Project

General

Profile

AusweisApp2.2018-06-05_15-01.log

Stefan Baszanowski, 06/05/2018 05:03 PM

Download (464 KB)

 
1
init       2018.06.05 15:01:43.681   printInfo(main.cpp:101)                                                    : Logging to "C:/Users/Stefan/AppData/Local/Temp/AusweisApp2.Hp4444.log"
2
init       2018.06.05 15:01:43.684 I printInfo(main.cpp:103)                                                    : ##################################################
3
init       2018.06.05 15:01:43.684 I printInfo(main.cpp:104)                                                    : ### ApplicationName: "AusweisApp2"
4
init       2018.06.05 15:01:43.684 I printInfo(main.cpp:105)                                                    : ### ApplicationVersion: "1.14.0"
5
init       2018.06.05 15:01:43.684 I printInfo(main.cpp:106)                                                    : ### OrganizationName: "Governikus GmbH & Co. KG"
6
init       2018.06.05 15:01:43.685 I printInfo(main.cpp:107)                                                    : ### OrganizationDomain: "governikus.com"
7
init       2018.06.05 15:01:43.685 I printInfo(main.cpp:108)                                                    : ### Build: Dec 15 2017 / 09:13:24
8
init       2018.06.05 15:01:43.685 I printInfo(main.cpp:109)                                                    : ### System: "Windows 10 (10.0)"
9
init       2018.06.05 15:01:43.685 I printInfo(main.cpp:110)                                                    : ### Kernel: "10.0.17134"
10
init       2018.06.05 15:01:43.685 I printInfo(main.cpp:111)                                                    : ### Architecture: "x86_64"
11
init       2018.06.05 15:01:43.688 I printInfo(main.cpp:116)                                                    : ### Devicename: "Bascha-Laptop"
12
init       2018.06.05 15:01:43.688 I printInfo(main.cpp:118)                                                    : ### Qt Version: 5.9.3
13
init       2018.06.05 15:01:43.883 I printInfo(main.cpp:119)                                                    : ### OpenSSL Version: "OpenSSL 1.0.2n  7 Dec 2017"
14
init       2018.06.05 15:01:43.883 I printInfo(main.cpp:120)                                                    : ##################################################
15
init       2018.06.05 15:01:43.883   printInfo(main.cpp:130)                                                    : Library path: "C:/Program Files (x86)/AusweisApp2 1.14.0"
16
language   2018.06.05 15:01:43.885   LanguageLoader::load(global/LanguageLoader.cpp:135)                        : Use path: "C:/Program Files (x86)/AusweisApp2 1.14.0/translations"
17
language   2018.06.05 15:01:43.886   LanguageLoader::load(global/LanguageLoader.cpp:141)                        : UI language: "de-DE"
18
language   2018.06.05 15:01:43.886   LanguageLoader::loadTranslationFiles(global/LanguageLoader.cpp:196)        : Try to load translation: QLocale(German, Latin, Germany)
19
language   2018.06.05 15:01:43.886   LanguageLoader::createTranslator(global/LanguageLoader.cpp:81)             : Load translation: "ausweisapp2"  |  true
20
language   2018.06.05 15:01:43.886   LanguageLoader::createTranslator(global/LanguageLoader.cpp:81)             : Load translation: "qtbase"  |  true
21
language   2018.06.05 15:01:43.887   LanguageLoader::load(global/LanguageLoader.cpp:141)                        : UI language: "en-US"
22
default    2018.06.05 15:01:43.889   ResourceLoader::init(global/ResourceLoader.cpp:56)                         : Register resource: "C:/Program Files (x86)/AusweisApp2 1.14.0/AusweisApp2.rcc" | true
23
network    2018.06.05 15:01:43.889   NetworkManager::setApplicationProxyFactory(network/NetworkManager.cpp:280) : proxy -> system
24
default    2018.06.05 15:01:43.890   Env::storeSingleton(global/Env.cpp:35)                                     : Add instance: governikus::NetworkManager
25
gui        2018.06.05 15:01:43.890   UILoader::load(core/view/UILoader.cpp:67)                                  : Try to load UI plugin: "UIPlugInWidgets"
26
gui        2018.06.05 15:01:43.890   UILoader::load(core/view/UILoader.cpp:75)                                  : Load plugin: QJsonObject({"IID":"governikus.UIPlugIn","MetaData":{"dependencies":[],"name":"UIPlugInWidgets"},"className":"UIPlugInWidgets","debug":false,"version":329987})
27
card       2018.06.05 15:01:43.890   ReaderManagerWorker::onThreadStarted(card/base/ReaderManagerWorker.cpp:48) : Thread started
28
card       2018.06.05 15:01:43.890   ReaderManagerWorker::registerPlugIns(card/base/ReaderManagerWorker.cpp:57) : Try to register plugins
29
