPOWERED" | new state: "(0x20122) CHANGED PRESENT INUSE"
|
1135
|
card_dr... 2018.06.05 17:03:06.042 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
|
1136
|
statema... 2018.06.05 17:03:06.042 StateConnectCard::onCommandDone(core/states/StateConnectCard.cpp:49) : Card connection command completed
|
1137
|
statema... 2018.06.05 17:03:06.042 StateConnectCard::onCommandDone(core/states/StateConnectCard.cpp:57) : Card connection was successful
|
1138
|
statema... 2018.06.05 17:03:06.042 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateConnectCard" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1139
|
statema... 2018.06.05 17:03:06.042 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateUpdateRetryCounter"
|
1140
|
statema... 2018.06.05 17:03:06.042 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateUpdateRetryCounter"
|
1141
|
default 2018.06.05 17:03:06.042 StateUpdateRetryCounter::run(core/states/StateUpdateRetryCounter.cpp:22) : StateUpdateRetryCounter::run()
|
1142
|
card_pcsc 2018.06.05 17:03:06.042 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4020c02011c"
|
1143
|
card_pcsc 2018.06.05 17:03:06.077 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1144
|
card_pcsc 2018.06.05 17:03:06.077 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000"
|
1145
|
card_pcsc 2018.06.05 17:03:06.077 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0022c1a412800a04007f0007020204020283010384010d"
|
1146
|
card_pcsc 2018.06.05 17:03:06.104 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1147
|
card_pcsc 2018.06.05 17:03:06.104 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000"
|
1148
|
card 2018.06.05 17:03:06.104 Reader::getRetryCounter(card/base/Reader.cpp:151) : StatusCode: SUCCESS
|
1149
|
support 2018.06.05 17:03:06.104 I Reader::updateRetryCounter(card/base/Reader.cpp:103) : retrieved retry counter: 3 , was: 3 , PIN deactivated: false
|
1150
|
card 2018.06.05 17:03:06.104 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK
|
1151
|
default 2018.06.05 17:03:06.104 ...r::onUpdateRetryCounterDone(core/states/StateUpdateRetryCounter.cpp:39) : StateUpdateRetryCounter::onUpdateRetryCounterDone()
|
1152
|
statema... 2018.06.05 17:03:06.105 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateUpdateRetryCounter" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1153
|
statema... 2018.06.05 17:03:06.105 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateHandleRetryCounter"
|
1154
|
statema... 2018.06.05 17:03:06.105 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateHandleRetryCounter"
|
1155
|
default 2018.06.05 17:03:06.105 StateHandleRetryCounter::run(core/states/StateHandleRetryCounter.cpp:37) : PIN allowed
|
1156
|
statema... 2018.06.05 17:03:06.105 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateHandleRetryCounter" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1157
|
statema... 2018.06.05 17:03:06.105 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateEstablishPacePin"
|
1158
|
statema... 2018.06.05 17:03:13.050 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateEstablishPacePin"
|
1159
|
default 2018.06.05 17:03:13.050 AuthContext::encodeEffectiveChat(core/context/AuthContext.cpp:223) : Using effective chat: "7f4c12060904007f0007030102025305000503fb04"
|
1160
|
default 2018.06.05 17:03:13.050 StateEstablishPacePin::run(core/states/StateEstablishPacePin.cpp:38) : Establish connection using PIN
|
1161
|
support 2018.06.05 17:03:13.051 I ...ionWorker::establishPaceChannel(card/base/CardConnectionWorker.cpp:179) : Starting PACE for PACE_PIN
|
1162
|
card 2018.06.05 17:03:13.052 const(card/base/pace/PaceHandler.cpp:141) : Use ECDH with standardized domain parameters: "0.4.0.127.0.7.2.2.4.2.2"
|
1163
|
card 2018.06.05 17:03:13.052 ...urveFactory::createCurve(card/base/pace/ec/EllipticCurveFactory.cpp:41) : Create elliptic curve brainpoolP256r1
|
1164
|
card_pcsc 2018.06.05 17:03:13.052 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4020c02011c"
|
1165
|
card_pcsc 2018.06.05 17:03:13.065 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1166
|
card_pcsc 2018.06.05 17:03:13.066 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000"
|
1167
|
card_pcsc 2018.06.05 17:03:13.066 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0022c1a427800a04007f0007020204020283010384010d7f4c12060904007f0007030102025305000503fb04"
|
1168
|
card_pcsc 2018.06.05 17:03:13.106 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1169
|
card_pcsc 2018.06.05 17:03:13.106 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000"
|
1170
|
card_pcsc 2018.06.05 17:03:13.106 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "10860000027c0000"
|
1171
|
card_pcsc 2018.06.05 17:03:13.161 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1172
|
card_pcsc 2018.06.05 17:03:13.161 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "7c1280106fa32b995effb8fe649eed001ac073669000"
|
1173
|
card_pcsc 2018.06.05 17:03:13.162 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "10860000457c43814104a9871b2ca0aa8c2879151ac0ca3f546a04bb1237f7ec1fff270ec47f5e4e71f2673d078021916f92b318dd23645c28795492f6af8aaab45d7db255b1224f562700"
|
1174
|
card_pcsc 2018.06.05 17:03:13.389 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1175
|
card_pcsc 2018.06.05 17:03:13.389 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "7c43824104a7753fdb4a2698defd648861846bc8d1f2f21739d51441cfd2361f37fd58c40e2fde2f2069bc6ecd9b4dcac4f1c26fbf5e4b8e2f38ef1aa90a5348136603b8079000"
|
1176
|
card_pcsc 2018.06.05 17:03:13.393 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "10860000457c4383410455909a0db3cb3ec0199f31ed9ef424904f65102fcf5ef7484adf3a6aea6ff69e7f06c424924665c932e858e3c3cd9237014d70c3e81430ff64d3ea99bdc8a59d00"
|
1177
|
card_pcsc 2018.06.05 17:03:13.555 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1178
|
card_pcsc 2018.06.05 17:03:13.555 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "7c4384410409bc8a9fdcb2fd2edb90ba03f658c27432639cec6cd680fbb33a6653b154a87c2ee33f7badb3fba76ca15551e6c96627fc9a75a5ddcae267e831d40cac072afc9000"
|
1179
|
card_pcsc 2018.06.05 17:03:13.556 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "008600000c7c0a8508a60c47cd46e4dc6a00"
|
1180
|
card_pcsc 2018.06.05 17:03:13.668 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1181
|
card_pcsc 2018.06.05 17:03:13.668 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "7c2a8608d1c2352491837192870e4445435643416549443030313034880e44454356434165494430303130339000"
|
1182
|
default 2018.06.05 17:03:13.668 ...ynamicAuthenticationData(card/base/GeneralAuthenticateResponse.cpp:219) : mCarCurr "DECVCAeID00104"
|
1183
|
default 2018.06.05 17:03:13.668 ...ynamicAuthenticationData(card/base/GeneralAuthenticateResponse.cpp:220) : mCarPrev "DECVCAeID00103"
|
1184
|
card 2018.06.05 17:03:13.668 ...reement::performMutualAuthenticate(card/base/pace/KeyAgreement.cpp:170) : Successfully authenticated
|
1185
|
card 2018.06.05 17:03:13.668 PaceHandler::establishPaceChannel(card/base/pace/PaceHandler.cpp:93) : Pace channel established
|
1186
|
support 2018.06.05 17:03:13.669 I ...ionWorker::establishPaceChannel(card/base/CardConnectionWorker.cpp:206) : Finished PACE for PACE_PIN with result OK
|
1187
|
card 2018.06.05 17:03:13.669 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK
|
1188
|
statema... 2018.06.05 17:03:13.669 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateEstablishPacePin" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1189
|
statema... 2018.06.05 17:03:13.669 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateDidAuthenticateEac1"
|
1190
|
statema... 2018.06.05 17:03:13.677 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateDidAuthenticateEac1"
|
1191
|
card_pcsc 2018.06.05 17:03:13.677 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c8400000d9701088e08e08470af1753b96600"
|
1192
|
card_pcsc 2018.06.05 17:03:13.712 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1193
|
card_pcsc 2018.06.05 17:03:13.712 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "871101e6df2f9dd83121a7644cc0f3f08f7f58990290008e0879c4a1563e7a732a9000"
|
1194
|
card 2018.06.05 17:03:13.712 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK
|
1195
|
default 2018.06.05 17:03:13.712 AuthContext::encodeEffectiveChat(core/context/AuthContext.cpp:223) : Using effective chat: "7f4c12060904007f0007030102025305000503fb04"
|
1196
|
card 2018.06.05 17:03:13.712 const(card/base/asn1/CVCertificateChainBuilder.cpp:85) : Get chain for authority "DECVCAeID00104"
|
1197
|
card 2018.06.05 17:03:13.712 const(card/base/asn1/CVCertificateChainBuilder.cpp:96) : Found valid chain QVector(CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
|
1198
|
statema... 2018.06.05 17:03:13.712 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateDidAuthenticateEac1" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1199
|
statema... 2018.06.05 17:03:13.712 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendDIDAuthenticateResponseEAC1"
|
1200
|
statema... 2018.06.05 17:03:13.713 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendDIDAuthenticateResponseEAC1"
|
1201
|
network 2018.06.05 17:03:13.713 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data:
|
1202
|
"<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n <paos:EndpointReference>\n <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n <paos:MetaData>\n <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n </paos:MetaData>\n </paos:EndpointReference>\n </paos:PAOS>\n <wsa:ReplyTo>\n <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n </wsa:ReplyTo>\n <wsa:MessageID>urn:uuid:406a62fe-3535-45d1-b926-ffa165f60c5b</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n <DIDAuthenticateResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n </Result>\n <AuthenticationProtocolData Protocol=\"urn:oid:1.3.162.15480.3.0.14.2\" xsi:type=\"iso:EAC1OutputType\">\n <CertificateHolderAuthorizationTemplate>7f4c12060904007f0007030102025305000503fb04</CertificateHolderAuthorizationTemplate>\n <EFCardAccess>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</EFCardAccess>\n <IDPICC>09bc8a9fdcb2fd2edb90ba03f658c27432639cec6cd680fbb33a6653b154a87c</IDPICC>\n <Challenge>627c6731116d7f92</Challenge>\n </AuthenticationProtocolData>\n </DIDAuthenticateResponse>\n </soap:Body>\n</soap:Envelope>\n"
|
1203
|
network 2018.06.05 17:03:13.713 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
|
1204
|
network 2018.06.05 17:03:13.713 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
1205
|
network 2018.06.05 17:03:13.790 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
|
1206
|
network 2018.06.05 17:03:13.791 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
|
1207
|
network 2018.06.05 17:03:13.791 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
|
1208
|
network 2018.06.05 17:03:13.791 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
|
1209
|
network 2018.06.05 17:03:13.791 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:13 GMT"
|
1210
|
network 2018.06.05 17:03:13.791 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
|
1211
|
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n <soap:Header>\n <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id987\" refToMessageID=\"1ae20737a5f5e3dad602d47ee10111f5610d1845\"/>\n </soap:Header>\n <soap:Body>\n <DIDAuthenticate xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<ConnectionHandle xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"ConnectionHandle\">\n<CardApplication>E80704007F00070302</CardApplication>\n<SlotHandle>00</SlotHandle>\n</ConnectionHandle>\n<DIDName>PIN</DIDName>\n<AuthenticationProtocolData Protocol=\"urn:oid:1.3.162.15480.3.0.14.2\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"EAC2InputType\">\n<Certificates xmlns=\"unknownNamespace\"/>\n<EphemeralPublicKey>045C767AC50E188148FED5B2BED14F6236C33EF439E79942FC7FA534649E0B75925F4C6970B7E43F36A1F5268355809E0E5FCD894BAEBB35C3D6A765A99BAF5D7F</EphemeralPublicKey>\n<Signature>5979B5237863F0452478B9DC6A2570C2C0E65299B1201BC016D14AD35FCC32E943EB31265E31AD171543A59992A24D87C3737EE87A4D9352DDFCBE741B6D6BA0</Signature>\n</AuthenticationProtocolData>\n</DIDAuthenticate>\n</soap:Body>\n</soap:Envelope>\n"
|
1212
|
paos 2018.06.05 17:03:13.791 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:37) : "ConnectionHandle"
|
1213
|
paos 2018.06.05 17:03:13.791 ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "CardApplication"
|
1214
|
paos 2018.06.05 17:03:13.791 ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "SlotHandle"
|
1215
|
paos 2018.06.05 17:03:13.791 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:37) : "DIDName"
|
1216
|
paos 2018.06.05 17:03:13.791 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:37) : "AuthenticationProtocolData"
|
1217
|
paos 2018.06.05 17:03:13.792 ...parseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:80) : "Certificates"
|
1218
|
paos 2018.06.05 17:03:13.792 W ...arseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:111) : Unknown element: "Certificates"
|
1219
|
paos 2018.06.05 17:03:13.792 ...parseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:80) : "EphemeralPublicKey"
|
1220
|
paos 2018.06.05 17:03:13.792 ...parseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:80) : "Signature"
|
1221
|
network 2018.06.05 17:03:13.792 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DID_AUTHENTICATE_EAC2
|
1222
|
statema... 2018.06.05 17:03:13.792 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendDIDAuthenticateResponseEAC1" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1223
|
statema... 2018.06.05 17:03:13.792 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateEACAdditionalInputType"
|
1224
|
statema... 2018.06.05 17:03:13.792 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateEACAdditionalInputType"
|
1225
|
statema... 2018.06.05 17:03:13.792 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateEACAdditionalInputType" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1226
|
statema... 2018.06.05 17:03:13.792 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateProcessCertificatesFromEac2"
|
1227
|
statema... 2018.06.05 17:03:13.792 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateProcessCertificatesFromEac2"
|
1228
|
card 2018.06.05 17:03:13.792 const(card/base/asn1/CVCertificateChainBuilder.cpp:85) : Get chain for authority "DECVCAeID00104"
|
1229
|
card 2018.06.05 17:03:13.793 const(card/base/asn1/CVCertificateChainBuilder.cpp:96) : Found valid chain QVector(CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
|
1230
|
default 2018.06.05 17:03:13.793 ...catesFromEac2::run(core/states/StateProcessCertificatesFromEac2.cpp:26) : CVC chain already determined, skip further processing
|
1231
|
statema... 2018.06.05 17:03:13.793 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateProcessCertificatesFromEac2" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1232
|
statema... 2018.06.05 17:03:13.793 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateDidAuthenticateEac2"
|
1233
|
statema... 2018.06.05 17:03:13.794 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateDidAuthenticateEac2"
|
1234
|
card 2018.06.05 17:03:13.794 const(card/base/asn1/CVCertificateChainBuilder.cpp:85) : Get chain for authority "DECVCAeID00104"
|
1235
|
card 2018.06.05 17:03:13.794 const(card/base/asn1/CVCertificateChainBuilder.cpp:96) : Found valid chain QVector(CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
|
1236
|
card 2018.06.05 17:03:13.794 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:125) : Performing TA MSE:Set DST
|
1237
|
card 2018.06.05 17:03:13.794 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:126) : Sending CAR "DECVCAeID00104"
|
1238
|
card_pcsc 2018.06.05 17:03:13.794 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2281b62d87210193a49db8bb5aea7058eb175a3704095acfd07fafce271dd9caefcf2fab9a805a8e085fe915d1c657c97000"
|
1239
|
card_pcsc 2018.06.05 17:03:13.820 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1240
|
card_pcsc 2018.06.05 17:03:13.820 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08e73729b5d2de0da39000"
|
1241
|
card 2018.06.05 17:03:13.820 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:144) : Performing TA PSO:Verify Certificate
|
1242
|
card 2018.06.05 17:03:13.820 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:145) : Sending certificate CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"])
|
1243
|
card_pcsc 2018.06.05 17:03:13.821 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "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"
|
1244
|
card_pcsc 2018.06.05 17:03:14.032 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1245
|
card_pcsc 2018.06.05 17:03:14.033 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08fd36a8dd22be8af49000"
|
1246
|
card 2018.06.05 17:03:14.033 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:125) : Performing TA MSE:Set DST
|
1247
|
card 2018.06.05 17:03:14.033 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:126) : Sending CAR "DEDVeIDDTR101433"
|
1248
|
card_pcsc 2018.06.05 17:03:14.033 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2281b62d8721010db9672575a39e5c943b898bd0ff1b15d39d0a6ad5f18c48f471c9a57d0c10a88e08279c2db9705cfe4c00"
|
1249
|
card_pcsc 2018.06.05 17:03:14.066 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1250
|
card_pcsc 2018.06.05 17:03:14.066 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08191183cdc37b32d59000"
|
1251
|
card 2018.06.05 17:03:14.066 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:144) : Performing TA PSO:Verify Certificate
|
1252
|
card 2018.06.05 17:03:14.066 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:145) : Sending certificate CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])
|
1253
|
card_pcsc 2018.06.05 17:03:14.066 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "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"
|
1254
|
card_pcsc 2018.06.05 17:03:14.263 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1255
|
card_pcsc 2018.06.05 17:03:14.263 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08e317b40d4812d20f9000"
|
1256
|
card 2018.06.05 17:03:14.263 ...nalAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:178) : Performing TA MSE:Set AT
|
1257
|
card_pcsc 2018.06.05 17:03:14.263 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2281a46d8761017b07f193ba2cc8ffafbb4d415b008b89ba73743dbb6a16cc215b59aa0d523be7999e91afca5f4f06d1cf14432f0b2ab4e6e34d71c6c3ebfcae3487984c2bf37f4d1742e0a05d437d4c10555152393899942a5144cfcd3ba23a02cc9d5b8535ae8e087b285b236e2ee84a00"
|
1258
|
card_pcsc 2018.06.05 17:03:14.319 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1259
|
card_pcsc 2018.06.05 17:03:14.319 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0874089d831a71bc1a9000"
|
1260
|
card 2018.06.05 17:03:14.319 ...nalAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:194) : Performing TA External Authenticate
|
1261
|
card_pcsc 2018.06.05 17:03:14.319 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c8200005d8751016145fcd27d65a1bb6c9b745c7a7d3ca34ef91a40cf47fc2c50348c7acd8431400a0b8ce4cb3dd710fc63442645320c31ca517d6644093bb69d437fae9887db71eb63daa52ac0644b1dbabfa54a4853ca8e0889e1dd5554ab001600"
|
1262
|
card_pcsc 2018.06.05 17:03:14.462 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1263
|
card_pcsc 2018.06.05 17:03:14.462 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0851ec53484c9a2be59000"
|
1264
|
card 2018.06.05 17:03:14.462 ...d::internalExecute(card/base/command/DidAuthenticateEAC2Command.cpp:82) : Performing Read EF.CardSecurity
|
1265
|
card_pcsc 2018.06.05 17:03:14.462 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101b1b999744e47a6d0848be158a57a9cb18e08e1739f2764dfa84a00"
|
1266
|
card_pcsc 2018.06.05 17:03:14.489 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1267
|
card_pcsc 2018.06.05 17:03:14.489 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08352a5a6f782da0b39000"
|
1268
|
card_pcsc 2018.06.05 17:03:14.489 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb000000d9701ff8e084a0fbaaf40b669b700"
|
1269
|
card_pcsc 2018.06.05 17:03:14.518 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1270
|
card_pcsc 2018.06.05 17:03:14.518 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e101d3230a11b7b6104b32e5203d9716366ede9b8cd81cef7473b198d7ecd09c2cd28359eb18e1622faf991a833f527b9c4dc89211ed497852898d06d92f1b64e3f0be400400f8b62967cb0d31711ecd2b90d3c8bb71c67554a822bd4ab97f75d98603b034774928490fe9e269e48615924dd35312fa87b3e26969a6e538c8b0638acfcf25a0a1df7b1791ad336138b59e70c15888ca285d0e542686703c8b8bb2a941289afd16cece011c1b3a7844d97d76e2d255d57cdce7cc55122b487005fb2b1a88a0ab7c463a8698c26025513e334740fdae6c611e4c2001fa7d7d3e0e94f8990290008e08d0c992da79b8558b9000"
|
1271
|
card_pcsc 2018.06.05 17:03:14.518 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb000df0d9701ff8e08c25ece53df9c5b2e00"
|
1272
|
card_pcsc 2018.06.05 17:03:14.546 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1273
|
card_pcsc 2018.06.05 17:03:14.547 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e1011692ce01d6afcb7f84e8a99d4614ce21e4b8826636b97978c8b7ff034a3a649fa34e793307097444045ec73b8c39a0882e2cecf1a9ae60efd940f29f74a75e54ece000e3c5bf3ce96c220280db73d6d231741c2323648d39d9cdb40658a4109de9be41ae4efff4ebdf8f353638eddd5ecb3d5c75db701bf0cc966675d2af36a72af0a4390754e3695f5edffc45fb22951e64b51e9c71f246787eaa138d915775358d8bf23f12a5aeabc9e61b5e4c991cb04f6c65dde0543df350a4c3b523de8fb10efa2a229612bbed93f8e15311b5bbd3d6fa1cb9a4bcbdaa14d68dbece09d1990290008e08e0dff65098f8b1679000"
|
1274
|
card_pcsc 2018.06.05 17:03:14.547 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb001be0d9701ff8e0837d3f69b334156c000"
|
1275
|
card_pcsc 2018.06.05 17:03:14.575 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1276
|
card_pcsc 2018.06.05 17:03:14.575 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e10122d39b83106bcb710c1ed8fcce2c8485b6578f83ce44cb9886473d2a0b3affe3e4bd856f7027a0216a658dec1024771bbbed13854ec1e8a20e8887485784b56a5896cbb00eafe1950058514e06eb3b0166fdbc889ebdc3ad5437d10b26f2e661add4a0c30cb9a298d88f3274721859babbc773723cb30d94112a5468769da49a2045b6aa715e074557d1acdcae9715955998844ddb42b195799c0783aa34766d207db8b01b339525fe936e56e3b5486bf5ccce6c26f5917bd394398fb83eaa652c4e24398e012bffbc2be4886aca0150f813342b56f212d5c5a15e5b252a2a61990290008e086059c64c0c12bf899000"
|
1277
|
card_pcsc 2018.06.05 17:03:14.575 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0029d0d9701ff8e085dc89176a7cb1a2f00"
|
1278
|
card_pcsc 2018.06.05 17:03:14.604 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1279
|
card_pcsc 2018.06.05 17:03:14.604 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e10118f5d49d1507fea7a7190e767433a6ab8a787c06314d3956d0df3edc09c178a482b19662b8828676f64637a05126ec5dedbf19142a3842c71dcd5df063ad156f95b1edabd74c0bfc275989d61c09b9a8a7f4f5596e83d346cfff58d97d0e011b76a7b8bad4e3d55e0491c06e13603b86d1d09e49896e5ee098ca3143c457cbf363fce3d18e4e4b39bc16a53cb7b28b78d81fc95f0a31ee84f5a031aef76ff5ded73ac9e04d98d9ad27efe24a18372f513ece1726022390d3951c1dc9c7763da1d4301d0db23c0d84401878c169429fcb9bdbfe82b6b6c854bef4dd2204c25fa8990290008e0839f4d58ab28d1be39000"
|
1280
|
card_pcsc 2018.06.05 17:03:14.604 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0037c0d9701ff8e0826a828870f81fed900"
|
1281
|
card_pcsc 2018.06.05 17:03:14.633 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1282
|
card_pcsc 2018.06.05 17:03:14.633 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e1019b166593af3f13d9fd3b42e8b6bcc02d273ab227d95e38d8445e665dd452508d7de7c4af598d669f381014d43705f36fa2ef841167faf2fdf76e8ade386d5e2c5fc86d3428b1cc2191340e08f87428aae876cb6f1b6eaedfd727740ae38afac30bc7b998805cba16e8e2f209ac7a7fb22157054955ffd98d9b274adacbc62b14a2f428993413b2a1571aafac1f51e8998131614f6e5a4e67d818b198d9c58f0cc4aabb446109878619c1750f4dde310fefb73b4f52b4db42d1cf56a37aa947e58949185562d62891ab75245aa5e623417506ab4340f5f374be630d8b0911beac990290008e083f58eaec5fb3241b9000"
|
1283
|
card_pcsc 2018.06.05 17:03:14.633 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0045b0d9701ff8e08eb77b31952d6bc8e00"
|
1284
|
card_pcsc 2018.06.05 17:03:14.661 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1285
|
card_pcsc 2018.06.05 17:03:14.661 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e1014df5d9e0e5cea4f7ae1417500f7fc3a89670b1d1f9e2cd1aa6997476ba5fe7c051a6b5417fffd2e71d05ecd88536857739ca7ff28bd7dfe45032621122063dccb7efb310e53485cd3a1f8e65b0833d09d7d15290fedb1b0ea569fcbed49b9ac1198124fdee3de38ab9838e0846d375c3056f8d0bdaf84b152940f5b71e29fbf3d49462f3e107eb5eae7fc69002a228945f12880095adf905471088cda96e280debf5769295231ef3495f87b7bdc848e774eb846e4766a959d8d4283f0d165465835342b4258547dcbd442fa6b9cd0b98292ed35eae7100074a1bb66debd585fb990290008e081c02f03744352f729000"
|
1286
|
card_pcsc 2018.06.05 17:03:14.661 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0053a0d9701ff8e088ef313f395c99f8f00"
|
1287
|
card_pcsc 2018.06.05 17:03:14.690 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1288
|
card_pcsc 2018.06.05 17:03:14.690 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e10163d7023a973a25de36edca57e1f1adaf7da59e172b5968d6d76c73b588a26c542a1ee96e698d93414da9d49d80c2ad53768a1e3bb7c298d39338afe9535d30b6020ccab688b929ec6b6069c281ea3c725d09aa827ba421cef647d632840c22996bcba92b6c2a143e5365a8ea6ac1d4be9a5024807992bee59b83e9ab82822d434fbf6cc7c1867c9e5f6a3370a0abcb6f17ff8e3095aac7af88780ff02edb837598e361faf5dc16fdbb69bff4132fc1dd98d197404dfa86d5e0c8a7cb62272f711a72f8fb04e4aff3a5fa5b74899d545c4320f4e7ff1d07917c5af41d01369751990290008e08d91de53d9b294f799000"
|
1289
|
card_pcsc 2018.06.05 17:03:14.690 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb006190d9701ff8e086baa3c533a2cb01b00"
|
1290
|
card_pcsc 2018.06.05 17:03:14.715 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1291
|
card_pcsc 2018.06.05 17:03:14.715 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "878181018c06f310b1d97ad53403af720a5446c428ad38281a44aca3449cdbea94e3f4414c743760fa148096485a8f91e15a3118f0e2130b5cc9ec29a00bd53886b072eeefd9fe3d101b6cf4da1515ce12b221167127fbf33a7686e2bd525e6a3fde11a2c60c1f56c78d2d98c35bc8d7f4c9d4f3d0a6af69602e1bb7dcdf7f1e758664b1990262828e08aeab8aa50b71ad6e6282"
|
1292
|
card 2018.06.05 17:03:14.716 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.2"
|
1293
|
card 2018.06.05 17:03:14.716 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:67) : Parsed ChipAuthenticationInfo
|
1294
|
card 2018.06.05 17:03:14.716 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:61) : Parsed PACEInfo
|
1295
|
card 2018.06.05 17:03:14.716 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.5.2.3"
|
1296
|
card 2018.06.05 17:03:14.716 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.5.2.3"
|
1297
|
card 2018.06.05 17:03:14.716 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.5.2"
|
1298
|
card 2018.06.05 17:03:14.716 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.3.2"
|
1299
|
card 2018.06.05 17:03:14.716 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.6"
|
1300
|
card 2018.06.05 17:03:14.716 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.1.2"
|
1301
|
card 2018.06.05 17:03:14.717 ...::internalExecute(card/base/command/DidAuthenticateEAC2Command.cpp:106) : Chose ChipAuthenticationInfo(0): protocol "0.4.0.127.0.7.2.2.3.2.2" , keyId "48"
|
1302
|
card 2018.06.05 17:03:14.717 ...hipAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:221) : Performing CA MSE:Set AT
|
1303
|
card_pcsc 2018.06.05 17:03:14.717 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2241a41d871101ccf704d26c8074370fdde8d0a5c122c78e085a021429e6e696dd00"
|
1304
|
card_pcsc 2018.06.05 17:03:14.750 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1305
|
card_pcsc 2018.06.05 17:03:14.750 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08949515b2e9bd3b839000"
|
1306
|
card 2018.06.05 17:03:14.750 ...hipAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:237) : Performing CA General Authenticate
|
1307
|
card_pcsc 2018.06.05 17:03:14.750 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c860000608751012a6a4d1f01e3be6a7280b136feb3eb5a6f1ca92bb5fb9e301bbc7e8fdeec134f9c5cb2a026123130956fa56facc740e54d01285fe721c80eed0c48559fe7127b1f334b426707c86ca4a063741248dffd9701008e088cc3baac2095d3e100"
|
1308
|
card_pcsc 2018.06.05 17:03:14.885 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1309
|
card_pcsc 2018.06.05 17:03:14.885 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8721010ebed2d293e76e9cacaa87c50103de030ce4712d627b288d1789edc3c57c4387990290008e089e3c54ce6cbf86769000"
|
1310
|
card 2018.06.05 17:03:14.885 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK
|
1311
|
statema... 2018.06.05 17:03:14.885 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateDidAuthenticateEac2" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1312
|
statema... 2018.06.05 17:03:14.886 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendDIDAuthenticateResponseEAC2"
|
1313
|
statema... 2018.06.05 17:03:14.886 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendDIDAuthenticateResponseEAC2"
|
1314
|
network 2018.06.05 17:03:14.886 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data:
|
1315
|
"<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n <paos:EndpointReference>\n <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n <paos:MetaData>\n <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n </paos:MetaData>\n </paos:EndpointReference>\n </paos:PAOS>\n <wsa:ReplyTo>\n <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n </wsa:ReplyTo>\n <wsa:MessageID>urn:uuid:363ae23e-d201-4aea-b5b2-c75a30bcf375</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n <DIDAuthenticateResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n </Result>\n <AuthenticationProtocolData Protocol=\"urn:oid:1.3.162.15480.3.0.14.2\" xsi:type=\"iso:EAC2OutputType\">\n <EFCardSecurity>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</EFCardSecurity>\n <AuthenticationToken>7a4636428e26853d</AuthenticationToken>\n <Nonce>72b85c1b90884976</Nonce>\n </AuthenticationProtocolData>\n </DIDAuthenticateResponse>\n </soap:Body>\n</soap:Envelope>\n"
|
1316
|
network 2018.06.05 17:03:14.887 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
|
1317
|
network 2018.06.05 17:03:14.887 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
1318
|
network 2018.06.05 17:03:15.052 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
|
1319
|
network 2018.06.05 17:03:15.053 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
|
1320
|
network 2018.06.05 17:03:15.053 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
|
1321
|
network 2018.06.05 17:03:15.053 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
|
1322
|
network 2018.06.05 17:03:15.053 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:14 GMT"
|
1323
|
network 2018.06.05 17:03:15.053 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
|
1324
|
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n <soap:Header>\n <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id988\" refToMessageID=\"1ae20737a5f5e3dad602d47ee10111f5610d1845\"/>\n </soap:Header>\n <soap:Body>\n <Transmit xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<SlotHandle>00</SlotHandle>\n<InputAPDUInfo>\n<InputAPDU>0CA4040C1D87110105C2C9FE7D03CA395864995204E80D4B8E08B9671BCE4A8DBEC800</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>8C2080001D8711019B276E66F9206FE7362D2431918F7AE58E0824D7196D7C5B815600</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0C2241A41D871101C703EF9268BCCF87464BA3AE6B2D302E8E08CDE9A75FC65DB69300</InputAPDU>\n<AcceptableStatusCode>9000</AcceptableStatusCode>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<Input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nputAPDU>\n<AcceptableStatusCode>9000</AcceptableStatusCode>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0C2241A41D87110141256CBB8D37B069575ABFD81C8A6C4C8E089ADFF63F7133B83100</InputAPDU>\n<AcceptableStatusCode>9000</AcceptableStatusCode>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<Input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nputAPDU>\n<AcceptableStatusCode>9000</AcceptableStatusCode>\n</InputAPDUInfo>\n</Transmit>\n</soap:Body>\n</soap:Envelope>\n"
|
1325
|
paos 2018.06.05 17:03:15.053 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "SlotHandle"
|
1326
|
paos 2018.06.05 17:03:15.053 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1327
|
paos 2018.06.05 17:03:15.053 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1328
|
paos 2018.06.05 17:03:15.053 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1329
|
paos 2018.06.05 17:03:15.053 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1330
|
paos 2018.06.05 17:03:15.053 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1331
|
paos 2018.06.05 17:03:15.053 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1332
|
paos 2018.06.05 17:03:15.054 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode"
|
1333
|
paos 2018.06.05 17:03:15.054 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1334
|
paos 2018.06.05 17:03:15.054 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1335
|
paos 2018.06.05 17:03:15.054 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode"
|
1336
|
paos 2018.06.05 17:03:15.054 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1337
|
paos 2018.06.05 17:03:15.054 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1338
|
paos 2018.06.05 17:03:15.054 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode"
|
1339
|
paos 2018.06.05 17:03:15.054 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1340
|
paos 2018.06.05 17:03:15.054 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1341
|
paos 2018.06.05 17:03:15.054 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode"
|
1342
|
network 2018.06.05 17:03:15.054 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: TRANSMIT
|
1343
|
statema... 2018.06.05 17:03:15.054 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendDIDAuthenticateResponseEAC2" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1344
|
statema... 2018.06.05 17:03:15.054 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateTransmit"
|
1345
|
statema... 2018.06.05 17:03:15.055 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateTransmit"
|
1346
|
card_pcsc 2018.06.05 17:03:15.055 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4040c1d87110105c2c9fe7d03ca395864995204e80d4b8e08b9671bce4a8dbec800"
|
1347
|
card_pcsc 2018.06.05 17:03:15.081 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1348
|
card_pcsc 2018.06.05 17:03:15.081 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08fb644ff4e0f6138f9000"
|
1349
|
card_pcsc 2018.06.05 17:03:15.081 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "8c2080001d8711019b276e66f9206fe7362d2431918f7ae58e0824d7196d7c5b815600"
|
1350
|
card_pcsc 2018.06.05 17:03:15.105 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1351
|
card_pcsc 2018.06.05 17:03:15.105 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08e685095d83ad2a429000"
|
1352
|
card_pcsc 2018.06.05 17:03:15.105 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2241a41d871101c703ef9268bccf87464ba3ae6b2d302e8e08cde9a75fc65db69300"
|
1353
|
card_pcsc 2018.06.05 17:03:15.157 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1354
|
card_pcsc 2018.06.05 17:03:15.157 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e089568edfa8e91e83b9000"
|
1355
|
card_pcsc 2018.06.05 17:03:15.157 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "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"
|
1356
|
card_pcsc 2018.06.05 17:03:15.301 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1357
|
card_pcsc 2018.06.05 17:03:15.301 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "873101d10c4b2efc4970c434a90779bc6fd622a753c762f0a038faf0d2951c2d3c9a1c3c498b2f57c4ee85fa92e71480fe2f4e990290008e08a3f5d521ea0cd2539000"
|
1358
|
card_pcsc 2018.06.05 17:03:15.301 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2241a41d87110141256cbb8d37b069575abfd81c8a6c4c8e089adff63f7133b83100"
|
1359
|
card_pcsc 2018.06.05 17:03:15.354 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1360
|
card_pcsc 2018.06.05 17:03:15.354 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08a499289edd46bba19000"
|
1361
|
card_pcsc 2018.06.05 17:03:15.354 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "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"
|
1362
|
card_pcsc 2018.06.05 17:03:15.496 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1363
|
card_pcsc 2018.06.05 17:03:15.496 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8731011286468e47ca34252f41571042b3cc451ad50e0516c8aac382642f98aeca85c67639eb15ff0ea28c34dca6dce545c58e990290008e08d7ab59d0fe961a1b9000"
|
1364
|
card 2018.06.05 17:03:15.496 TransmitCommand::internalExecute(card/base/command/TransmitCommand.cpp:74) : transmit end
|
1365
|
card 2018.06.05 17:03:15.496 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK
|
1366
|
statema... 2018.06.05 17:03:15.496 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateTransmit" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1367
|
statema... 2018.06.05 17:03:15.496 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendTransmitResponse"
|
1368
|
statema... 2018.06.05 17:03:15.496 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendTransmitResponse"
|
1369
|
network 2018.06.05 17:03:15.497 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data:
|
1370
|
"<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n <paos:EndpointReference>\n <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n <paos:MetaData>\n <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n </paos:MetaData>\n </paos:EndpointReference>\n </paos:PAOS>\n <wsa:ReplyTo>\n <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n </wsa:ReplyTo>\n <wsa:MessageID>urn:uuid:fed7631f-51b6-4cb9-b86a-37fc90adb611</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n <TransmitResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n </Result>\n <OutputAPDU>990290008e08fb644ff4e0f6138f9000</OutputAPDU>\n <OutputAPDU>990290008e08e685095d83ad2a429000</OutputAPDU>\n <OutputAPDU>990290008e089568edfa8e91e83b9000</OutputAPDU>\n <OutputAPDU>873101d10c4b2efc4970c434a90779bc6fd622a753c762f0a038faf0d2951c2d3c9a1c3c498b2f57c4ee85fa92e71480fe2f4e990290008e08a3f5d521ea0cd2539000</OutputAPDU>\n <OutputAPDU>990290008e08a499289edd46bba19000</OutputAPDU>\n <OutputAPDU>8731011286468e47ca34252f41571042b3cc451ad50e0516c8aac382642f98aeca85c67639eb15ff0ea28c34dca6dce545c58e990290008e08d7ab59d0fe961a1b9000</OutputAPDU>\n </TransmitResponse>\n </soap:Body>\n</soap:Envelope>\n"
|
1371
|
network 2018.06.05 17:03:15.497 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
|
1372
|
network 2018.06.05 17:03:15.497 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
1373
|
network 2018.06.05 17:03:15.602 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
|
1374
|
network 2018.06.05 17:03:15.602 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
|
1375
|
network 2018.06.05 17:03:15.603 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
|
1376
|
network 2018.06.05 17:03:15.603 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
|
1377
|
network 2018.06.05 17:03:15.603 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:14 GMT"
|
1378
|
network 2018.06.05 17:03:15.603 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
|
1379
|
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n <soap:Header>\n <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id989\" refToMessageID=\"1ae20737a5f5e3dad602d47ee10111f5610d1845\"/>\n </soap:Header>\n <soap:Body>\n <Transmit xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<SlotHandle>00</SlotHandle>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D8711019593B01D701BE8101C171C7C67D2548E8E08AF5E3BC2524528B900</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08B914A5F75E39DB500000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101A6A3B38AFE28F078568293E5DDD04B5C8E0807C14C3EBAC1F63D00</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E0886C460276A3E25C80000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D8711013D7F273C5ECCF360EACE633DF61DE5B18E082192AAECC2DFD2E700</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E083EC8BE7BB7768C690000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D8711012518211B9E57FBC4EB261E1848CD8CA48E0888152E5EC6C90AE800</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08E93BC9DA4D5C3ADF0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D87110130CED76AB1962EA1087750B3C817A9298E08CF028E8AC1448DDB00</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08ABC8E01BEDDAE10E0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D87110126CCF9D96AE522CBC9A1610D9A828E878E08E7E0678028E9D3C200</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E082C027679D2AF8F2E0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D87110118B4D21246B2AA395CDB93AB6C94E7938E08A544D4A28602396200</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E088264F9B59EB9DA200000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101D9F69C4CE1968DEF293726739A3259508E0862B1586A4E7E73B900</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08B0FA651E89A8F99A0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101389CA1906176BD57C8165BCAA9513D558E08A608E9319219E5B100</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E0833471036F62EF8FE0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101434DB6309DF4C9B0A3A44E173344D2BE8E08AC8A4BBA53F1B91E00</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08D00483DCF88E77530000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101249DB13FAF31319394CF9C6322FEFE598E083927F2F6074925E400</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08F70714CD8CD826720000</InputAPDU>\n</InputAPDUInfo>\n</Transmit>\n</soap:Body>\n</soap:Envelope>\n"
|
1380
|
paos 2018.06.05 17:03:15.603 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "SlotHandle"
|
1381
|
paos 2018.06.05 17:03:15.603 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1382
|
paos 2018.06.05 17:03:15.603 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1383
|
paos 2018.06.05 17:03:15.603 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1384
|
paos 2018.06.05 17:03:15.603 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1385
|
paos 2018.06.05 17:03:15.603 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1386
|
paos 2018.06.05 17:03:15.603 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1387
|
paos 2018.06.05 17:03:15.603 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1388
|
paos 2018.06.05 17:03:15.603 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1389
|
paos 2018.06.05 17:03:15.603 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1390
|
paos 2018.06.05 17:03:15.604 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1391
|
paos 2018.06.05 17:03:15.604 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1392
|
paos 2018.06.05 17:03:15.604 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1393
|
paos 2018.06.05 17:03:15.604 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1394
|
paos 2018.06.05 17:03:15.604 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1395
|
paos 2018.06.05 17:03:15.604 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1396
|
paos 2018.06.05 17:03:15.604 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1397
|
paos 2018.06.05 17:03:15.604 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1398
|
paos 2018.06.05 17:03:15.604 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1399
|
paos 2018.06.05 17:03:15.604 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1400
|
paos 2018.06.05 17:03:15.604 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1401
|
paos 2018.06.05 17:03:15.604 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1402
|
paos 2018.06.05 17:03:15.604 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1403
|
paos 2018.06.05 17:03:15.604 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1404
|
paos 2018.06.05 17:03:15.604 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1405
|
paos 2018.06.05 17:03:15.604 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1406
|
paos 2018.06.05 17:03:15.605 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1407
|
paos 2018.06.05 17:03:15.605 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1408
|
paos 2018.06.05 17:03:15.605 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1409
|
paos 2018.06.05 17:03:15.605 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1410
|
paos 2018.06.05 17:03:15.605 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1411
|
paos 2018.06.05 17:03:15.605 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1412
|
paos 2018.06.05 17:03:15.605 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1413
|
paos 2018.06.05 17:03:15.605 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1414
|
paos 2018.06.05 17:03:15.605 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1415
|
paos 2018.06.05 17:03:15.605 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1416
|
paos 2018.06.05 17:03:15.605 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1417
|
paos 2018.06.05 17:03:15.605 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1418
|
paos 2018.06.05 17:03:15.605 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1419
|
paos 2018.06.05 17:03:15.605 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1420
|
paos 2018.06.05 17:03:15.605 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1421
|