card       2018.06.05 15:01:43.890   ReaderManagerWorker::registerPlugIns(card/base/ReaderManagerWorker.cpp:63) : Register and initialize plugin: QJsonObject({"IID":"governikus.ReaderManagerPlugIn","MetaData":{"dependencies":[],"name":"RemoteReaderManagerPlugIn"},"className":"RemoteReaderManagerPlugIn","debug":false,"version":329987})
30
card       2018.06.05 15:01:43.890   ReaderManagerWorker::registerPlugIns(card/base/ReaderManagerWorker.cpp:63) : Register and initialize plugin: QJsonObject({"IID":"governikus.ReaderManagerPlugIn","MetaData":{"dependencies":[],"name":"PcscReaderManagerPlugIn"},"className":"PcscReaderManagerPlugIn","debug":false,"version":329987})
31
card_pcsc  2018.06.05 15:01:43.893   PcscReaderManagerPlugIn::init(card/pcsc/PcscReaderManagerPlugIn.cpp:57)    : SCardEstablishContext:  "Scard_S_Success"
32
gui        2018.06.05 15:01:43.996   AppQtGui::loadStyleSheet(widget/AppQtGui.cpp:352)                          : loading style sheet ":/stylesheets/windows.qss"
33
default    2018.06.05 15:01:44.016   Env::storeSingleton(global/Env.cpp:35)                                     : Add instance: governikus::FileProvider
34
secures... 2018.06.05 15:01:44.029 I SecureStorage::load(secure_storage/SecureStorage.cpp:187)                  : SecureStorage successfully loaded
35
default    2018.06.05 15:01:44.030   Env::storeSingleton(global/Env.cpp:35)                                     : Add instance: governikus::ProviderConfiguration
36
default    2018.06.05 15:01:44.031   ProviderWidget::fill(widget/ProviderWidget.cpp:56)                         : add provider for desktop widgets.
37
card_dr... 2018.06.05 15:01:44.392   ReaderDetector::ReaderDetector(card/drivers/ReaderDetector.cpp:38)         : initNativeEvents() = true
38
default    2018.06.05 15:01:44.393   Env::storeSingleton(global/Env.cpp:51)                                     : Add owned instance: governikus::ReaderDetector
39
default    2018.06.05 15:01:44.393   Env::storeSingleton(global/Env.cpp:35)                                     : Add instance: governikus::ReaderConfiguration
40
card_dr... 2018.06.05 15:01:44.397   const(card/drivers/ReaderDetector.cpp:59)                                  : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
41
card_pcsc  2018.06.05 15:01:44.397   PcscReaderFeature::PcscReaderFeature(card/pcsc/PcscReaderFeature.cpp:22)   : features: null
42
card_pcsc  2018.06.05 15:01:44.397   ...ty::PcscReaderPaceCapability(card/pcsc/PcscReaderPaceCapability.cpp:22) : capabilities: null
43
card_pcsc  2018.06.05 15:01:44.397   PcscReader::PcscReader(card/pcsc/PcscReader.cpp:23)                        : "Alcor Micro USB Smart Card Reader 0"
44
card_pcsc  2018.06.05 15:01:44.399   PcscReader::PcscReader(card/pcsc/PcscReader.cpp:27)                        : SCardEstablishContext:  "Scard_S_Success"
45
card_pcsc  2018.06.05 15:01:44.399   ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:251) : "SCardConnect(cd010001, Alcor Micro USB Smart Card Reader 0, 3, 0, 0, 0)"
46
card_pcsc  2018.06.05 15:01:44.399   ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:253) : SCardConnect for  "Alcor Micro USB Smart Card Reader 0" :  "Scard_S_Success"
47
card_pcsc  2018.06.05 15:01:44.401   ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:273) : SCardControl for  "Alcor Micro USB Smart Card Reader 0" :  "UNKNOWN_STATE (00000001)"
48
card_pcsc  2018.06.05 15:01:44.401   ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:292) : FEATURES: ""
49
card_pcsc  2018.06.05 15:01:44.401   ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:294) : FEATURES: ()
50
card_pcsc  2018.06.05 15:01:44.401   ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:337) : SCardDisconnect for  "Alcor Micro USB Smart Card Reader 0" :  "Scard_S_Success"
51
card_pcsc  2018.06.05 15:01:44.402   PcscReader::updateCard(card/pcsc/PcscReader.cpp:194)                       : old state: "(0x0) UNAWARE" | new state: "(0x50012) CHANGED EMPTY"
52
card_pcsc  2018.06.05 15:01:44.402   ...ManagerPlugIn::updateReaders(card/pcsc/PcscReaderManagerPlugIn.cpp:183) : fireReaderAdded  "Alcor Micro USB Smart Card Reader 0"
53
card_dr... 2018.06.05 15:01:44.406   const(card/drivers/ReaderDetector.cpp:59)                                  : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
54
card_pcsc  2018.06.05 15:01:44.406   PcscReaderFeature::PcscReaderFeature(card/pcsc/PcscReaderFeature.cpp:22)   : features: null
55
card_pcsc  2018.06.05 15:01:44.406   ...ty::PcscReaderPaceCapability(card/pcsc/PcscReaderPaceCapability.cpp:22) : capabilities: null
56
card_pcsc  2018.06.05 15:01:44.406   PcscReader::PcscReader(card/pcsc/PcscReader.cpp:23)                        : "REINER SCT cyberJack RFID basis 0"