paos 2018.06.05 17:03:15.605 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1422
|
paos 2018.06.05 17:03:15.605 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1423
|
paos 2018.06.05 17:03:15.606 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo"
|
1424
|
paos 2018.06.05 17:03:15.606 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
|
1425
|
network 2018.06.05 17:03:15.606 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: TRANSMIT
|
1426
|
statema... 2018.06.05 17:03:15.606 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendTransmitResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1427
|
statema... 2018.06.05 17:03:15.606 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateTransmit"
|
1428
|
statema... 2018.06.05 17:03:15.606 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateTransmit"
|
1429
|
card_pcsc 2018.06.05 17:03:15.607 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d8711019593b01d701be8101c171c7c67d2548e8e08af5e3bc2524528b900"
|
1430
|
card_pcsc 2018.06.05 17:03:15.636 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1431
|
card_pcsc 2018.06.05 17:03:15.636 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08c90b0bb89951795b9000"
|
1432
|
card_pcsc 2018.06.05 17:03:15.636 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08b914a5f75e39db500000"
|
1433
|
card_pcsc 2018.06.05 17:03:15.660 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1434
|
card_pcsc 2018.06.05 17:03:15.660 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "871101c3ea04af1c25f27cfa93fcbcb6a0c5e9990290008e085b65a4d635a9bdcb9000"
|
1435
|
card_pcsc 2018.06.05 17:03:15.660 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101a6a3b38afe28f078568293e5ddd04b5c8e0807c14c3ebac1f63d00"
|
1436
|
card_pcsc 2018.06.05 17:03:15.684 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1437
|
card_pcsc 2018.06.05 17:03:15.684 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08b16ffc961669d1439000"
|
1438
|
card_pcsc 2018.06.05 17:03:15.684 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e0886c460276a3e25c80000"
|
1439
|
card_pcsc 2018.06.05 17:03:15.708 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1440
|
card_pcsc 2018.06.05 17:03:15.708 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8711017735b40677757b27e10e07006bc7a51e990290008e08c6c3fa1ffbcf85f99000"
|
1441
|
card_pcsc 2018.06.05 17:03:15.708 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d8711013d7f273c5eccf360eace633df61de5b18e082192aaecc2dfd2e700"
|
1442
|
card_pcsc 2018.06.05 17:03:15.738 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1443
|
card_pcsc 2018.06.05 17:03:15.738 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0895f9b6734e04c2839000"
|
1444
|
card_pcsc 2018.06.05 17:03:15.738 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e083ec8be7bb7768c690000"
|
1445
|
card_pcsc 2018.06.05 17:03:15.762 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1446
|
card_pcsc 2018.06.05 17:03:15.763 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "87210187c5a367aadb8bed3b3f9d91afdad53654b6c5d0aa4f72d15de4ba94caee0f97990290008e082e7ec124d93b568f9000"
|
1447
|
card_pcsc 2018.06.05 17:03:15.763 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d8711012518211b9e57fbc4eb261e1848cd8ca48e0888152e5ec6c90ae800"
|
1448
|
card_pcsc 2018.06.05 17:03:15.787 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1449
|
card_pcsc 2018.06.05 17:03:15.787 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08432d5f8b0fc76de09000"
|
1450
|
card_pcsc 2018.06.05 17:03:15.787 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08e93bc9da4d5c3adf0000"
|
1451
|
card_pcsc 2018.06.05 17:03:15.811 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1452
|
card_pcsc 2018.06.05 17:03:15.812 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "871101ce082982b2e4359cea4a6765e239b5a6990290008e087e3600374c0ed8fe9000"
|
1453
|
card_pcsc 2018.06.05 17:03:15.812 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d87110130ced76ab1962ea1087750b3c817a9298e08cf028e8ac1448ddb00"
|
1454
|
card_pcsc 2018.06.05 17:03:15.840 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1455
|
card_pcsc 2018.06.05 17:03:15.840 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08151b1f982bc280e39000"
|
1456
|
card_pcsc 2018.06.05 17:03:15.840 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08abc8e01beddae10e0000"
|
1457
|
card_pcsc 2018.06.05 17:03:15.865 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1458
|
card_pcsc 2018.06.05 17:03:15.865 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "871101ae036772348cd7b85581ea1b9176cc2d990290008e083cce0d111bde233f9000"
|
1459
|
card_pcsc 2018.06.05 17:03:15.865 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d87110126ccf9d96ae522cbc9a1610d9a828e878e08e7e0678028e9d3c200"
|
1460
|
card_pcsc 2018.06.05 17:03:15.889 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1461
|
card_pcsc 2018.06.05 17:03:15.889 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e086d5b07869605a7f99000"
|
1462
|
card_pcsc 2018.06.05 17:03:15.890 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e082c027679d2af8f2e0000"
|
1463
|
card_pcsc 2018.06.05 17:03:15.914 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1464
|
card_pcsc 2018.06.05 17:03:15.914 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8711017968e4bc3fe6cb693283f49c380909de990290008e0876764c629045ab419000"
|
1465
|
card_pcsc 2018.06.05 17:03:15.915 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d87110118b4d21246b2aa395cdb93ab6c94e7938e08a544d4a28602396200"
|
1466
|
card_pcsc 2018.06.05 17:03:15.943 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1467
|
card_pcsc 2018.06.05 17:03:15.943 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08b169f33b66f18e909000"
|
1468
|
card_pcsc 2018.06.05 17:03:15.943 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e088264f9b59eb9da200000"
|
1469
|
card_pcsc 2018.06.05 17:03:15.968 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1470
|
card_pcsc 2018.06.05 17:03:15.968 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8711011c597ef969ad0795b47027e959b68bb3990290008e089ce10ba4f3555d709000"
|
1471
|
card_pcsc 2018.06.05 17:03:15.968 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101d9f69c4ce1968def293726739a3259508e0862b1586a4e7e73b900"
|
1472
|
card_pcsc 2018.06.05 17:03:15.993 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1473
|
card_pcsc 2018.06.05 17:03:15.993 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e083dfe8b1873f2a1dd9000"
|
1474
|
card_pcsc 2018.06.05 17:03:15.993 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08b0fa651e89a8f99a0000"
|
1475
|
card_pcsc 2018.06.05 17:03:16.019 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1476
|
card_pcsc 2018.06.05 17:03:16.019 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "872101db06d0888659db3391b61be774283d68122fec2b272da7ec8f5a385274b5eac8990290008e0841b756fe47e1322f9000"
|
1477
|
card_pcsc 2018.06.05 17:03:16.019 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101389ca1906176bd57c8165bcaa9513d558e08a608e9319219e5b100"
|
1478
|
card_pcsc 2018.06.05 17:03:16.037 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1479
|
card_pcsc 2018.06.05 17:03:16.037 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "99026a828e08337493822f09e4276a82"
|
1480
|
card_pcsc 2018.06.05 17:03:16.037 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e0833471036f62ef8fe0000"
|
1481
|
card_pcsc 2018.06.05 17:03:16.062 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1482
|
card_pcsc 2018.06.05 17:03:16.062 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "872101dd05690c315a584c90ab4ecbdefe7f21a776fb170e8f193cc03cace461660e6a990290008e08b39a905b12f409409000"
|
1483
|
card_pcsc 2018.06.05 17:03:16.062 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101434db6309df4c9b0a3a44e173344d2be8e08ac8a4bba53f1b91e00"
|
1484
|
card_pcsc 2018.06.05 17:03:16.094 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1485
|
card_pcsc 2018.06.05 17:03:16.094 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08e3bbe31346cbeb049000"
|
1486
|
card_pcsc 2018.06.05 17:03:16.094 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08d00483dcf88e77530000"
|
1487
|
card_pcsc 2018.06.05 17:03:16.122 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1488
|
card_pcsc 2018.06.05 17:03:16.122 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "874101182e633026e2865d86e0e90e2ae323ca68ee56a1425a473495dac65db32d18bfbfaeabbb3c33996f62e85ec9aae06b8e6485ad2d827d1add9df44e57b83e717d990290008e08271e0d4aac9814c39000"
|
1489
|
card_pcsc 2018.06.05 17:03:16.122 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101249db13faf31319394cf9c6322fefe598e083927f2f6074925e400"
|
1490
|
card_pcsc 2018.06.05 17:03:16.140 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1491
|
card_pcsc 2018.06.05 17:03:16.140 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "99026a828e0830ee77d9b3bf0b096a82"
|
1492
|
card_pcsc 2018.06.05 17:03:16.140 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08f70714cd8cd826720000"
|
1493
|
card_pcsc 2018.06.05 17:03:16.167 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1494
|
card_pcsc 2018.06.05 17:03:16.167 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "874101cca8e4c08e9b238d0b319cc0e1d9f9fcee4825eb1d0060785bdc8a887825958fd4d884abb6eef3129fcc5755f555105eb8762a0791d7c597ecf2fde684328181990290008e08c3a7e036af59fb169000"
|
1495
|
card 2018.06.05 17:03:16.167 TransmitCommand::internalExecute(card/base/command/TransmitCommand.cpp:74) : transmit end
|
1496
|
card 2018.06.05 17:03:16.168 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK
|
1497
|
statema... 2018.06.05 17:03:16.168 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateTransmit" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1498
|
statema... 2018.06.05 17:03:16.168 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendTransmitResponse"
|
1499
|
statema... 2018.06.05 17:03:16.168 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendTransmitResponse"
|
1500
|
network 2018.06.05 17:03:16.169 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data:
|
1501
|
"<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n <paos:EndpointReference>\n <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n <paos:MetaData>\n <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n </paos:MetaData>\n </paos:EndpointReference>\n </paos:PAOS>\n <wsa:ReplyTo>\n <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n </wsa:ReplyTo>\n <wsa:MessageID>urn:uuid:6a72c135-f254-470d-b031-720c178f2f33</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n <TransmitResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n </Result>\n <OutputAPDU>990290008e08c90b0bb89951795b9000</OutputAPDU>\n <OutputAPDU>871101c3ea04af1c25f27cfa93fcbcb6a0c5e9990290008e085b65a4d635a9bdcb9000</OutputAPDU>\n <OutputAPDU>990290008e08b16ffc961669d1439000</OutputAPDU>\n <OutputAPDU>8711017735b40677757b27e10e07006bc7a51e990290008e08c6c3fa1ffbcf85f99000</OutputAPDU>\n <OutputAPDU>990290008e0895f9b6734e04c2839000</OutputAPDU>\n <OutputAPDU>87210187c5a367aadb8bed3b3f9d91afdad53654b6c5d0aa4f72d15de4ba94caee0f97990290008e082e7ec124d93b568f9000</OutputAPDU>\n <OutputAPDU>990290008e08432d5f8b0fc76de09000</OutputAPDU>\n <OutputAPDU>871101ce082982b2e4359cea4a6765e239b5a6990290008e087e3600374c0ed8fe9000</OutputAPDU>\n <OutputAPDU>990290008e08151b1f982bc280e39000</OutputAPDU>\n <OutputAPDU>871101ae036772348cd7b85581ea1b9176cc2d990290008e083cce0d111bde233f9000</OutputAPDU>\n <OutputAPDU>990290008e086d5b07869605a7f99000</OutputAPDU>\n <OutputAPDU>8711017968e4bc3fe6cb693283f49c380909de990290008e0876764c629045ab419000</OutputAPDU>\n <OutputAPDU>990290008e08b169f33b66f18e909000</OutputAPDU>\n <OutputAPDU>8711011c597ef969ad0795b47027e959b68bb3990290008e089ce10ba4f3555d709000</OutputAPDU>\n <OutputAPDU>990290008e083dfe8b1873f2a1dd9000</OutputAPDU>\n <OutputAPDU>872101db06d0888659db3391b61be774283d68122fec2b272da7ec8f5a385274b5eac8990290008e0841b756fe47e1322f9000</OutputAPDU>\n <OutputAPDU>99026a828e08337493822f09e4276a82</OutputAPDU>\n <OutputAPDU>872101dd05690c315a584c90ab4ecbdefe7f21a776fb170e8f193cc03cace461660e6a990290008e08b39a905b12f409409000</OutputAPDU>\n <OutputAPDU>990290008e08e3bbe31346cbeb049000</OutputAPDU>\n <OutputAPDU>874101182e633026e2865d86e0e90e2ae323ca68ee56a1425a473495dac65db32d18bfbfaeabbb3c33996f62e85ec9aae06b8e6485ad2d827d1add9df44e57b83e717d990290008e08271e0d4aac9814c39000</OutputAPDU>\n <OutputAPDU>99026a828e0830ee77d9b3bf0b096a82</OutputAPDU>\n <OutputAPDU>874101cca8e4c08e9b238d0b319cc0e1d9f9fcee4825eb1d0060785bdc8a887825958fd4d884abb6eef3129fcc5755f555105eb8762a0791d7c597ecf2fde684328181990290008e08c3a7e036af59fb169000</OutputAPDU>\n </TransmitResponse>\n </soap:Body>\n</soap:Envelope>\n"
|
1502
|
network 2018.06.05 17:03:16.169 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
|
1503
|
network 2018.06.05 17:03:16.169 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
1504
|
network 2018.06.05 17:03:16.221 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
|
1505
|
network 2018.06.05 17:03:16.221 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
|
1506
|
network 2018.06.05 17:03:16.221 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
|
1507
|
network 2018.06.05 17:03:16.221 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
|
1508
|
network 2018.06.05 17:03:16.221 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:15 GMT"
|
1509
|
network 2018.06.05 17:03:16.221 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
|
1510
|
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n <soap:Header>\n <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id990\" refToMessageID=\"1ae20737a5f5e3dad602d47ee10111f5610d1845\"/>\n </soap:Header>\n <soap:Body>\n <Disconnect xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<SlotHandle>00</SlotHandle>\n</Disconnect>\n</soap:Body>\n</soap:Envelope>\n"
|
1511
|
network 2018.06.05 17:03:16.221 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DISCONNECT
|
1512
|
statema... 2018.06.05 17:03:16.221 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendTransmitResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1513
|
statema... 2018.06.05 17:03:16.221 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendDisconnectResponse"
|
1514
|
statema... 2018.06.05 17:03:16.222 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendDisconnectResponse"
|
1515
|
network 2018.06.05 17:03:16.222 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data:
|
1516
|
"<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n <paos:EndpointReference>\n <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n <paos:MetaData>\n <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n </paos:MetaData>\n </paos:EndpointReference>\n </paos:PAOS>\n <wsa:ReplyTo>\n <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n </wsa:ReplyTo>\n <wsa:MessageID>urn:uuid:cc6fa9c1-74f4-4924-92b7-2463b6fcf71c</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n <DisconnectResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n </Result>\n </DisconnectResponse>\n </soap:Body>\n</soap:Envelope>\n"
|
1517
|
network 2018.06.05 17:03:16.222 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
|
1518
|
network 2018.06.05 17:03:16.222 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
1519
|
network 2018.06.05 17:03:16.262 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
|
1520
|
network 2018.06.05 17:03:16.263 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
|
1521
|
network 2018.06.05 17:03:16.263 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
|
1522
|
network 2018.06.05 17:03:16.263 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
|
1523
|
network 2018.06.05 17:03:16.263 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:15 GMT"
|
1524
|
network 2018.06.05 17:03:16.263 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
|
1525
|
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n <soap:Header>\n <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id991\" refToMessageID=\"1ae20737a5f5e3dad602d47ee10111f5610d1845\"/>\n </soap:Header>\n <soap:Body>\n <StartPAOSResponse Profile=\"http://www.bsi.bund.de/ecard/api/1.1\" xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n<ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n</Result>\n</StartPAOSResponse>\n</soap:Body>\n</soap:Envelope>\n"
|
1526
|
network 2018.06.05 17:03:16.263 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: STARTPAOS_RESPONSE
|
1527
|
statema... 2018.06.05 17:03:16.263 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendDisconnectResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1528
|
statema... 2018.06.05 17:03:16.263 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateStartPaosResponse"
|
1529
|
statema... 2018.06.05 17:03:16.263 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateStartPaosResponse"
|
1530
|
statema... 2018.06.05 17:03:16.263 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateStartPaosResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1531
|
statema... 2018.06.05 17:03:16.264 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateUpdateRetryCounter"
|
1532
|
statema... 2018.06.05 17:03:16.264 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateUpdateRetryCounter"
|
1533
|
default 2018.06.05 17:03:16.264 StateUpdateRetryCounter::run(core/states/StateUpdateRetryCounter.cpp:22) : StateUpdateRetryCounter::run()
|
1534
|
card_pcsc 2018.06.05 17:03:16.264 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4020c02011c"
|
1535
|
card_pcsc 2018.06.05 17:03:16.271 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1536
|
card_pcsc 2018.06.05 17:03:16.271 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "6a82"
|
1537
|
card_pcsc 2018.06.05 17:03:16.271 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0022c1a412800a04007f0007020204020283010384010d"
|
1538
|
card_pcsc 2018.06.05 17:03:16.297 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1539
|
card_pcsc 2018.06.05 17:03:16.297 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000"
|
1540
|
card 2018.06.05 17:03:16.297 Reader::getRetryCounter(card/base/Reader.cpp:151) : StatusCode: SUCCESS
|
1541
|
support 2018.06.05 17:03:16.297 I Reader::updateRetryCounter(card/base/Reader.cpp:103) : retrieved retry counter: 3 , was: 3 , PIN deactivated: false
|
1542
|
card 2018.06.05 17:03:16.297 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK
|
1543
|
default 2018.06.05 17:03:16.298 ...r::onUpdateRetryCounterDone(core/states/StateUpdateRetryCounter.cpp:39) : StateUpdateRetryCounter::onUpdateRetryCounterDone()
|
1544
|
statema... 2018.06.05 17:03:16.298 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateUpdateRetryCounter" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1545
|
statema... 2018.06.05 17:03:16.298 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateCleanUpReaderManager"
|
1546
|
statema... 2018.06.05 17:03:16.298 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateCleanUpReaderManager"
|
1547
|
default 2018.06.05 17:03:16.298 ...CleanUpReaderManager::run(core/states/StateCleanUpReaderManager.cpp:24) : Going to disconnect card connection
|
1548
|
card 2018.06.05 17:03:16.298 ReaderManagerWorker::stopScan(card/base/ReaderManagerWorker.cpp:130) : Stop scan on plugin: governikus::PcscReaderManagerPlugIn
|
1549
|
default 2018.06.05 17:03:16.298 ...CleanUpReaderManager::run(core/states/StateCleanUpReaderManager.cpp:28) : Going to disconnect readers
|
1550
|
card 2018.06.05 17:03:16.298 ReaderManagerWorker::stopScan(card/base/ReaderManagerWorker.cpp:130) : Stop scan on plugin: governikus::RemoteReaderManagerPlugIn
|
1551
|
statema... 2018.06.05 17:03:16.298 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateCleanUpReaderManager" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1552
|
statema... 2018.06.05 17:03:16.299 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateCheckRefreshAddress"
|
1553
|
statema... 2018.06.05 17:03:16.299 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateCheckRefreshAddress"
|
1554
|
default 2018.06.05 17:03:16.300 StateCheckRefreshAddress::run(core/states/StateCheckRefreshAddress.cpp:80) : Current URL: "https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=1ae20737a5f5e3dad602d47ee10111f5610d1845"
|
1555
|
default 2018.06.05 17:03:16.300 StateCheckRefreshAddress::run(core/states/StateCheckRefreshAddress.cpp:82) : SubjectUrl: "https://eid-prod.connect.verwalt-berlin.de"
|
1556
|
network 2018.06.05 17:03:16.300 UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46) : SOP-Check( "https://eid-prod.verwalt-berlin.de:8443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= false
|
1557
|
default 2018.06.05 17:03:16.301 StateCheckRefreshAddress::run(core/states/StateCheckRefreshAddress.cpp:91) : SOP-Check failed, start process
|
1558
|
default 2018.06.05 17:03:16.301 ...shAddress::sendGetRequest(core/states/StateCheckRefreshAddress.cpp:133) : Send GET request to URL: "https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=1ae20737a5f5e3dad602d47ee10111f5610d1845"
|
1559
|
network 2018.06.05 17:03:16.301 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8443, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=1ae20737a5f5e3dad602d47ee10111f5610d1845"))
|
1560
|
network 2018.06.05 17:03:16.301 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
1561
|
network 2018.06.05 17:03:16.302 ...amHandlerImpl::~DatagramHandlerImpl(network/DatagramHandlerImpl.cpp:70) : Shutdown socket
|
1562
|
card_pcsc 2018.06.05 17:03:16.303 PcscCard::disconnect(card/pcsc/PcscCard.cpp:143) : SCardEndTransaction for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1563
|
card_pcsc 2018.06.05 17:03:16.367 PcscCard::disconnect(card/pcsc/PcscCard.cpp:148) : SCardDisconnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
|
1564
|
network 2018.06.05 17:03:16.480 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
|
1565
|
network 2018.06.05 17:03:16.480 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors
|
1566
|
network 2018.06.05 17:03:16.481 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-SHA384, bits=256, proto=TLSv1.2)
|
1567
|
network 2018.06.05 17:03:16.481 I (:0) : Used session protocol: "TlsV1_2"
|
1568
|
network 2018.06.05 17:03:16.481 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
|
1569
|
network 2018.06.05 17:03:16.481 I (:0) : Used peer certificate: QSslCertificate("3", "3c:3f:e6:1c:7c:28:28:d9", "Kfl3PTkdwoi1P7sQWG1dvQ==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.verwalt-berlin.de")), QDateTime(2017-10-16 13:01:51.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-10-21 23:59:59.000 UTC Qt::TimeSpec(UTC)))
|
1570
|
network 2018.06.05 17:03:16.481 I ...dress::onSslHandshakeDone(core/states/StateCheckRefreshAddress.cpp:162) : Handshake of tls connection done!