57
card_pcsc  2018.06.05 15:01:44.407   PcscReader::PcscReader(card/pcsc/PcscReader.cpp:27)                        : SCardEstablishContext:  "Scard_S_Success"
58
card_pcsc  2018.06.05 15:01:44.407   ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:251) : "SCardConnect(cd010002, REINER SCT cyberJack RFID basis 0, 3, 0, 0, 0)"
59
card_pcsc  2018.06.05 15:01:44.408   ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:253) : SCardConnect for  "REINER SCT cyberJack RFID basis 0" :  "Scard_S_Success"
60
card_pcsc  2018.06.05 15:01:44.409   ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:273) : SCardControl for  "REINER SCT cyberJack RFID basis 0" :  "UNKNOWN_STATE (00000032)"
61
card_pcsc  2018.06.05 15:01:44.409   ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:292) : FEATURES: ""
62
card_pcsc  2018.06.05 15:01:44.409   ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:294) : FEATURES: ()
63
card_pcsc  2018.06.05 15:01:44.412   ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:337) : SCardDisconnect for  "REINER SCT cyberJack RFID basis 0" :  "Scard_S_Success"
64
card_pcsc  2018.06.05 15:01:44.412   PcscReader::updateCard(card/pcsc/PcscReader.cpp:194)                       : old state: "(0x0) UNAWARE" | new state: "(0x20022) CHANGED PRESENT"
65
card_pcsc  2018.06.05 15:01:44.413   PcscCard::PcscCard(card/pcsc/PcscCard.cpp:59)                              : SCardEstablishContext for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
66
card_pcsc  2018.06.05 15:01:44.415   PcscCard::connect(card/pcsc/PcscCard.cpp:111)                              : SCardConnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" | cardHandle: 3926065152 | protocol: "SCARD_PROTOCOL_T1"
67
card_pcsc  2018.06.05 15:01:44.416   PcscCard::connect(card/pcsc/PcscCard.cpp:118)                              : SCardBeginTransaction for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
68
card_pcsc  2018.06.05 15:01:44.416   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "00a4000c023f00"
69
card_pcsc  2018.06.05 15:01:44.448   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
70
card_pcsc  2018.06.05 15:01:44.448   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "9000"
71
card_pcsc  2018.06.05 15:01:44.448   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "00a4020c022f00"
72
card_pcsc  2018.06.05 15:01:44.456   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
73
card_pcsc  2018.06.05 15:01:44.456   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "9000"
74
card_pcsc  2018.06.05 15:01:44.456   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "00b000005a"
75
card_pcsc  2018.06.05 15:01:44.467   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
76
card_pcsc  2018.06.05 15:01:44.468   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "61324f0fe828bd080fa000000167455349474e500f434941207a752044462e655369676e5100730c4f0aa000000167455349474e61094f07a0000002471001610b4f09e80704007f00070302610c4f0aa000000167455349474e9000"
77
card_pcsc  2018.06.05 15:01:44.468   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "00a4020c02011c"
78
card_pcsc  2018.06.05 15:01:44.477   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
79
card_pcsc  2018.06.05 15:01:44.477   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "9000"
80
card_pcsc  2018.06.05 15:01:44.477   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "00b00000ff"
81
card_pcsc  2018.06.05 15:01:44.495   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
82
card_pcsc  2018.06.05 15:01:44.495   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "3181c1300d060804007f00070202020201023012060a04007f000702020302020201020201483012060a04007f0007020204020202010202010d301c060904007f000702020302300c060704007f0007010202010d020148302a060804007f0007020206161e687474703a2f2f6273692e62756e642e64652f6369662f6e70612e786d6c303e060804007f000702020831323012060a04007f00070202030202020102020149301c060904007f000702020302300c060704007f0007010202010d02014900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000"
83
card_pcsc  2018.06.05 15:01:44.495   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "00b000ffff"
84
card_pcsc  2018.06.05 15:01:44.513   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
85
card_pcsc  2018.06.05 15:01:44.513   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000"
86
card_pcsc  2018.06.05 15:01:44.513   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "00b001feff"
87
card_pcsc  2018.06.05 15:01:44.531   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
88
card_pcsc  2018.06.05 15:01:44.531   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000"
89