|
1571
|
default 2018.06.05 17:03:16.481 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048
|
1572
|
default 2018.06.05 17:03:16.481 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000
|
1573
|
default 2018.06.05 17:03:16.481 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9"
|
1574
|
default 2018.06.05 17:03:16.481 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "0546c2b01048cb77669003ab0743255f94582f010baa85308133f514e218ff3c"
|
1575
|
default 2018.06.05 17:03:16.481 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
|
1576
|
default 2018.06.05 17:03:16.481 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" for URL origin QUrl("https://eid-prod.verwalt-berlin.de:8443")
|
1577
|
default 2018.06.05 17:03:16.481 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384
|
1578
|
default 2018.06.05 17:03:16.481 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224
|
1579
|
card_pcsc 2018.06.05 17:03:16.534 PcscReader::updateCard(card/pcsc/PcscReader.cpp:194) : old state: "(0x20122) CHANGED PRESENT INUSE" | new state: "(0x20022) CHANGED PRESENT"
|
1580
|
default 2018.06.05 17:03:16.621 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:212) : Status Code: 303 | redirect URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1iQ6gZc1tMoEEg1fv1R3j7bZe%2B%2FYfczICI847h7uxz3405%2BP9%2BunrZjmZuh%2F%2BQr%2FDH39qeizIW%2F66pevvid%2Bo77%2B%2Bdc%2Fzcn7hYzfnWIeh34ufroX9fP330d%2F%2BbpO%2FfchmZv5e5%2B8i%2Fn7kn13GUP%2FjvwMfR%2BnYRmy4fX1J76Yl6ZPlt82qpdlnL%2BDYNHk3%2B4p%2Bc%2FZ0PdFtvx8H2VPXsu3tJheTf9zXoDsWkxVMWlDvwzPIgV%2FiHaKrGi2wi2m7VUsf56L%2Bcf5lfwXHCZyGEnTbxBFY9%2BwHMW%2FpRAGf8sSiMZgkspKtPj6k8L%2F8rVAsRJKS%2FwbjZfZNwzCoW80AmffoJSmUZzAaSRN7pn9XzB7wy9f%2F5skCbQoCuRbVuTQvYiiv6U0TH9DEgonoZJGUPKH%2BHleC6Wfl6RffvmKQDD1DSK%2BQbgH498h9DtM%2FAxRePz1p%2BAvar8V9fUPJX%2F%2FbfH09xr%2B3xWczHMx%2FVDq11%2F%2Fqsx%2FUeKfwN9s9Yfwv9rTXZJlnf%2FpJzfkxU9B8lqL%2F33jG969%2BLu7Ztmt%2Fq%2Fgr39sMn7%2FB7HfhT6bznEpcuYvJ%2F2PwP3puP3yb8L4ZEn%2BkPPjj9896naofd9%2F3tGfh6kCEQiCQQgDb2e9Z%2FzXbZf8NmGCZUlGljmKFWRGQzgMESQMo1iWJnCaE%2BnXn7xzvKH%2FH%2BUJr%2BJd9MttuL8%2F2W0Io1jqIf%2BJeVXD1Cz1%2B%2F9CVlLMMEJ9y9Lshx7z%2BbtWnEpfDn8gzOd%2FIwMCIfoHvnxuqv%2F6p5MU%2BS3kd8x0QmcYDhcFhZBUQmNlkZFFntA4klF5mcP%2FXzBMc%2FIN%2Fm%2F8HwH8BibEIfqHvf76g%2FvhsWWTJUvxq6Eo%2FMVzHDO5FbMrLFMpHGMbO29HqjbESr1lJmMLOmszexUPB3cxKluZActEHtM5omFTP%2BbygW0rX4Q95uJQnZMndvAXY%2F4%2BMfPYTn1l72NMW8E3WEViYF%2FgakN3A0d4Nuzf1vCM9vua2fvCQIFktkJjcMxvC5h9j31IND2RfiVPe8lkdYs5vE0RfI2fJhRCwcO%2BhNpgKYlzP5KrpChvCyrjRO6X%2BPnqbOkFxfKwRO%2FgTKXXqr%2Bdl8FiIe8JqOEJu3kJsHEpuyEO95jyz2N%2Fhf%2Fl3%2BH%2FT%2BB%2F%2BXf4%2FxP4X%2F4d%2Fn8LX1FYpf1hqO5Td41E7xB7W1tkmAf3hbEp5nYPlqu02yUEBnmcVqokW17IbgnyDLVrDzoqHf9EME7B8wSDm0dY9XowgAlnV%2F61YK2luODRMl9kVb8igXBIJZC4zL40u7iSg%2Fdp%2B9E6%2BmAI7kzwRRSEcvJ4UyId2CazpWeOFkDrxmhYPPQzRRYNVbf%2By1qBzzT%2BWEYRLCAjKlOWFMicHt1JxlvlFnXstV7LR%2B4QsAq3Hr7dQebqRn3qOm2yTTUn4AMT5zjWDV8o1cJx78m7xzGQH%2BmFgYhqP5EccNLplLFq74VC68khKCF1kpEGJD4Cwla%2BoQWthcVbWrFHDz8rzzjFL1ihjVUeIwuAC4y6TL4l9rGARUkgkPKZ44Xf4qkfsTNF8Rh8dBgDJu9d4RmbYYdj2CX%2B9%2BslO4bwhWkZxmDmH96f8%2FttgV0ROv6frTX%2FZq0fBpos88n4wMUngzOlujy24KfW%2BoRSheCL09blByepSQKJ3qT3sfTfJeTBnYDNnMjI6%2FRRU4fMpFJwylQB6tAhIqclKnhh2hUNrmowzBUZ1oGuvmAoQNDdu2xDuacrvu%2FGviRAnFl4mxmMfPhI9SGzRTkFZL%2FhQNQ1y5r2vOvFLKBZukaDu0zlC%2FIGo%2BILvT6uXVzyR2xAKoyEZShoql37VJIDfszm79ryl%2BMACGE%2FshioD5Amck6lKtmTpLkadjciCv2BssC0fimWz9A8hxd5H2V7N%2B4JqENTGAuNZm9HpztDjjBG06D3wBq%2BVoKItbaECtuIBeWWlqI6vqolvVz4S%2BS%2BZHlJBGTkvPZffvkT%2BEco%2Ffvo%2BdfB3%2BPrjyl%2FpI4%2F0hLXjHUx%2Ff7vb3nq94Hf8vuvBU4bR3vuuWADE9kWx%2BvKe2qiLL42MSoI02OwX72%2FweJ7nVRl1jG%2BddwF3cAAC0FTteAt6OHtOdosgGqyBmcIUFVS2MIGRn7E7Kj6OjD3GZifKaSfGfgUkA51MpQwIZZ%2FiGS00j5KgcQsos9s0jMXoysB8AqeztYqQ8bklaDwS73SeFohBbDlduqeWf8yBtvTrCaG8gaj3QJ3vBccbeEoJhr58iNOAwmHsDySUUdchk7Ng8Tg8c6exrnGgle2aQaCdVHnIfkyBZEd8FC%2BerSF822aiLmpPwnvFaWFzuUphZk%2Bhh4id6dPG3Wm0w87yGlEpJchVz78GQi0F7grdtqgr2hBwvww1b%2Bo%2Bh%2BG%2FjDWPzKa227%2FzwYkvJJ9SxsQQ88rn00aQIydKE1kThZVSw3M8IbwU0%2FmNA6DtH%2FkR%2Fxok3HtuE3FxSdj7zZxrY4Fqx0CcS3pKHAz4wnxVPZN7Qb9WS3b9kbuuAfFG5MdbGcQ%2FEFOHdy2cRsKYg1gb%2BLzgjcAYdt9FNxKEtC%2Bdg4KVC7oAHr0wekflimgYeum68ia2Xmnn%2FMozx3GdEzB%2BStbhEMOxvaAQVYJiFf7WJoa4WDuakZGSsj2ZHuMRV6oPeyKs0aVkMwXfmQB7zYkzMH8vGAHHYbhIastG8U6Aqi8L3eboMsdI%2B8mYkhH3fuXfAaU0dLM8yHGZhXGCwjsgcW2%2BW5Rp0EnqeP6tJarntuPjsjoUMmnzIS8IWD96GpOP2pLXpgICBvGXHK1q%2Fcn2JfxzrOVOuEu2VMZQMNAlpqaOr%2B9QoFU3T5mu9j9DjUbpEKnNw0zxfghLS0nc7cejFXI6gKoCj4ALed8lS2MBSx1tdGorP7rqeMImz%2BXuU54mZsSO2WFxxXdfCoUGaMDcqPngkMYZ%2Bs1sp2W8ECErxyf9msbTEEBJsJsghnXcuuTCo%2F9c3i0VBIPptdhJUhX0O6VrKXfC6GIRPqi1DpKHPB8Uz76ASxeJmAS2iGRI9N46eJkJWEtjAAve3QI%2BaTYQW1ssY0c%2FuRj1xbmW00wmkQOKbNGTtIesgmcvTOcvNNlBkhz2vWAZ2%2B6imnJHjlqCOYuuZOGz8Ag%2BMBorgMw1grzC2DuQ%2BLK20cXU3PKU4PLGdfEyqT1CHz3wydOYvgk%2BhMzYaMeus7DZoUNGbtY7%2Fwyp7toKUMapTNApFUl7O7p1%2BvehCi1ENOilZMszg6REMMEH7KHc3W9YmUU8pyJ31kMcfnPFZDuvBqVeBngXe%2Fqq%2FLQ527NNss%2FiDzYDfe94LgVFMW8LvvsddfauRkyTxHFedxTWD0%2Fb%2BBZJTJiBSquht4aUPFQhmcBXthyYj8jXHqr1l2QhkJQVyUN8eagCoRdv5Qt4wymFW%2B%2FOHsx7QITKqaaBecUlAKQfAPMxxLZLWzniuVfvrdKEd9Z2aczPh9P1ABVCFVDUXNjHs0aKOCPrtBMZi1bLj28A5pz2uyNBwp5xWihvlgm45uHI42IvMXs2UObN7%2B2qQidnYeGUAiMj91FrLMCXATphyNxfTLsAt5MWssgEgMm8BGcqnlf%2FSBRRKfjXV4FJjxBepANy6avuXj2FQU%2BpjxQw5sHCaahr9ykKMM%2BQNkdplxtxHb9w9ysJlgOBvE8DonCUCUiZlwXWJ5asQg5mmlcxTtf8%2FHQxdnU%2FHz3YMQDzk1rSXmHJwfRjHRVASy7w4rW2MqL4Qbwc3S59ziujGyeTWxXJmUbs7O1Ox8Q21Ut6uDSYkR5BEHjaQEjuRJ%2BynRvV2mi8zkJAbd%2FGDcfQ%2FsP9dbvHSwGXl43n6LLZ7hwFf5Ul4pUqWAwyDKI5Gcn0YvnkfFwHSpi6znAVEbwPF1W4v2XHsoCPb73jxSD9ooNvQn1TL%2BQAV%2FB7esJ%2BIEz%2BrWFoX3aYt3FSo8oK4ZgMcS1600XNABEsZtVeM2WDTFP18yJAqY9Ng8%2FhFFOs49Xj1hAIMYLYuYmEE8Nz%2B1tIntt96xwluCSlIMJeDJH4p1P30K9Nsmj15sVs4SCneYsUNtMnZjRjXJzXj4Sa2ZZh1K7wZzQg8rGn%2FpbWD%2BYTG0jsjGrCF61wSG8QOZpqJeP9oXxp72ZtqYOSQjOs%2Bw3tTh%2B8DWhqB2zKwbpyLKmm9FiVKLIGpfV%2FWuIzSZK39IYrAFwvN9wGY7g5S8Z3Erq%2BM5lSQgetTLJ1rBmmMlGj96y38KH1ejjI1jbYiGHUKAtraAQGcAHFuunmGAE%2FQ6xZKCA2SmZ%2BClPMGYaDR4Yc8Cld0hxwk9ig5otJnodyCvbT%2BJOJ8divUA3aHef6hnM7GUU9C0LRTgWSO%2Fsp6pPc6LSE%2F489pb1WJsqccJJDo9DCYWM8hx4acSIjktDlYgmAzstBxorvYhjXWx5fdqjT66fZUcqAlzV%2BtN5w4tXUr7f%2BsbZAsV0dvpk4U1EkWeaURJgEFlW2p1q7u%2FgTVQHIlNNV5O3aPIKyXxdJzmgairWdkITzRGthQsbR88loDxeE0NIYjuaT7zNeAG4eTJVehsubVXv2KHTG5ICreuCoeAWvpBPerBU04%2FK4%2B3hAXhfzChdGercsSRI0dSPS86rrpmNlYbBepVeOcFh0CeHlDAvazj7RJFldno67UyTjmxz4SOE1It3PFrk019zCbopCHSlGLzV7O4wQaJyaLXcXPMOC7HUz4ke6RzabvJ7ewYVDKpbO53p9rrEm6A8RcDOg1MBWhYdtw7s1ZBsV8vFAxtM3w9IPT97ByoPJFoIdWCV%2Fsxd5BQdzM83frV7TSdpYXYh3LqiMqb3MmHkA2CEFWlFfV1QM3wk2xZmSwnLbvrsIQZgH6T1iHf84xeay31qFnt05GQlTlXXbDDYp4E02fxoIMlH2yySyGipn9VhyGMhUzMI6bVJ4Nl5yMV5V5UlVDJXU9YsAOT%2B2wAnHZbGR%2BTHrx2%2Br59vLZoCCAW2ikxBzIxW63tG8keb29E1x5jAokbNXFXkRGRpwWBZJMsDcxhm%2Bjh9KUAJXWHFwbYZie0cyfcj0Qk2JGTO6Qq19Kb16n3lqyDZscGWXj9oJYEP0mTVgwJhhrzZ4wRrAmoRj2Ni5KpQwbcnvQAmDTPcKB5utRFLFovvV3jFHssNepHNmzPU0bvR7XN5s28SCdiS1hyQWMtGBxz97WE5UNUpsfGXddNFldMmUSJdRjmCeJAx%2BrW2a4Dvm6U7b3qYOooQZG%2BsKAwO9WerBFMUI7dTFp0cUtUsbWOyaJidA6XBXA8KzkgqnSMDMHh8ZOsuoPJciT5UkvQGscTLGzhKqtlYyEYeMFih3ImA7mdE80icveOIP7X6ts41MC%2BzCRfqvJKTIRgZnWpZOEaPcHbl46Y5fvJiqH7sD7aghO1BjP1hLeRhrit%2FOmQd7mp0X3H1GZDknZnCrnqqqyI1ncSVXuyjOkEPpllZrLSxVcQsRzqSNwmqhVJcHyCRqUMG8CKOx1RpEK2t43kQOQFT6cc1KaN7fLZmZLUuqrS7mA%2BesPgcRQ5HzPqIHfgTkbsaPOXHghEvWuOkhhtkwbW3vY1UMQsaWFCRq0wS2DMvBKahYjwa%2BXi02%2Fbk3AVOmRRJxvPJq6tsDmxIp42oZBMITYf%2BeqlV%2Fnw77eWVYaUyucJU2uSL%2BxnnzKfXFqZJi9bDLr8OGP9qER6ez7a5W1tmshhtHUMEuyzrtenIZRcWWnplium4MznORSwNXGtZo8srA%2B6Su5aQeYm%2BVXsXi8bFBajbQw5iM0nljmXTLCWZtAtN3NeKa2PFa1jpaiCzRSKQwyk0xFHoz%2B0sF61AuZ2trT7Y1gsdzWO%2FuJuadkYxS9bNl5%2FC%2FcxguVqTrdEiAZfOY%2BMB2MIqmSjwAhp74NiQe93HKYoWHwuy8LNnEY7FGoVJB5sdyfDY%2FCEPkIggkCXDu0Y9iBcRze0z7%2F0Ohoo8LjuanSoq%2BUA6%2BAhrDHwHyGzmVhyRHy%2FoXuo7pAkTXKCr%2FwRraCzPpxE0fP2RjdCMb%2BIQfeZsgnpWSx00YjlWM8iBhs%2Fh9oDS5QxidAmYnTBNF4IJ1ZhPYL0fL8P1HUHfD4iPru5D2TndEdPF70FASoXAeuFJ3TvwjqrkMA8K2VnkvNmNb%2BggnaXO%2FXmutasEpHhy%2BEf5Cp23sBeyiZioZd3c53ItRlOXu89FZay06r6OsEQ%2BsnrelwugjAw6VJo4JwA%2FPC0tbsSiHHHSnySTsigwvvvMfZR62eBlr2nthjTNyMu0ONVoGrZ%2BKKJLQ7rIHqjdPAH%2BObVtQ7KGcPdlEKE1l0Y%2B20JanrHQusKQPB9ISXDuRbBPE3R%2F5MmxwaJSEV8OtlDc9HwK%2FjJHuHAYOX33Anyvn2yQxbPlyUvSkD1PzE4Od7DHPleMgl28aLbq606LU7WaOO0cVipYxCi%2Bi9f6co8nk0%2BA8gjSi4Ek6xpgvM%2F1CuFfuGFLetzTMePLJs4t96VzP1R%2FeZjWehA38R2QblX6yF9IEgd82STWJAbzE6NrAz3E27rNuQ53%2B%2B0Iq%2BvgGoWTdH34qCx54qLc2LVSYOJTK%2FWtD%2BUUb0PdsLUehIHqUojMheENjUH5nCTPIEHGrC0iUJEh3e5CVzIt3kXLVXH9Sa2DKrgoedGup0R8tLMjXzfBl40yk3btdv8yyXneXXFMAEp8OF%2BgqSPvNr%2FbXdb%2BGGaSELS92cURXwPK8eklzIFMToDDqri7thR6JFZbw04%2B6d4t9N2CRWn93Vr8TTSfKJ191n7zUsDcH6PwiGaADzF4%2FKAz53SaiKcK5KlXuXrmGJFnpI0qNfjN4oRi3g4GKP8IhXmIpzh8UUoU3XnEdTjAaDWzYejcMY2neAKeOvmfQ0%2Fwknkmo%2FVc6yreE8ZviVyIMQfOpycNuy7zMKDaA1GHVYicZwrbqArmdm5CBIahHHIzN%2FzPimybs5ZbJoeaBOKcfh6EEudcOyFsOoCd9KDUdDWa3u2K0HuszeIf01uckKaebLw%2B1RfNvIbnud9BiETp9uDIRyahEKa3FrOSUmair7FZFnaEN2FZg%2FBCMjNH3mqGwatHKz2XYOx1aYY88N2oank6m7p2N7jwIsYXxOfg5G3748ylJm7uw82iwyW%2BWq6pkDJoFm5Jp2DTuiKeeHjnYR0hK4f7bEvQZy6J7BHOmNLFJjgSpaRYYkdje1wnfIpGcOr3OzAJ9AWRUmm9kZfdocUCi4KBn5v4fng%2BWHzCQ1lUgk3gxBOjyBLaHS%2FCpN9GARUr3TYCeK8GhlHfG%2BXPku0ewl1PYzlOGQsr8%2ByJ%2BrPQ7WQi%2Bx1xgmTrzPJNwxLtjSoEnU4%2BjWrvmXWUKLufwIghdtRCctPXDtC1yRPSDh1K6Iky%2FU5CNzHWKiLal8lddy229ZK%2B2Q%2BmNrTpOfc%2BW3N2LlIRmb5x2ah2x7%2BLjsSqLRxmWIvqLG8TjIO8bqHsCZNTdQegy06u%2BcmiiOa%2F6TThUfVicVav1xO8%2B%2FYOe%2BfM96SnWqg2BmqDQH7c9Vjh7ZLOW%2Fjd4vUGeaMrnWnCZ4%2FMPkMCDRoTskxKwYdj2bDSH%2B7VKJDIOgaq1XgW8c6K0J8H2JCu5tBFKrjHfkrd1dt464grsQ6GSnfpAJ82y%2FAQvwUpMB77PN3vU8hcFXehwWmFAVhYieROPYLJTeLzkvHA7tpfSfTu7LiSHieU%2BxPSR4FIbcoY8bLcXNJwlxeuKHov2R6GZNtPr8tm6clVnVILJoiaUDVTS2ArsEl6cVTuBIxfWcHkid4kIvQpqhQ2Og95T6xF7GIYMtlGiY0kHCL4Ou5XcJkbFHZ1%2BRN2%2FTXGqH1vX69lQ4PA1xX9bgjEQTztke2un91xN9NvuUFtBc5BVrtr%2BI%2BUgbMVLctO79LnWeHw%2B5m4DFWvHZS5jy3Fp508ilF6jB3d4ASayLsA3l31x%2F641MiHI6CTajefBX7JWtPZBGmkPS4LtnkxOdZJUpYrQebpgDSu3WXk6%2FMy%2BQbN2DR2MlGDPRTdY%2BHcd1s9RCKSnc1pOWxkEnQE%2FSKDhxs2FeujBYHDKcDvJXGim2ZWIxQPb%2Bu%2B1t34UaGeKgiqLVWRx5a7eqTFQSRMFic6%2B%2FQGYC2koJXtkeE0SCQnStk5wg%2Fk%2Bc2oGZtntWJTvW6osExT3Hw%2FirkcphDzXmJ%2BFWw4ZkBovG4VN2w11oYOa2GUeZqRUDnEB6%2FS4vNk6jC73Ax18ESGM4xV4cFciE82wUMlEv2VmVCuTMOTEd8Rg54PKoBdcvFYjcRxrHlgHxZYzdd9A%2FOZk91CfCeIWmQrIjMA1b80TFqjBvYxQD0cYE9DJvIp5O4rGSj3gvMrQLDORKUAz%2F0uyxrFQM5lhRl47JQkCJoH9DjwLSiws%2B1PMeKiNIn2hRFKIoHZJRj3ZxZiEnlf7tXkqdBFl7SFTJDThOKCTRNQnFY%2FHowNkH4sqaBnjSo3F63mhcY7P5uW6d7W3Uz9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=FDzSMRR1XVn1du%2FNsXPdw58hpu%2BA7Ga85YK4kEW%2BWPm23ZqyNrqr6suJCI6wRHsovkGZe%2BBLtXU0%0ArIG94WFIyMDJBNqeawO%2F%2BABwCmACF0j32LI56itq4vssdYdipQrEvLDDmi89RF%2ByIBXAE0T04ho1%0ALA1j1Ey%2FurxulloMTOjz12KBGgzpCUNWZnbZvzM0BoUOGVYNgjeN0DFrZKapLJc%2FGTt3KpGPVyrb%0AI0MrrySMW1Di%2BQXlJ4UrfZhAAoHILxqrDh7TN21%2FUsrtke7iZLt1dv3%2Bfai%2BukC%2FWzNZcxtw3vQS%0Am3HTzVxDWjHbbFXQS2jCPT%2FMhmeOVI3NV75PlQ%3D%3D")
|
1581
|
network 2018.06.05 17:03:16.621 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Server": "Apache-Coyote/1.1"
|
1582
|
network 2018.06.05 17:03:16.621 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Location": "https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1iQ6gZc1tMoEEg1fv1R3j7bZe%2B%2FYfczICI847h7uxz3405%2BP9%2BunrZjmZuh%2F%2BQr%2FDH39qeizIW%2F66pevvid%2Bo77%2B%2Bdc%2Fzcn7hYzfnWIeh34ufroX9fP330d%2F%2BbpO%2FfchmZv5e5%2B8i%2Fn7kn13GUP%2FjvwMfR%2BnYRmy4fX1J76Yl6ZPlt82qpdlnL%2BDYNHk3%2B4p%2Bc%2FZ0PdFtvx8H2VPXsu3tJheTf9zXoDsWkxVMWlDvwzPIgV%2FiHaKrGi2wi2m7VUsf56L%2Bcf5lfwXHCZyGEnTbxBFY9%2BwHMW%2FpRAGf8sSiMZgkspKtPj6k8L%2F8rVAsRJKS%2FwbjZfZNwzCoW80AmffoJSmUZzAaSRN7pn9XzB7wy9f%2F5skCbQoCuRbVuTQvYiiv6U0TH9DEgonoZJGUPKH%2BHleC6Wfl6RffvmKQDD1DSK%2BQbgH498h9DtM%2FAxRePz1p%2BAvar8V9fUPJX%2F%2FbfH09xr%2B3xWczHMx%2FVDq11%2F%2Fqsx%2FUeKfwN9s9Yfwv9rTXZJlnf%2FpJzfkxU9B8lqL%2F33jG969%2BLu7Ztmt%2Fq%2Fgr39sMn7%2FB7HfhT6bznEpcuYvJ%2F2PwP3puP3yb8L4ZEn%2BkPPjj9896naofd9%2F3tGfh6kCEQiCQQgDb2e9Z%2FzXbZf8NmGCZUlGljmKFWRGQzgMESQMo1iWJnCaE%2BnXn7xzvKH%2FH%2BUJr%2BJd9MttuL8%2F2W0Io1jqIf%2BJeVXD1Cz1%2B%2F9CVlLMMEJ9y9Lshx7z%2BbtWnEpfDn8gzOd%2FIwMCIfoHvnxuqv%2F6p5MU%2BS3kd8x0QmcYDhcFhZBUQmNlkZFFntA4klF5mcP%2FXzBMc%2FIN%2Fm%2F8HwH8BibEIfqHvf76g%2FvhsWWTJUvxq6Eo%2FMVzHDO5FbMrLFMpHGMbO29HqjbESr1lJmMLOmszexUPB3cxKluZActEHtM5omFTP%2BbygW0rX4Q95uJQnZMndvAXY%2F4%2BMfPYTn1l72NMW8E3WEViYF%2FgakN3A0d4Nuzf1vCM9vua2fvCQIFktkJjcMxvC5h9j31IND2RfiVPe8lkdYs5vE0RfI2fJhRCwcO%2BhNpgKYlzP5KrpChvCyrjRO6X%2BPnqbOkFxfKwRO%2FgTKXXqr%2Bdl8FiIe8JqOEJu3kJsHEpuyEO95jyz2N%2Fhf%2Fl3%2BH%2FT%2BB%2F%2BXf4%2FxP4X%2F4d%2Fn8LX1FYpf1hqO5Td41E7xB7W1tkmAf3hbEp5nYPlqu02yUEBnmcVqokW17IbgnyDLVrDzoqHf9EME7B8wSDm0dY9XowgAlnV%2F61YK2luODRMl9kVb8igXBIJZC4zL40u7iSg%2Fdp%2B9E6%2BmAI7kzwRRSEcvJ4UyId2CazpWeOFkDrxmhYPPQzRRYNVbf%2By1qBzzT%2BWEYRLCAjKlOWFMicHt1JxlvlFnXstV7LR%2B4QsAq3Hr7dQebqRn3qOm2yTTUn4AMT5zjWDV8o1cJx78m7xzGQH%2BmFgYhqP5EccNLplLFq74VC68khKCF1kpEGJD4Cwla%2BoQWthcVbWrFHDz8rzzjFL1ihjVUeIwuAC4y6TL4l9rGARUkgkPKZ44Xf4qkfsTNF8Rh8dBgDJu9d4RmbYYdj2CX%2B9%2BslO4bwhWkZxmDmH96f8%2FttgV0ROv6frTX%2FZq0fBpos88n4wMUngzOlujy24KfW%2BoRSheCL09blByepSQKJ3qT3sfTfJeTBnYDNnMjI6%2FRRU4fMpFJwylQB6tAhIqclKnhh2hUNrmowzBUZ1oGuvmAoQNDdu2xDuacrvu%2FGviRAnFl4mxmMfPhI9SGzRTkFZL%2FhQNQ1y5r2vOvFLKBZukaDu0zlC%2FIGo%2BILvT6uXVzyR2xAKoyEZShoql37VJIDfszm79ryl%2BMACGE%2FshioD5Amck6lKtmTpLkadjciCv2BssC0fimWz9A8hxd5H2V7N%2B4JqENTGAuNZm9HpztDjjBG06D3wBq%2BVoKItbaECtuIBeWWlqI6vqolvVz4S%2BS%2BZHlJBGTkvPZffvkT%2BEco%2Ffvo%2BdfB3%2BPrjyl%2FpI4%2F0hLXjHUx%2Ff7vb3nq94Hf8vuvBU4bR3vuuWADE9kWx%2BvKe2qiLL42MSoI02OwX72%2FweJ7nVRl1jG%2BddwF3cAAC0FTteAt6OHtOdosgGqyBmcIUFVS2MIGRn7E7Kj6OjD3GZifKaSfGfgUkA51MpQwIZZ%2FiGS00j5KgcQsos9s0jMXoysB8AqeztYqQ8bklaDwS73SeFohBbDlduqeWf8yBtvTrCaG8gaj3QJ3vBccbeEoJhr58iNOAwmHsDySUUdchk7Ng8Tg8c6exrnGgle2aQaCdVHnIfkyBZEd8FC%2BerSF822aiLmpPwnvFaWFzuUphZk%2Bhh4id6dPG3Wm0w87yGlEpJchVz78GQi0F7grdtqgr2hBwvww1b%2Bo%2Bh%2BG%2FjDWPzKa227%2FzwYkvJJ9SxsQQ88rn00aQIydKE1kThZVSw3M8IbwU0%2FmNA6DtH%2FkR%2Fxok3HtuE3FxSdj7zZxrY4Fqx0CcS3pKHAz4wnxVPZN7Qb9WS3b9kbuuAfFG5MdbGcQ%2FEFOHdy2cRsKYg1gb%2BLzgjcAYdt9FNxKEtC%2Bdg4KVC7oAHr0wekflimgYeum68ia2Xmnn%2FMozx3GdEzB%2BStbhEMOxvaAQVYJiFf7WJoa4WDuakZGSsj2ZHuMRV6oPeyKs0aVkMwXfmQB7zYkzMH8vGAHHYbhIastG8U6Aqi8L3eboMsdI%2B8mYkhH3fuXfAaU0dLM8yHGZhXGCwjsgcW2%2BW5Rp0EnqeP6tJarntuPjsjoUMmnzIS8IWD96GpOP2pLXpgICBvGXHK1q%2Fcn2JfxzrOVOuEu2VMZQMNAlpqaOr%2B9QoFU3T5mu9j9DjUbpEKnNw0zxfghLS0nc7cejFXI6gKoCj4ALed8lS2MBSx1tdGorP7rqeMImz%2BXuU54mZsSO2WFxxXdfCoUGaMDcqPngkMYZ%2Bs1sp2W8ECErxyf9msbTEEBJsJsghnXcuuTCo%2F9c3i0VBIPptdhJUhX0O6VrKXfC6GIRPqi1DpKHPB8Uz76ASxeJmAS2iGRI9N46eJkJWEtjAAve3QI%2BaTYQW1ssY0c%2FuRj1xbmW00wmkQOKbNGTtIesgmcvTOcvNNlBkhz2vWAZ2%2B6imnJHjlqCOYuuZOGz8Ag%2BMBorgMw1grzC2DuQ%2BLK20cXU3PKU4PLGdfEyqT1CHz3wydOYvgk%2BhMzYaMeus7DZoUNGbtY7%2Fwyp7toKUMapTNApFUl7O7p1%2BvehCi1ENOilZMszg6REMMEH7KHc3W9YmUU8pyJ31kMcfnPFZDuvBqVeBngXe%2Fqq%2FLQ527NNss%2FiDzYDfe94LgVFMW8LvvsddfauRkyTxHFedxTWD0%2Fb%2BBZJTJiBSquht4aUPFQhmcBXthyYj8jXHqr1l2QhkJQVyUN8eagCoRdv5Qt4wymFW%2B%2FOHsx7QITKqaaBecUlAKQfAPMxxLZLWzniuVfvrdKEd9Z2aczPh9P1ABVCFVDUXNjHs0aKOCPrtBMZi1bLj28A5pz2uyNBwp5xWihvlgm45uHI42IvMXs2UObN7%2B2qQidnYeGUAiMj91FrLMCXATphyNxfTLsAt5MWssgEgMm8BGcqnlf%2FSBRRKfjXV4FJjxBepANy6avuXj2FQU%2BpjxQw5sHCaahr9ykKMM%2BQNkdplxtxHb9w9ysJlgOBvE8DonCUCUiZlwXWJ5asQg5mmlcxTtf8%2FHQxdnU%2FHz3YMQDzk1rSXmHJwfRjHRVASy7w4rW2MqL4Qbwc3S59ziujGyeTWxXJmUbs7O1Ox8Q21Ut6uDSYkR5BEHjaQEjuRJ%2BynRvV2mi8zkJAbd%2FGDcfQ%2FsP9dbvHSwGXl43n6LLZ7hwFf5Ul4pUqWAwyDKI5Gcn0YvnkfFwHSpi6znAVEbwPF1W4v2XHsoCPb73jxSD9ooNvQn1TL%2BQAV%2FB7esJ%2BIEz%2BrWFoX3aYt3FSo8oK4ZgMcS1600XNABEsZtVeM2WDTFP18yJAqY9Ng8%2FhFFOs49Xj1hAIMYLYuYmEE8Nz%2B1tIntt96xwluCSlIMJeDJH4p1P30K9Nsmj15sVs4SCneYsUNtMnZjRjXJzXj4Sa2ZZh1K7wZzQg8rGn%2FpbWD%2BYTG0jsjGrCF61wSG8QOZpqJeP9oXxp72ZtqYOSQjOs%2Bw3tTh%2B8DWhqB2zKwbpyLKmm9FiVKLIGpfV%2FWuIzSZK39IYrAFwvN9wGY7g5S8Z3Erq%2BM5lSQgetTLJ1rBmmMlGj96y38KH1ejjI1jbYiGHUKAtraAQGcAHFuunmGAE%2FQ6xZKCA2SmZ%2BClPMGYaDR4Yc8Cld0hxwk9ig5otJnodyCvbT%2BJOJ8divUA3aHef6hnM7GUU9C0LRTgWSO%2Fsp6pPc6LSE%2F489pb1WJsqccJJDo9DCYWM8hx4acSIjktDlYgmAzstBxorvYhjXWx5fdqjT66fZUcqAlzV%2BtN5w4tXUr7f%2BsbZAsV0dvpk4U1EkWeaURJgEFlW2p1q7u%2FgTVQHIlNNV5O3aPIKyXxdJzmgairWdkITzRGthQsbR88loDxeE0NIYjuaT7zNeAG4eTJVehsubVXv2KHTG5ICreuCoeAWvpBPerBU04%2FK4%2B3hAXhfzChdGercsSRI0dSPS86rrpmNlYbBepVeOcFh0CeHlDAvazj7RJFldno67UyTjmxz4SOE1It3PFrk019zCbopCHSlGLzV7O4wQaJyaLXcXPMOC7HUz4ke6RzabvJ7ewYVDKpbO53p9rrEm6A8RcDOg1MBWhYdtw7s1ZBsV8vFAxtM3w9IPT97ByoPJFoIdWCV%2Fsxd5BQdzM83frV7TSdpYXYh3LqiMqb3MmHkA2CEFWlFfV1QM3wk2xZmSwnLbvrsIQZgH6T1iHf84xeay31qFnt05GQlTlXXbDDYp4E02fxoIMlH2yySyGipn9VhyGMhUzMI6bVJ4Nl5yMV5V5UlVDJXU9YsAOT%2B2wAnHZbGR%2BTHrx2%2Br59vLZoCCAW2ikxBzIxW63tG8keb29E1x5jAokbNXFXkRGRpwWBZJMsDcxhm%2Bjh9KUAJXWHFwbYZie0cyfcj0Qk2JGTO6Qq19Kb16n3lqyDZscGWXj9oJYEP0mTVgwJhhrzZ4wRrAmoRj2Ni5KpQwbcnvQAmDTPcKB5utRFLFovvV3jFHssNepHNmzPU0bvR7XN5s28SCdiS1hyQWMtGBxz97WE5UNUpsfGXddNFldMmUSJdRjmCeJAx%2BrW2a4Dvm6U7b3qYOooQZG%2BsKAwO9WerBFMUI7dTFp0cUtUsbWOyaJidA6XBXA8KzkgqnSMDMHh8ZOsuoPJciT5UkvQGscTLGzhKqtlYyEYeMFih3ImA7mdE80icveOIP7X6ts41MC%2BzCRfqvJKTIRgZnWpZOEaPcHbl46Y5fvJiqH7sD7aghO1BjP1hLeRhrit%2FOmQd7mp0X3H1GZDknZnCrnqqqyI1ncSVXuyjOkEPpllZrLSxVcQsRzqSNwmqhVJcHyCRqUMG8CKOx1RpEK2t43kQOQFT6cc1KaN7fLZmZLUuqrS7mA%2BesPgcRQ5HzPqIHfgTkbsaPOXHghEvWuOkhhtkwbW3vY1UMQsaWFCRq0wS2DMvBKahYjwa%2BXi02%2Fbk3AVOmRRJxvPJq6tsDmxIp42oZBMITYf%2BeqlV%2Fnw77eWVYaUyucJU2uSL%2BxnnzKfXFqZJi9bDLr8OGP9qER6ez7a5W1tmshhtHUMEuyzrtenIZRcWWnplium4MznORSwNXGtZo8srA%2B6Su5aQeYm%2BVXsXi8bFBajbQw5iM0nljmXTLCWZtAtN3NeKa2PFa1jpaiCzRSKQwyk0xFHoz%2B0sF61AuZ2trT7Y1gsdzWO%2FuJuadkYxS9bNl5%2FC%2FcxguVqTrdEiAZfOY%2BMB2MIqmSjwAhp74NiQe93HKYoWHwuy8LNnEY7FGoVJB5sdyfDY%2FCEPkIggkCXDu0Y9iBcRze0z7%2F0Ohoo8LjuanSoq%2BUA6%2BAhrDHwHyGzmVhyRHy%2FoXuo7pAkTXKCr%2FwRraCzPpxE0fP2RjdCMb%2BIQfeZsgnpWSx00YjlWM8iBhs%2Fh9oDS5QxidAmYnTBNF4IJ1ZhPYL0fL8P1HUHfD4iPru5D2TndEdPF70FASoXAeuFJ3TvwjqrkMA8K2VnkvNmNb%2BggnaXO%2FXmutasEpHhy%2BEf5Cp23sBeyiZioZd3c53ItRlOXu89FZay06r6OsEQ%2BsnrelwugjAw6VJo4JwA%2FPC0tbsSiHHHSnySTsigwvvvMfZR62eBlr2nthjTNyMu0ONVoGrZ%2BKKJLQ7rIHqjdPAH%2BObVtQ7KGcPdlEKE1l0Y%2B20JanrHQusKQPB9ISXDuRbBPE3R%2F5MmxwaJSEV8OtlDc9HwK%2FjJHuHAYOX33Anyvn2yQxbPlyUvSkD1PzE4Od7DHPleMgl28aLbq606LU7WaOO0cVipYxCi%2Bi9f6co8nk0%2BA8gjSi4Ek6xpgvM%2F1CuFfuGFLetzTMePLJs4t96VzP1R%2FeZjWehA38R2QblX6yF9IEgd82STWJAbzE6NrAz3E27rNuQ53%2B%2B0Iq%2BvgGoWTdH34qCx54qLc2LVSYOJTK%2FWtD%2BUUb0PdsLUehIHqUojMheENjUH5nCTPIEHGrC0iUJEh3e5CVzIt3kXLVXH9Sa2DKrgoedGup0R8tLMjXzfBl40yk3btdv8yyXneXXFMAEp8OF%2BgqSPvNr%2FbXdb%2BGGaSELS92cURXwPK8eklzIFMToDDqri7thR6JFZbw04%2B6d4t9N2CRWn93Vr8TTSfKJ191n7zUsDcH6PwiGaADzF4%2FKAz53SaiKcK5KlXuXrmGJFnpI0qNfjN4oRi3g4GKP8IhXmIpzh8UUoU3XnEdTjAaDWzYejcMY2neAKeOvmfQ0%2Fwknkmo%2FVc6yreE8ZviVyIMQfOpycNuy7zMKDaA1GHVYicZwrbqArmdm5CBIahHHIzN%2FzPimybs5ZbJoeaBOKcfh6EEudcOyFsOoCd9KDUdDWa3u2K0HuszeIf01uckKaebLw%2B1RfNvIbnud9BiETp9uDIRyahEKa3FrOSUmair7FZFnaEN2FZg%2FBCMjNH3mqGwatHKz2XYOx1aYY88N2oank6m7p2N7jwIsYXxOfg5G3748ylJm7uw82iwyW%2BWq6pkDJoFm5Jp2DTuiKeeHjnYR0hK4f7bEvQZy6J7BHOmNLFJjgSpaRYYkdje1wnfIpGcOr3OzAJ9AWRUmm9kZfdocUCi4KBn5v4fng%2BWHzCQ1lUgk3gxBOjyBLaHS%2FCpN9GARUr3TYCeK8GhlHfG%2BXPku0ewl1PYzlOGQsr8%2ByJ%2BrPQ7WQi%2Bx1xgmTrzPJNwxLtjSoEnU4%2BjWrvmXWUKLufwIghdtRCctPXDtC1yRPSDh1K6Iky%2FU5CNzHWKiLal8lddy229ZK%2B2Q%2BmNrTpOfc%2BW3N2LlIRmb5x2ah2x7%2BLjsSqLRxmWIvqLG8TjIO8bqHsCZNTdQegy06u%2BcmiiOa%2F6TThUfVicVav1xO8%2B%2FYOe%2BfM96SnWqg2BmqDQH7c9Vjh7ZLOW%2Fjd4vUGeaMrnWnCZ4%2FMPkMCDRoTskxKwYdj2bDSH%2B7VKJDIOgaq1XgW8c6K0J8H2JCu5tBFKrjHfkrd1dt464grsQ6GSnfpAJ82y%2FAQvwUpMB77PN3vU8hcFXehwWmFAVhYieROPYLJTeLzkvHA7tpfSfTu7LiSHieU%2BxPSR4FIbcoY8bLcXNJwlxeuKHov2R6GZNtPr8tm6clVnVILJoiaUDVTS2ArsEl6cVTuBIxfWcHkid4kIvQpqhQ2Og95T6xF7GIYMtlGiY0kHCL4Ou5XcJkbFHZ1%2BRN2%2FTXGqH1vX69lQ4PA1xX9bgjEQTztke2un91xN9NvuUFtBc5BVrtr%2BI%2BUgbMVLctO79LnWeHw%2B5m4DFWvHZS5jy3Fp508ilF6jB3d4ASayLsA3l31x%2F641MiHI6CTajefBX7JWtPZBGmkPS4LtnkxOdZJUpYrQebpgDSu3WXk6%2FMy%2BQbN2DR2MlGDPRTdY%2BHcd1s9RCKSnc1pOWxkEnQE%2FSKDhxs2FeujBYHDKcDvJXGim2ZWIxQPb%2Bu%2B1t34UaGeKgiqLVWRx5a7eqTFQSRMFic6%2B%2FQGYC2koJXtkeE0SCQnStk5wg%2Fk%2Bc2oGZtntWJTvW6osExT3Hw%2FirkcphDzXmJ%2BFWw4ZkBovG4VN2w11oYOa2GUeZqRUDnEB6%2FS4vNk6jC73Ax18ESGM4xV4cFciE82wUMlEv2VmVCuTMOTEd8Rg54PKoBdcvFYjcRxrHlgHxZYzdd9A%2FOZk91CfCeIWmQrIjMA1b80TFqjBvYxQD0cYE9DJvIp5O4rGSj3gvMrQLDORKUAz%2F0uyxrFQM5lhRl47JQkCJoH9DjwLSiws%2B1PMeKiNIn2hRFKIoHZJRj3ZxZiEnlf7tXkqdBFl7SFTJDThOKCTRNQnFY%2FHowNkH4sqaBnjSo3F63mhcY7P5uW6d7W3Uz9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=FDzSMRR1XVn1du%2FNsXPdw58hpu%2BA7Ga85YK4kEW%2BWPm23ZqyNrqr6suJCI6wRHsovkGZe%2BBLtXU0%0ArIG94WFIyMDJBNqeawO%2F%2BABwCmACF0j32LI56itq4vssdYdipQrEvLDDmi89RF%2ByIBXAE0T04ho1%0ALA1j1Ey%2FurxulloMTOjz12KBGgzpCUNWZnbZvzM0BoUOGVYNgjeN0DFrZKapLJc%2FGTt3KpGPVyrb%0AI0MrrySMW1Di%2BQXlJ4UrfZhAAoHILxqrDh7TN21%2FUsrtke7iZLt1dv3%2Bfai%2BukC%2FWzNZcxtw3vQS%0Am3HTzVxDWjHbbFXQS2jCPT%2FMhmeOVI3NV75PlQ%3D%3D"
|
1583
|
network 2018.06.05 17:03:16.621 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Cache-Control": "no-cache, no-store"
|
1584
|
network 2018.06.05 17:03:16.621 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Pragma": "no-cache"
|
1585
|
network 2018.06.05 17:03:16.621 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Content-Length": "0"
|
1586
|
network 2018.06.05 17:03:16.622 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Date": "Tue, 05 Jun 2018 15:03:15 GMT"
|
1587
|
network 2018.06.05 17:03:16.622 UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46) : SOP-Check( "https://eid-prod.verwalt-berlin.de:8443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= false
|
1588
|
default 2018.06.05 17:03:16.622 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:291) : SOP-Check failed, continue process
|
1589
|
default 2018.06.05 17:03:16.622 ...shAddress::sendGetRequest(core/states/StateCheckRefreshAddress.cpp:133) : Send GET request to URL: "https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1iQ6gZc1tMoEEg1fv1R3j7bZe%2B%2FYfczICI847h7uxz3405%2BP9%2BunrZjmZuh%2F%2BQr%2FDH39qeizIW%2F66pevvid%2Bo77%2B%2Bdc%2Fzcn7hYzfnWIeh34ufroX9fP330d%2F%2BbpO%2FfchmZv5e5%2B8i%2Fn7kn13GUP%2FjvwMfR%2BnYRmy4fX1J76Yl6ZPlt82qpdlnL%2BDYNHk3%2B4p%2Bc%2FZ0PdFtvx8H2VPXsu3tJheTf9zXoDsWkxVMWlDvwzPIgV%2FiHaKrGi2wi2m7VUsf56L%2Bcf5lfwXHCZyGEnTbxBFY9%2BwHMW%2FpRAGf8sSiMZgkspKtPj6k8L%2F8rVAsRJKS%2FwbjZfZNwzCoW80AmffoJSmUZzAaSRN7pn9XzB7wy9f%2F5skCbQoCuRbVuTQvYiiv6U0TH9DEgonoZJGUPKH%2BHleC6Wfl6RffvmKQDD1DSK%2BQbgH498h9DtM%2FAxRePz1p%2BAvar8V9fUPJX%2F%2FbfH09xr%2B3xWczHMx%2FVDq11%2F%2Fqsx%2FUeKfwN9s9Yfwv9rTXZJlnf%2FpJzfkxU9B8lqL%2F33jG969%2BLu7Ztmt%2Fq%2Fgr39sMn7%2FB7HfhT6bznEpcuYvJ%2F2PwP3puP3yb8L4ZEn%2BkPPjj9896naofd9%2F3tGfh6kCEQiCQQgDb2e9Z%2FzXbZf8NmGCZUlGljmKFWRGQzgMESQMo1iWJnCaE%2BnXn7xzvKH%2FH%2BUJr%2BJd9MttuL8%2F2W0Io1jqIf%2BJeVXD1Cz1%2B%2F9CVlLMMEJ9y9Lshx7z%2BbtWnEpfDn8gzOd%2FIwMCIfoHvnxuqv%2F6p5MU%2BS3kd8x0QmcYDhcFhZBUQmNlkZFFntA4klF5mcP%2FXzBMc%2FIN%2Fm%2F8HwH8BibEIfqHvf76g%2FvhsWWTJUvxq6Eo%2FMVzHDO5FbMrLFMpHGMbO29HqjbESr1lJmMLOmszexUPB3cxKluZActEHtM5omFTP%2BbygW0rX4Q95uJQnZMndvAXY%2F4%2BMfPYTn1l72NMW8E3WEViYF%2FgakN3A0d4Nuzf1vCM9vua2fvCQIFktkJjcMxvC5h9j31IND2RfiVPe8lkdYs5vE0RfI2fJhRCwcO%2BhNpgKYlzP5KrpChvCyrjRO6X%2BPnqbOkFxfKwRO%2FgTKXXqr%2Bdl8FiIe8JqOEJu3kJsHEpuyEO95jyz2N%2Fhf%2Fl3%2BH%2FT%2BB%2F%2BXf4%2FxP4X%2F4d%2Fn8LX1FYpf1hqO5Td41E7xB7W1tkmAf3hbEp5nYPlqu02yUEBnmcVqokW17IbgnyDLVrDzoqHf9EME7B8wSDm0dY9XowgAlnV%2F61YK2luODRMl9kVb8igXBIJZC4zL40u7iSg%2Fdp%2B9E6%2BmAI7kzwRRSEcvJ4UyId2CazpWeOFkDrxmhYPPQzRRYNVbf%2By1qBzzT%2BWEYRLCAjKlOWFMicHt1JxlvlFnXstV7LR%2B4QsAq3Hr7dQebqRn3qOm2yTTUn4AMT5zjWDV8o1cJx78m7xzGQH%2BmFgYhqP5EccNLplLFq74VC68khKCF1kpEGJD4Cwla%2BoQWthcVbWrFHDz8rzzjFL1ihjVUeIwuAC4y6TL4l9rGARUkgkPKZ44Xf4qkfsTNF8Rh8dBgDJu9d4RmbYYdj2CX%2B9%2BslO4bwhWkZxmDmH96f8%2FttgV0ROv6frTX%2FZq0fBpos88n4wMUngzOlujy24KfW%2BoRSheCL09blByepSQKJ3qT3sfTfJeTBnYDNnMjI6%2FRRU4fMpFJwylQB6tAhIqclKnhh2hUNrmowzBUZ1oGuvmAoQNDdu2xDuacrvu%2FGviRAnFl4mxmMfPhI9SGzRTkFZL%2FhQNQ1y5r2vOvFLKBZukaDu0zlC%2FIGo%2BILvT6uXVzyR2xAKoyEZShoql37VJIDfszm79ryl%2BMACGE%2FshioD5Amck6lKtmTpLkadjciCv2BssC0fimWz9A8hxd5H2V7N%2B4JqENTGAuNZm9HpztDjjBG06D3wBq%2BVoKItbaECtuIBeWWlqI6vqolvVz4S%2BS%2BZHlJBGTkvPZffvkT%2BEco%2Ffvo%2BdfB3%2BPrjyl%2FpI4%2F0hLXjHUx%2Ff7vb3nq94Hf8vuvBU4bR3vuuWADE9kWx%2BvKe2qiLL42MSoI02OwX72%2FweJ7nVRl1jG%2BddwF3cAAC0FTteAt6OHtOdosgGqyBmcIUFVS2MIGRn7E7Kj6OjD3GZifKaSfGfgUkA51MpQwIZZ%2FiGS00j5KgcQsos9s0jMXoysB8AqeztYqQ8bklaDwS73SeFohBbDlduqeWf8yBtvTrCaG8gaj3QJ3vBccbeEoJhr58iNOAwmHsDySUUdchk7Ng8Tg8c6exrnGgle2aQaCdVHnIfkyBZEd8FC%2BerSF822aiLmpPwnvFaWFzuUphZk%2Bhh4id6dPG3Wm0w87yGlEpJchVz78GQi0F7grdtqgr2hBwvww1b%2Bo%2Bh%2BG%2FjDWPzKa227%2FzwYkvJJ9SxsQQ88rn00aQIydKE1kThZVSw3M8IbwU0%2FmNA6DtH%2FkR%2Fxok3HtuE3FxSdj7zZxrY4Fqx0CcS3pKHAz4wnxVPZN7Qb9WS3b9kbuuAfFG5MdbGcQ%2FEFOHdy2cRsKYg1gb%2BLzgjcAYdt9FNxKEtC%2Bdg4KVC7oAHr0wekflimgYeum68ia2Xmnn%2FMozx3GdEzB%2BStbhEMOxvaAQVYJiFf7WJoa4WDuakZGSsj2ZHuMRV6oPeyKs0aVkMwXfmQB7zYkzMH8vGAHHYbhIastG8U6Aqi8L3eboMsdI%2B8mYkhH3fuXfAaU0dLM8yHGZhXGCwjsgcW2%2BW5Rp0EnqeP6tJarntuPjsjoUMmnzIS8IWD96GpOP2pLXpgICBvGXHK1q%2Fcn2JfxzrOVOuEu2VMZQMNAlpqaOr%2B9QoFU3T5mu9j9DjUbpEKnNw0zxfghLS0nc7cejFXI6gKoCj4ALed8lS2MBSx1tdGorP7rqeMImz%2BXuU54mZsSO2WFxxXdfCoUGaMDcqPngkMYZ%2Bs1sp2W8ECErxyf9msbTEEBJsJsghnXcuuTCo%2F9c3i0VBIPptdhJUhX0O6VrKXfC6GIRPqi1DpKHPB8Uz76ASxeJmAS2iGRI9N46eJkJWEtjAAve3QI%2BaTYQW1ssY0c%2FuRj1xbmW00wmkQOKbNGTtIesgmcvTOcvNNlBkhz2vWAZ2%2B6imnJHjlqCOYuuZOGz8Ag%2BMBorgMw1grzC2DuQ%2BLK20cXU3PKU4PLGdfEyqT1CHz3wydOYvgk%2BhMzYaMeus7DZoUNGbtY7%2Fwyp7toKUMapTNApFUl7O7p1%2BvehCi1ENOilZMszg6REMMEH7KHc3W9YmUU8pyJ31kMcfnPFZDuvBqVeBngXe%2Fqq%2FLQ527NNss%2FiDzYDfe94LgVFMW8LvvsddfauRkyTxHFedxTWD0%2Fb%2BBZJTJiBSquht4aUPFQhmcBXthyYj8jXHqr1l2QhkJQVyUN8eagCoRdv5Qt4wymFW%2B%2FOHsx7QITKqaaBecUlAKQfAPMxxLZLWzniuVfvrdKEd9Z2aczPh9P1ABVCFVDUXNjHs0aKOCPrtBMZi1bLj28A5pz2uyNBwp5xWihvlgm45uHI42IvMXs2UObN7%2B2qQidnYeGUAiMj91FrLMCXATphyNxfTLsAt5MWssgEgMm8BGcqnlf%2FSBRRKfjXV4FJjxBepANy6avuXj2FQU%2BpjxQw5sHCaahr9ykKMM%2BQNkdplxtxHb9w9ysJlgOBvE8DonCUCUiZlwXWJ5asQg5mmlcxTtf8%2FHQxdnU%2FHz3YMQDzk1rSXmHJwfRjHRVASy7w4rW2MqL4Qbwc3S59ziujGyeTWxXJmUbs7O1Ox8Q21Ut6uDSYkR5BEHjaQEjuRJ%2BynRvV2mi8zkJAbd%2FGDcfQ%2FsP9dbvHSwGXl43n6LLZ7hwFf5Ul4pUqWAwyDKI5Gcn0YvnkfFwHSpi6znAVEbwPF1W4v2XHsoCPb73jxSD9ooNvQn1TL%2BQAV%2FB7esJ%2BIEz%2BrWFoX3aYt3FSo8oK4ZgMcS1600XNABEsZtVeM2WDTFP18yJAqY9Ng8%2FhFFOs49Xj1hAIMYLYuYmEE8Nz%2B1tIntt96xwluCSlIMJeDJH4p1P30K9Nsmj15sVs4SCneYsUNtMnZjRjXJzXj4Sa2ZZh1K7wZzQg8rGn%2FpbWD%2BYTG0jsjGrCF61wSG8QOZpqJeP9oXxp72ZtqYOSQjOs%2Bw3tTh%2B8DWhqB2zKwbpyLKmm9FiVKLIGpfV%2FWuIzSZK39IYrAFwvN9wGY7g5S8Z3Erq%2BM5lSQgetTLJ1rBmmMlGj96y38KH1ejjI1jbYiGHUKAtraAQGcAHFuunmGAE%2FQ6xZKCA2SmZ%2BClPMGYaDR4Yc8Cld0hxwk9ig5otJnodyCvbT%2BJOJ8divUA3aHef6hnM7GUU9C0LRTgWSO%2Fsp6pPc6LSE%2F489pb1WJsqccJJDo9DCYWM8hx4acSIjktDlYgmAzstBxorvYhjXWx5fdqjT66fZUcqAlzV%2BtN5w4tXUr7f%2BsbZAsV0dvpk4U1EkWeaURJgEFlW2p1q7u%2FgTVQHIlNNV5O3aPIKyXxdJzmgairWdkITzRGthQsbR88loDxeE0NIYjuaT7zNeAG4eTJVehsubVXv2KHTG5ICreuCoeAWvpBPerBU04%2FK4%2B3hAXhfzChdGercsSRI0dSPS86rrpmNlYbBepVeOcFh0CeHlDAvazj7RJFldno67UyTjmxz4SOE1It3PFrk019zCbopCHSlGLzV7O4wQaJyaLXcXPMOC7HUz4ke6RzabvJ7ewYVDKpbO53p9rrEm6A8RcDOg1MBWhYdtw7s1ZBsV8vFAxtM3w9IPT97ByoPJFoIdWCV%2Fsxd5BQdzM83frV7TSdpYXYh3LqiMqb3MmHkA2CEFWlFfV1QM3wk2xZmSwnLbvrsIQZgH6T1iHf84xeay31qFnt05GQlTlXXbDDYp4E02fxoIMlH2yySyGipn9VhyGMhUzMI6bVJ4Nl5yMV5V5UlVDJXU9YsAOT%2B2wAnHZbGR%2BTHrx2%2Br59vLZoCCAW2ikxBzIxW63tG8keb29E1x5jAokbNXFXkRGRpwWBZJMsDcxhm%2Bjh9KUAJXWHFwbYZie0cyfcj0Qk2JGTO6Qq19Kb16n3lqyDZscGWXj9oJYEP0mTVgwJhhrzZ4wRrAmoRj2Ni5KpQwbcnvQAmDTPcKB5utRFLFovvV3jFHssNepHNmzPU0bvR7XN5s28SCdiS1hyQWMtGBxz97WE5UNUpsfGXddNFldMmUSJdRjmCeJAx%2BrW2a4Dvm6U7b3qYOooQZG%2BsKAwO9WerBFMUI7dTFp0cUtUsbWOyaJidA6XBXA8KzkgqnSMDMHh8ZOsuoPJciT5UkvQGscTLGzhKqtlYyEYeMFih3ImA7mdE80icveOIP7X6ts41MC%2BzCRfqvJKTIRgZnWpZOEaPcHbl46Y5fvJiqH7sD7aghO1BjP1hLeRhrit%2FOmQd7mp0X3H1GZDknZnCrnqqqyI1ncSVXuyjOkEPpllZrLSxVcQsRzqSNwmqhVJcHyCRqUMG8CKOx1RpEK2t43kQOQFT6cc1KaN7fLZmZLUuqrS7mA%2BesPgcRQ5HzPqIHfgTkbsaPOXHghEvWuOkhhtkwbW3vY1UMQsaWFCRq0wS2DMvBKahYjwa%2BXi02%2Fbk3AVOmRRJxvPJq6tsDmxIp42oZBMITYf%2BeqlV%2Fnw77eWVYaUyucJU2uSL%2BxnnzKfXFqZJi9bDLr8OGP9qER6ez7a5W1tmshhtHUMEuyzrtenIZRcWWnplium4MznORSwNXGtZo8srA%2B6Su5aQeYm%2BVXsXi8bFBajbQw5iM0nljmXTLCWZtAtN3NeKa2PFa1jpaiCzRSKQwyk0xFHoz%2B0sF61AuZ2trT7Y1gsdzWO%2FuJuadkYxS9bNl5%2FC%2FcxguVqTrdEiAZfOY%2BMB2MIqmSjwAhp74NiQe93HKYoWHwuy8LNnEY7FGoVJB5sdyfDY%2FCEPkIggkCXDu0Y9iBcRze0z7%2F0Ohoo8LjuanSoq%2BUA6%2BAhrDHwHyGzmVhyRHy%2FoXuo7pAkTXKCr%2FwRraCzPpxE0fP2RjdCMb%2BIQfeZsgnpWSx00YjlWM8iBhs%2Fh9oDS5QxidAmYnTBNF4IJ1ZhPYL0fL8P1HUHfD4iPru5D2TndEdPF70FASoXAeuFJ3TvwjqrkMA8K2VnkvNmNb%2BggnaXO%2FXmutasEpHhy%2BEf5Cp23sBeyiZioZd3c53ItRlOXu89FZay06r6OsEQ%2BsnrelwugjAw6VJo4JwA%2FPC0tbsSiHHHSnySTsigwvvvMfZR62eBlr2nthjTNyMu0ONVoGrZ%2BKKJLQ7rIHqjdPAH%2BObVtQ7KGcPdlEKE1l0Y%2B20JanrHQusKQPB9ISXDuRbBPE3R%2F5MmxwaJSEV8OtlDc9HwK%2FjJHuHAYOX33Anyvn2yQxbPlyUvSkD1PzE4Od7DHPleMgl28aLbq606LU7WaOO0cVipYxCi%2Bi9f6co8nk0%2BA8gjSi4Ek6xpgvM%2F1CuFfuGFLetzTMePLJs4t96VzP1R%2FeZjWehA38R2QblX6yF9IEgd82STWJAbzE6NrAz3E27rNuQ53%2B%2B0Iq%2BvgGoWTdH34qCx54qLc2LVSYOJTK%2FWtD%2BUUb0PdsLUehIHqUojMheENjUH5nCTPIEHGrC0iUJEh3e5CVzIt3kXLVXH9Sa2DKrgoedGup0R8tLMjXzfBl40yk3btdv8yyXneXXFMAEp8OF%2BgqSPvNr%2FbXdb%2BGGaSELS92cURXwPK8eklzIFMToDDqri7thR6JFZbw04%2B6d4t9N2CRWn93Vr8TTSfKJ191n7zUsDcH6PwiGaADzF4%2FKAz53SaiKcK5KlXuXrmGJFnpI0qNfjN4oRi3g4GKP8IhXmIpzh8UUoU3XnEdTjAaDWzYejcMY2neAKeOvmfQ0%2Fwknkmo%2FVc6yreE8ZviVyIMQfOpycNuy7zMKDaA1GHVYicZwrbqArmdm5CBIahHHIzN%2FzPimybs5ZbJoeaBOKcfh6EEudcOyFsOoCd9KDUdDWa3u2K0HuszeIf01uckKaebLw%2B1RfNvIbnud9BiETp9uDIRyahEKa3FrOSUmair7FZFnaEN2FZg%2FBCMjNH3mqGwatHKz2XYOx1aYY88N2oank6m7p2N7jwIsYXxOfg5G3748ylJm7uw82iwyW%2BWq6pkDJoFm5Jp2DTuiKeeHjnYR0hK4f7bEvQZy6J7BHOmNLFJjgSpaRYYkdje1wnfIpGcOr3OzAJ9AWRUmm9kZfdocUCi4KBn5v4fng%2BWHzCQ1lUgk3gxBOjyBLaHS%2FCpN9GARUr3TYCeK8GhlHfG%2BXPku0ewl1PYzlOGQsr8%2ByJ%2BrPQ7WQi%2Bx1xgmTrzPJNwxLtjSoEnU4%2BjWrvmXWUKLufwIghdtRCctPXDtC1yRPSDh1K6Iky%2FU5CNzHWKiLal8lddy229ZK%2B2Q%2BmNrTpOfc%2BW3N2LlIRmb5x2ah2x7%2BLjsSqLRxmWIvqLG8TjIO8bqHsCZNTdQegy06u%2BcmiiOa%2F6TThUfVicVav1xO8%2B%2FYOe%2BfM96SnWqg2BmqDQH7c9Vjh7ZLOW%2Fjd4vUGeaMrnWnCZ4%2FMPkMCDRoTskxKwYdj2bDSH%2B7VKJDIOgaq1XgW8c6K0J8H2JCu5tBFKrjHfkrd1dt464grsQ6GSnfpAJ82y%2FAQvwUpMB77PN3vU8hcFXehwWmFAVhYieROPYLJTeLzkvHA7tpfSfTu7LiSHieU%2BxPSR4FIbcoY8bLcXNJwlxeuKHov2R6GZNtPr8tm6clVnVILJoiaUDVTS2ArsEl6cVTuBIxfWcHkid4kIvQpqhQ2Og95T6xF7GIYMtlGiY0kHCL4Ou5XcJkbFHZ1%2BRN2%2FTXGqH1vX69lQ4PA1xX9bgjEQTztke2un91xN9NvuUFtBc5BVrtr%2BI%2BUgbMVLctO79LnWeHw%2B5m4DFWvHZS5jy3Fp508ilF6jB3d4ASayLsA3l31x%2F641MiHI6CTajefBX7JWtPZBGmkPS4LtnkxOdZJUpYrQebpgDSu3WXk6%2FMy%2BQbN2DR2MlGDPRTdY%2BHcd1s9RCKSnc1pOWxkEnQE%2FSKDhxs2FeujBYHDKcDvJXGim2ZWIxQPb%2Bu%2B1t34UaGeKgiqLVWRx5a7eqTFQSRMFic6%2B%2FQGYC2koJXtkeE0SCQnStk5wg%2Fk%2Bc2oGZtntWJTvW6osExT3Hw%2FirkcphDzXmJ%2BFWw4ZkBovG4VN2w11oYOa2GUeZqRUDnEB6%2FS4vNk6jC73Ax18ESGM4xV4cFciE82wUMlEv2VmVCuTMOTEd8Rg54PKoBdcvFYjcRxrHlgHxZYzdd9A%2FOZk91CfCeIWmQrIjMA1b80TFqjBvYxQD0cYE9DJvIp5O4rGSj3gvMrQLDORKUAz%2F0uyxrFQM5lhRl47JQkCJoH9DjwLSiws%2B1PMeKiNIn2hRFKIoHZJRj3ZxZiEnlf7tXkqdBFl7SFTJDThOKCTRNQnFY%2FHowNkH4sqaBnjSo3F63mhcY7P5uW6d7W3Uz9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=FDzSMRR1XVn1du%2FNsXPdw58hpu%2BA7Ga85YK4kEW%2BWPm23ZqyNrqr6suJCI6wRHsovkGZe%2BBLtXU0%0ArIG94WFIyMDJBNqeawO%2F%2BABwCmACF0j32LI56itq4vssdYdipQrEvLDDmi89RF%2ByIBXAE0T04ho1%0ALA1j1Ey%2FurxulloMTOjz12KBGgzpCUNWZnbZvzM0BoUOGVYNgjeN0DFrZKapLJc%2FGTt3KpGPVyrb%0AI0MrrySMW1Di%2BQXlJ4UrfZhAAoHILxqrDh7TN21%2FUsrtke7iZLt1dv3%2Bfai%2BukC%2FWzNZcxtw3vQS%0Am3HTzVxDWjHbbFXQS2jCPT%2FMhmeOVI3NV75PlQ%3D%3D"
|
1590
|
network 2018.06.05 17:03:16.622 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "eid-prod.connect.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1iQ6gZc1tMoEEg1fv1R3j7bZe%2B%2FYfczICI847h7uxz3405%2BP9%2BunrZjmZuh%2F%2BQr%2FDH39qeizIW%2F66pevvid%2Bo77%2B%2Bdc%2Fzcn7hYzfnWIeh34ufroX9fP330d%2F%2BbpO%2FfchmZv5e5%2B8i%2Fn7kn13GUP%2FjvwMfR%2BnYRmy4fX1J76Yl6ZPlt82qpdlnL%2BDYNHk3%2B4p%2Bc%2FZ0PdFtvx8H2VPXsu3tJheTf9zXoDsWkxVMWlDvwzPIgV%2FiHaKrGi2wi2m7VUsf56L%2Bcf5lfwXHCZyGEnTbxBFY9%2BwHMW%2FpRAGf8sSiMZgkspKtPj6k8L%2F8rVAsRJKS%2FwbjZfZNwzCoW80AmffoJSmUZzAaSRN7pn9XzB7wy9f%2F5skCbQoCuRbVuTQvYiiv6U0TH9DEgonoZJGUPKH%2BHleC6Wfl6RffvmKQDD1DSK%2BQbgH498h9DtM%2FAxRePz1p%2BAvar8V9fUPJX%2F%2FbfH09xr%2B3xWczHMx%2FVDq11%2F%2Fqsx%2FUeKfwN9s9Yfwv9rTXZJlnf%2FpJzfkxU9B8lqL%2F33jG969%2BLu7Ztmt%2Fq%2Fgr39sMn7%2FB7HfhT6bznEpcuYvJ%2F2PwP3puP3yb8L4ZEn%2BkPPjj9896naofd9%2F3tGfh6kCEQiCQQgDb2e9Z%2FzXbZf8NmGCZUlGljmKFWRGQzgMESQMo1iWJnCaE%2BnXn7xzvKH%2FH%2BUJr%2BJd9MttuL8%2F2W0Io1jqIf%2BJeVXD1Cz1%2B%2F9CVlLMMEJ9y9Lshx7z%2BbtWnEpfDn8gzOd%2FIwMCIfoHvnxuqv%2F6p5MU%2BS3kd8x0QmcYDhcFhZBUQmNlkZFFntA4klF5mcP%2FXzBMc%2FIN%2Fm%2F8HwH8BibEIfqHvf76g%2FvhsWWTJUvxq6Eo%2FMVzHDO5FbMrLFMpHGMbO29HqjbESr1lJmMLOmszexUPB3cxKluZActEHtM5omFTP%2BbygW0rX4Q95uJQnZMndvAXY%2F4%2BMfPYTn1l72NMW8E3WEViYF%2FgakN3A0d4Nuzf1vCM9vua2fvCQIFktkJjcMxvC5h9j31IND2RfiVPe8lkdYs5vE0RfI2fJhRCwcO%2BhNpgKYlzP5KrpChvCyrjRO6X%2BPnqbOkFxfKwRO%2FgTKXXqr%2Bdl8FiIe8JqOEJu3kJsHEpuyEO95jyz2N%2Fhf%2Fl3%2BH%2FT%2BB%2F%2BXf4%2FxP4X%2F4d%2Fn8LX1FYpf1hqO5Td41E7xB7W1tkmAf3hbEp5nYPlqu02yUEBnmcVqokW17IbgnyDLVrDzoqHf9EME7B8wSDm0dY9XowgAlnV%2F61YK2luODRMl9kVb8igXBIJZC4zL40u7iSg%2Fdp%2B9E6%2BmAI7kzwRRSEcvJ4UyId2CazpWeOFkDrxmhYPPQzRRYNVbf%2By1qBzzT%2BWEYRLCAjKlOWFMicHt1JxlvlFnXstV7LR%2B4QsAq3Hr7dQebqRn3qOm2yTTUn4AMT5zjWDV8o1cJx78m7xzGQH%2BmFgYhqP5EccNLplLFq74VC68khKCF1kpEGJD4Cwla%2BoQWthcVbWrFHDz8rzzjFL1ihjVUeIwuAC4y6TL4l9rGARUkgkPKZ44Xf4qkfsTNF8Rh8dBgDJu9d4RmbYYdj2CX%2B9%2BslO4bwhWkZxmDmH96f8%2FttgV0ROv6frTX%2FZq0fBpos88n4wMUngzOlujy24KfW%2BoRSheCL09blByepSQKJ3qT3sfTfJeTBnYDNnMjI6%2FRRU4fMpFJwylQB6tAhIqclKnhh2hUNrmowzBUZ1oGuvmAoQNDdu2xDuacrvu%2FGviRAnFl4mxmMfPhI9SGzRTkFZL%2FhQNQ1y5r2vOvFLKBZukaDu0zlC%2FIGo%2BILvT6uXVzyR2xAKoyEZShoql37VJIDfszm79ryl%2BMACGE%2FshioD5Amck6lKtmTpLkadjciCv2BssC0fimWz9A8hxd5H2V7N%2B4JqENTGAuNZm9HpztDjjBG06D3wBq%2BVoKItbaECtuIBeWWlqI6vqolvVz4S%2BS%2BZHlJBGTkvPZffvkT%2BEco%2Ffvo%2BdfB3%2BPrjyl%2FpI4%2F0hLXjHUx%2Ff7vb3nq94Hf8vuvBU4bR3vuuWADE9kWx%2BvKe2qiLL42MSoI02OwX72%2FweJ7nVRl1jG%2BddwF3cAAC0FTteAt6OHtOdosgGqyBmcIUFVS2MIGRn7E7Kj6OjD3GZifKaSfGfgUkA51MpQwIZZ%2FiGS00j5KgcQsos9s0jMXoysB8AqeztYqQ8bklaDwS73SeFohBbDlduqeWf8yBtvTrCaG8gaj3QJ3vBccbeEoJhr58iNOAwmHsDySUUdchk7Ng8Tg8c6exrnGgle2aQaCdVHnIfkyBZEd8FC%2BerSF822aiLmpPwnvFaWFzuUphZk%2Bhh4id6dPG3Wm0w87yGlEpJchVz78GQi0F7grdtqgr2hBwvww1b%2Bo%2Bh%2BG%2FjDWPzKa227%2FzwYkvJJ9SxsQQ88rn00aQIydKE1kThZVSw3M8IbwU0%2FmNA6DtH%2FkR%2Fxok3HtuE3FxSdj7zZxrY4Fqx0CcS3pKHAz4wnxVPZN7Qb9WS3b9kbuuAfFG5MdbGcQ%2FEFOHdy2cRsKYg1gb%2BLzgjcAYdt9FNxKEtC%2Bdg4KVC7oAHr0wekflimgYeum68ia2Xmnn%2FMozx3GdEzB%2BStbhEMOxvaAQVYJiFf7WJoa4WDuakZGSsj2ZHuMRV6oPeyKs0aVkMwXfmQB7zYkzMH8vGAHHYbhIastG8U6Aqi8L3eboMsdI%2B8mYkhH3fuXfAaU0dLM8yHGZhXGCwjsgcW2%2BW5Rp0EnqeP6tJarntuPjsjoUMmnzIS8IWD96GpOP2pLXpgICBvGXHK1q%2Fcn2JfxzrOVOuEu2VMZQMNAlpqaOr%2B9QoFU3T5mu9j9DjUbpEKnNw0zxfghLS0nc7cejFXI6gKoCj4ALed8lS2MBSx1tdGorP7rqeMImz%2BXuU54mZsSO2WFxxXdfCoUGaMDcqPngkMYZ%2Bs1sp2W8ECErxyf9msbTEEBJsJsghnXcuuTCo%2F9c3i0VBIPptdhJUhX0O6VrKXfC6GIRPqi1DpKHPB8Uz76ASxeJmAS2iGRI9N46eJkJWEtjAAve3QI%2BaTYQW1ssY0c%2FuRj1xbmW00wmkQOKbNGTtIesgmcvTOcvNNlBkhz2vWAZ2%2B6imnJHjlqCOYuuZOGz8Ag%2BMBorgMw1grzC2DuQ%2BLK20cXU3PKU4PLGdfEyqT1CHz3wydOYvgk%2BhMzYaMeus7DZoUNGbtY7%2Fwyp7toKUMapTNApFUl7O7p1%2BvehCi1ENOilZMszg6REMMEH7KHc3W9YmUU8pyJ31kMcfnPFZDuvBqVeBngXe%2Fqq%2FLQ527NNss%2FiDzYDfe94LgVFMW8LvvsddfauRkyTxHFedxTWD0%2Fb%2BBZJTJiBSquht4aUPFQhmcBXthyYj8jXHqr1l2QhkJQVyUN8eagCoRdv5Qt4wymFW%2B%2FOHsx7QITKqaaBecUlAKQfAPMxxLZLWzniuVfvrdKEd9Z2aczPh9P1ABVCFVDUXNjHs0aKOCPrtBMZi1bLj28A5pz2uyNBwp5xWihvlgm45uHI42IvMXs2UObN7%2B2qQidnYeGUAiMj91FrLMCXATphyNxfTLsAt5MWssgEgMm8BGcqnlf%2FSBRRKfjXV4FJjxBepANy6avuXj2FQU%2BpjxQw5sHCaahr9ykKMM%2BQNkdplxtxHb9w9ysJlgOBvE8DonCUCUiZlwXWJ5asQg5mmlcxTtf8%2FHQxdnU%2FHz3YMQDzk1rSXmHJwfRjHRVASy7w4rW2MqL4Qbwc3S59ziujGyeTWxXJmUbs7O1Ox8Q21Ut6uDSYkR5BEHjaQEjuRJ%2BynRvV2mi8zkJAbd%2FGDcfQ%2FsP9dbvHSwGXl43n6LLZ7hwFf5Ul4pUqWAwyDKI5Gcn0YvnkfFwHSpi6znAVEbwPF1W4v2XHsoCPb73jxSD9ooNvQn1TL%2BQAV%2FB7esJ%2BIEz%2BrWFoX3aYt3FSo8oK4ZgMcS1600XNABEsZtVeM2WDTFP18yJAqY9Ng8%2FhFFOs49Xj1hAIMYLYuYmEE8Nz%2B1tIntt96xwluCSlIMJeDJH4p1P30K9Nsmj15sVs4SCneYsUNtMnZjRjXJzXj4Sa2ZZh1K7wZzQg8rGn%2FpbWD%2BYTG0jsjGrCF61wSG8QOZpqJeP9oXxp72ZtqYOSQjOs%2Bw3tTh%2B8DWhqB2zKwbpyLKmm9FiVKLIGpfV%2FWuIzSZK39IYrAFwvN9wGY7g5S8Z3Erq%2BM5lSQgetTLJ1rBmmMlGj96y38KH1ejjI1jbYiGHUKAtraAQGcAHFuunmGAE%2FQ6xZKCA2SmZ%2BClPMGYaDR4Yc8Cld0hxwk9ig5otJnodyCvbT%2BJOJ8divUA3aHef6hnM7GUU9C0LRTgWSO%2Fsp6pPc6LSE%2F489pb1WJsqccJJDo9DCYWM8hx4acSIjktDlYgmAzstBxorvYhjXWx5fdqjT66fZUcqAlzV%2BtN5w4tXUr7f%2BsbZAsV0dvpk4U1EkWeaURJgEFlW2p1q7u%2FgTVQHIlNNV5O3aPIKyXxdJzmgairWdkITzRGthQsbR88loDxeE0NIYjuaT7zNeAG4eTJVehsubVXv2KHTG5ICreuCoeAWvpBPerBU04%2FK4%2B3hAXhfzChdGercsSRI0dSPS86rrpmNlYbBepVeOcFh0CeHlDAvazj7RJFldno67UyTjmxz4SOE1It3PFrk019zCbopCHSlGLzV7O4wQaJyaLXcXPMOC7HUz4ke6RzabvJ7ewYVDKpbO53p9rrEm6A8RcDOg1MBWhYdtw7s1ZBsV8vFAxtM3w9IPT97ByoPJFoIdWCV%2Fsxd5BQdzM83frV7TSdpYXYh3LqiMqb3MmHkA2CEFWlFfV1QM3wk2xZmSwnLbvrsIQZgH6T1iHf84xeay31qFnt05GQlTlXXbDDYp4E02fxoIMlH2yySyGipn9VhyGMhUzMI6bVJ4Nl5yMV5V5UlVDJXU9YsAOT%2B2wAnHZbGR%2BTHrx2%2Br59vLZoCCAW2ikxBzIxW63tG8keb29E1x5jAokbNXFXkRGRpwWBZJMsDcxhm%2Bjh9KUAJXWHFwbYZie0cyfcj0Qk2JGTO6Qq19Kb16n3lqyDZscGWXj9oJYEP0mTVgwJhhrzZ4wRrAmoRj2Ni5KpQwbcnvQAmDTPcKB5utRFLFovvV3jFHssNepHNmzPU0bvR7XN5s28SCdiS1hyQWMtGBxz97WE5UNUpsfGXddNFldMmUSJdRjmCeJAx%2BrW2a4Dvm6U7b3qYOooQZG%2BsKAwO9WerBFMUI7dTFp0cUtUsbWOyaJidA6XBXA8KzkgqnSMDMHh8ZOsuoPJciT5UkvQGscTLGzhKqtlYyEYeMFih3ImA7mdE80icveOIP7X6ts41MC%2BzCRfqvJKTIRgZnWpZOEaPcHbl46Y5fvJiqH7sD7aghO1BjP1hLeRhrit%2FOmQd7mp0X3H1GZDknZnCrnqqqyI1ncSVXuyjOkEPpllZrLSxVcQsRzqSNwmqhVJcHyCRqUMG8CKOx1RpEK2t43kQOQFT6cc1KaN7fLZmZLUuqrS7mA%2BesPgcRQ5HzPqIHfgTkbsaPOXHghEvWuOkhhtkwbW3vY1UMQsaWFCRq0wS2DMvBKahYjwa%2BXi02%2Fbk3AVOmRRJxvPJq6tsDmxIp42oZBMITYf%2BeqlV%2Fnw77eWVYaUyucJU2uSL%2BxnnzKfXFqZJi9bDLr8OGP9qER6ez7a5W1tmshhtHUMEuyzrtenIZRcWWnplium4MznORSwNXGtZo8srA%2B6Su5aQeYm%2BVXsXi8bFBajbQw5iM0nljmXTLCWZtAtN3NeKa2PFa1jpaiCzRSKQwyk0xFHoz%2B0sF61AuZ2trT7Y1gsdzWO%2FuJuadkYxS9bNl5%2FC%2FcxguVqTrdEiAZfOY%2BMB2MIqmSjwAhp74NiQe93HKYoWHwuy8LNnEY7FGoVJB5sdyfDY%2FCEPkIggkCXDu0Y9iBcRze0z7%2F0Ohoo8LjuanSoq%2BUA6%2BAhrDHwHyGzmVhyRHy%2FoXuo7pAkTXKCr%2FwRraCzPpxE0fP2RjdCMb%2BIQfeZsgnpWSx00YjlWM8iBhs%2Fh9oDS5QxidAmYnTBNF4IJ1ZhPYL0fL8P1HUHfD4iPru5D2TndEdPF70FASoXAeuFJ3TvwjqrkMA8K2VnkvNmNb%2BggnaXO%2FXmutasEpHhy%2BEf5Cp23sBeyiZioZd3c53ItRlOXu89FZay06r6OsEQ%2BsnrelwugjAw6VJo4JwA%2FPC0tbsSiHHHSnySTsigwvvvMfZR62eBlr2nthjTNyMu0ONVoGrZ%2BKKJLQ7rIHqjdPAH%2BObVtQ7KGcPdlEKE1l0Y%2B20JanrHQusKQPB9ISXDuRbBPE3R%2F5MmxwaJSEV8OtlDc9HwK%2FjJHuHAYOX33Anyvn2yQxbPlyUvSkD1PzE4Od7DHPleMgl28aLbq606LU7WaOO0cVipYxCi%2Bi9f6co8nk0%2BA8gjSi4Ek6xpgvM%2F1CuFfuGFLetzTMePLJs4t96VzP1R%2FeZjWehA38R2QblX6yF9IEgd82STWJAbzE6NrAz3E27rNuQ53%2B%2B0Iq%2BvgGoWTdH34qCx54qLc2LVSYOJTK%2FWtD%2BUUb0PdsLUehIHqUojMheENjUH5nCTPIEHGrC0iUJEh3e5CVzIt3kXLVXH9Sa2DKrgoedGup0R8tLMjXzfBl40yk3btdv8yyXneXXFMAEp8OF%2BgqSPvNr%2FbXdb%2BGGaSELS92cURXwPK8eklzIFMToDDqri7thR6JFZbw04%2B6d4t9N2CRWn93Vr8TTSfKJ191n7zUsDcH6PwiGaADzF4%2FKAz53SaiKcK5KlXuXrmGJFnpI0qNfjN4oRi3g4GKP8IhXmIpzh8UUoU3XnEdTjAaDWzYejcMY2neAKeOvmfQ0%2Fwknkmo%2FVc6yreE8ZviVyIMQfOpycNuy7zMKDaA1GHVYicZwrbqArmdm5CBIahHHIzN%2FzPimybs5ZbJoeaBOKcfh6EEudcOyFsOoCd9KDUdDWa3u2K0HuszeIf01uckKaebLw%2B1RfNvIbnud9BiETp9uDIRyahEKa3FrOSUmair7FZFnaEN2FZg%2FBCMjNH3mqGwatHKz2XYOx1aYY88N2oank6m7p2N7jwIsYXxOfg5G3748ylJm7uw82iwyW%2BWq6pkDJoFm5Jp2DTuiKeeHjnYR0hK4f7bEvQZy6J7BHOmNLFJjgSpaRYYkdje1wnfIpGcOr3OzAJ9AWRUmm9kZfdocUCi4KBn5v4fng%2BWHzCQ1lUgk3gxBOjyBLaHS%2FCpN9GARUr3TYCeK8GhlHfG%2BXPku0ewl1PYzlOGQsr8%2ByJ%2BrPQ7WQi%2Bx1xgmTrzPJNwxLtjSoEnU4%2BjWrvmXWUKLufwIghdtRCctPXDtC1yRPSDh1K6Iky%2FU5CNzHWKiLal8lddy229ZK%2B2Q%2BmNrTpOfc%2BW3N2LlIRmb5x2ah2x7%2BLjsSqLRxmWIvqLG8TjIO8bqHsCZNTdQegy06u%2BcmiiOa%2F6TThUfVicVav1xO8%2B%2FYOe%2BfM96SnWqg2BmqDQH7c9Vjh7ZLOW%2Fjd4vUGeaMrnWnCZ4%2FMPkMCDRoTskxKwYdj2bDSH%2B7VKJDIOgaq1XgW8c6K0J8H2JCu5tBFKrjHfkrd1dt464grsQ6GSnfpAJ82y%2FAQvwUpMB77PN3vU8hcFXehwWmFAVhYieROPYLJTeLzkvHA7tpfSfTu7LiSHieU%2BxPSR4FIbcoY8bLcXNJwlxeuKHov2R6GZNtPr8tm6clVnVILJoiaUDVTS2ArsEl6cVTuBIxfWcHkid4kIvQpqhQ2Og95T6xF7GIYMtlGiY0kHCL4Ou5XcJkbFHZ1%2BRN2%2FTXGqH1vX69lQ4PA1xX9bgjEQTztke2un91xN9NvuUFtBc5BVrtr%2BI%2BUgbMVLctO79LnWeHw%2B5m4DFWvHZS5jy3Fp508ilF6jB3d4ASayLsA3l31x%2F641MiHI6CTajefBX7JWtPZBGmkPS4LtnkxOdZJUpYrQebpgDSu3WXk6%2FMy%2BQbN2DR2MlGDPRTdY%2BHcd1s9RCKSnc1pOWxkEnQE%2FSKDhxs2FeujBYHDKcDvJXGim2ZWIxQPb%2Bu%2B1t34UaGeKgiqLVWRx5a7eqTFQSRMFic6%2B%2FQGYC2koJXtkeE0SCQnStk5wg%2Fk%2Bc2oGZtntWJTvW6osExT3Hw%2FirkcphDzXmJ%2BFWw4ZkBovG4VN2w11oYOa2GUeZqRUDnEB6%2FS4vNk6jC73Ax18ESGM4xV4cFciE82wUMlEv2VmVCuTMOTEd8Rg54PKoBdcvFYjcRxrHlgHxZYzdd9A%2FOZk91CfCeIWmQrIjMA1b80TFqjBvYxQD0cYE9DJvIp5O4rGSj3gvMrQLDORKUAz%2F0uyxrFQM5lhRl47JQkCJoH9DjwLSiws%2B1PMeKiNIn2hRFKIoHZJRj3ZxZiEnlf7tXkqdBFl7SFTJDThOKCTRNQnFY%2FHowNkH4sqaBnjSo3F63mhcY7P5uW6d7W3Uz9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=FDzSMRR1XVn1du%2FNsXPdw58hpu%2BA7Ga85YK4kEW%2BWPm23ZqyNrqr6suJCI6wRHsovkGZe%2BBLtXU0%0ArIG94WFIyMDJBNqeawO%2F%2BABwCmACF0j32LI56itq4vssdYdipQrEvLDDmi89RF%2ByIBXAE0T04ho1%0ALA1j1Ey%2FurxulloMTOjz12KBGgzpCUNWZnbZvzM0BoUOGVYNgjeN0DFrZKapLJc%2FGTt3KpGPVyrb%0AI0MrrySMW1Di%2BQXlJ4UrfZhAAoHILxqrDh7TN21%2FUsrtke7iZLt1dv3%2Bfai%2BukC%2FWzNZcxtw3vQS%0Am3HTzVxDWjHbbFXQS2jCPT%2FMhmeOVI3NV75PlQ%3D%3D"))
|
1591
|
network 2018.06.05 17:03:16.622 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
1592
|
network 2018.06.05 17:03:16.739 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
|
1593
|
network 2018.06.05 17:03:16.739 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors
|
1594
|
network 2018.06.05 17:03:16.739 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-GCM-SHA384, bits=256, proto=TLSv1.2)
|
1595
|
network 2018.06.05 17:03:16.740 I (:0) : Used session protocol: "TlsV1_2"
|
1596
|
network 2018.06.05 17:03:16.740 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
|
1597
|
network 2018.06.05 17:03:16.740 I (:0) : Used peer certificate: QSslCertificate("3", "e7:08:a6:d2:a3:00:be:42", "7d4jrw+Ie/197bX/lQTapw==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.connect.verwalt-berlin.de")), QDateTime(2016-07-20 04:59:12.000 UTC Qt::TimeSpec(UTC)), QDateTime(2019-07-25 23:59:59.000 UTC Qt::TimeSpec(UTC)))
|
1598
|
network 2018.06.05 17:03:16.740 I ...dress::onSslHandshakeDone(core/states/StateCheckRefreshAddress.cpp:162) : Handshake of tls connection done!
|
1599
|
default 2018.06.05 17:03:16.740 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048
|
1600
|
default 2018.06.05 17:03:16.740 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000
|
1601
|
default 2018.06.05 17:03:16.740 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42"
|
1602
|
default 2018.06.05 17:03:16.740 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "774af1694f2280b09d0d640948b22a77ea638f1157f517923c255bd2aae56b94"
|
1603
|
default 2018.06.05 17:03:16.740 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
|
1604
|
default 2018.06.05 17:03:16.740 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" for URL origin QUrl("https://eid-prod.connect.verwalt-berlin.de:443")
|
1605
|
default 2018.06.05 17:03:16.740 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384
|
1606
|
default 2018.06.05 17:03:16.741 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224
|
1607
|
default 2018.06.05 17:03:16.837 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:212) : Status Code: 303 | redirect URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e")
|
1608
|
network 2018.06.05 17:03:16.837 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Location": "https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e"
|
1609
|
network 2018.06.05 17:03:16.837 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Cache-Control": "no-cache, no-store"
|
1610
|
network 2018.06.05 17:03:16.837 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Pragma": "no-cache"
|
1611
|
network 2018.06.05 17:03:16.837 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Content-Length": "0"
|
1612
|
network 2018.06.05 17:03:16.837 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Date": "Tue, 05 Jun 2018 15:03:16 GMT"
|
1613
|
network 2018.06.05 17:03:16.837 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Set-Cookie": "TS015f2d62=01d33437f99f830f21e1cdc71a11b77fe6b9aeedcd7b0848b7009167cacf04fac5c3cce811437943cfe8a82a6647be80f47766aece; Path=/"
|
1614
|
network 2018.06.05 17:03:16.837 UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46) : SOP-Check( "https://eid-prod.connect.verwalt-berlin.de:443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= true
|
1615
|
default 2018.06.05 17:03:16.837 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:285) : SOP-Check succeeded, abort process
|
1616
|
default 2018.06.05 17:03:16.837 ...s::fetchServerCertificate(core/states/StateCheckRefreshAddress.cpp:321) : Fetch TLS certificate for URL QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e")
|
1617
|
network 2018.06.05 17:03:16.839 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "eid-prod.connect.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e"))
|
1618
|
network 2018.06.05 17:03:16.839 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
|
1619
|
network 2018.06.05 17:03:16.957 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
|
1620
|
network 2018.06.05 17:03:16.957 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors
|
1621
|
network 2018.06.05 17:03:16.957 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-GCM-SHA384, bits=256, proto=TLSv1.2)
|
1622
|
network 2018.06.05 17:03:16.958 I (:0) : Used session protocol: "TlsV1_2"
|
1623
|
network 2018.06.05 17:03:16.958 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
|
1624
|
network 2018.06.05 17:03:16.958 I (:0) : Used peer certificate: QSslCertificate("3", "e7:08:a6:d2:a3:00:be:42", "7d4jrw+Ie/197bX/lQTapw==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.connect.verwalt-berlin.de")), QDateTime(2016-07-20 04:59:12.000 UTC Qt::TimeSpec(UTC)), QDateTime(2019-07-25 23:59:59.000 UTC Qt::TimeSpec(UTC)))
|
1625
|
network 2018.06.05 17:03:16.958 I ...FetchingServerCertificate(core/states/StateCheckRefreshAddress.cpp:340) : Handshake of tls connection done!
|
1626
|
default 2018.06.05 17:03:16.958 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048
|
1627
|
default 2018.06.05 17:03:16.958 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000
|
1628
|
default 2018.06.05 17:03:16.958 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42"
|
1629
|
default 2018.06.05 17:03:16.958 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "774af1694f2280b09d0d640948b22a77ea638f1157f517923c255bd2aae56b94"
|
1630
|
default 2018.06.05 17:03:16.958 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
|
1631
|
default 2018.06.05 17:03:16.958 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" for URL origin QUrl("https://eid-prod.connect.verwalt-berlin.de:443")
|
1632
|
default 2018.06.05 17:03:16.958 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384
|
1633
|
default 2018.06.05 17:03:16.959 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224
|
1634
|
default 2018.06.05 17:03:16.959 ...freshAddress::doneSuccess(core/states/StateCheckRefreshAddress.cpp:359) : Determined RefreshUrl: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e")
|
1635
|
statema... 2018.06.05 17:03:16.959 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateCheckRefreshAddress" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1636
|
statema... 2018.06.05 17:03:16.959 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateWriteHistory"
|
1637
|
statema... 2018.06.05 17:03:16.961 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateWriteHistory"
|
1638
|
statema... 2018.06.05 17:03:17.039 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateWriteHistory" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1639
|
statema... 2018.06.05 17:03:17.039 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateRedirectBrowser"
|
1640
|
statema... 2018.06.05 17:03:17.039 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateRedirectBrowser"
|
1641
|
activation 2018.06.05 17:03:17.039 ...sendRedirect(activation/webservice/WebserviceActivationContext.cpp:126) : Redirect URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e&ResultMajor=ok")
|
1642
|
activation 2018.06.05 17:03:17.039 ...sendRedirect(activation/webservice/WebserviceActivationContext.cpp:135) : Redirecting now to URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e&ResultMajor=ok")
|
1643
|
statema... 2018.06.05 17:03:17.039 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateRedirectBrowser" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1644
|
statema... 2018.06.05 17:03:17.039 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "FinalState"
|
1645
|
card_dr... 2018.06.05 17:03:17.042 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
|
1646
|
statema... 2018.06.05 17:03:18.396 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "FinalState"
|
1647
|
statema... 2018.06.05 17:03:18.396 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "FinalState" with status: No_Error | "Es ist kein Fehler aufgetreten."
|
1648
|
default 2018.06.05 17:03:18.417 AppController::onWorkflowFinished(core/controller/AppController.cpp:144) : governikus::AuthController done
|
1649
|
support 2018.06.05 17:03:18.424 I AppController::onWorkflowFinished(core/controller/AppController.cpp:150) : Finished workflow AUTH
|
1650
|
card_pcsc 2018.06.05 17:03:26.536 PcscReader::updateCard(card/pcsc/PcscReader.cpp:194) : old state: "(0x20022) CHANGED PRESENT" | new state: "(0x20422) CHANGED PRESENT UNPOWERED"
|
1651
|
default 2018.06.05 17:03:37.197 unknown(unknown:0) : onSelectionChange (QUrl("file:///C:/Users/Stefan/AusweisApp2.2018-06-05_15-01.log")) 1
|
1652
|
default 2018.06.05 17:03:39.401 unknown(unknown:0) : onSelectionChange (QUrl("file:///C:/Users/Stefan/Desktop/AusweisApp2.2018-06-05_15-01.log")) 1
|
1653
|
gui 2018.06.05 17:03:40.586 LogFilesDialog::saveLogFile(widget/LogFilesDialog.cpp:204) : File location: "C:/Users/Stefan/Desktop/AusweisApp2.2018-06-05_15-01.log"
|