card_pcsc  2018.06.05 15:01:44.531   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "00b002fdff"
90
card_pcsc  2018.06.05 15:01:44.549   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
91
card_pcsc  2018.06.05 15:01:44.549   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000"
92
card_pcsc  2018.06.05 15:01:44.549   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "00b003fcff"
93
card_pcsc  2018.06.05 15:01:44.557   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
94
card_pcsc  2018.06.05 15:01:44.557   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "000000006282"
95
card       2018.06.05 15:01:44.557   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73)                 : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.2"
96
card       2018.06.05 15:01:44.557   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:67)                 : Parsed ChipAuthenticationInfo
97
card       2018.06.05 15:01:44.557   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:61)                 : Parsed PACEInfo
98
card       2018.06.05 15:01:44.557   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73)                 : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.3.2"
99
card       2018.06.05 15:01:44.557   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73)                 : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.6"
100
card       2018.06.05 15:01:44.557   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73)                 : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.8"
101
card_pcsc  2018.06.05 15:01:44.557   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "00a4020c02011c"
102
card_pcsc  2018.06.05 15:01:44.565   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
103
card_pcsc  2018.06.05 15:01:44.565   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "9000"
104
card_pcsc  2018.06.05 15:01:44.565   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0022c1a412800a04007f0007020204020283010384010d"
105
card_pcsc  2018.06.05 15:01:44.593   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
106
card_pcsc  2018.06.05 15:01:44.593   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "9000"
107
card       2018.06.05 15:01:44.593   Reader::getRetryCounter(card/base/Reader.cpp:151)                          : StatusCode:  SUCCESS
108
support    2018.06.05 15:01:44.593 I Reader::updateRetryCounter(card/base/Reader.cpp:103)                       : retrieved retry counter: 3 , was: -1 , PIN deactivated: false
109
card_pcsc  2018.06.05 15:01:44.593   PcscReader::updateCard(card/pcsc/PcscReader.cpp:212)                       : Card detected: {Type: EID_CARD, Retry counter: 3, Pin deactivated: false}
110
support    2018.06.05 15:01:44.593 I Reader::fireUpdateSignal(card/base/Reader.cpp:167)                         : Card inserted: {Type: EID_CARD, Retry counter: 3, Pin deactivated: false}
111
card_pcsc  2018.06.05 15:01:44.593   ...ManagerPlugIn::updateReaders(card/pcsc/PcscReaderManagerPlugIn.cpp:183) : fireReaderAdded  "REINER SCT cyberJack RFID basis 0"
112
card_pcsc  2018.06.05 15:01:44.593   PcscCard::disconnect(card/pcsc/PcscCard.cpp:143)                           : SCardEndTransaction for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
113
card_pcsc  2018.06.05 15:01:44.657   PcscCard::disconnect(card/pcsc/PcscCard.cpp:148)                           : SCardDisconnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
114
default    2018.06.05 15:01:44.997   Env::storeSingleton(global/Env.cpp:35)                                     : Add instance: governikus::ReaderManager
115
default    2018.06.05 15:01:44.997   Env::storeSingleton(global/Env.cpp:35)                                     : Add instance: governikus::AppSettings
116
card_dr... 2018.06.05 15:01:45.000   const(card/drivers/ReaderDetector.cpp:59)                                  : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
117
default    2018.06.05 15:01:45.244 W unknown(unknown:0)                                                         : QMainWindowLayout::count: ?
118
default    2018.06.05 15:01:45.262   Env::storeSingleton(global/Env.cpp:35)                                     : Add instance: governikus::Service
119
default    2018.06.05 15:01:45.262   AppController::onUiPlugin(core/controller/AppController.cpp:368)           : Register UI: governikus::UIPlugInWidgets
120
activation 2018.06.05 15:01:45.262   ActivationHandler::getInstances(activation/base/ActivationHandler.cpp:55)  : Try to register plugin
121
activation 2018.06.05 15:01:45.263   ActivationHandler::getInstances(activation/base/ActivationHandler.cpp:61)  : Load plugin: QJsonObject({"IID":"governikus.ActivationHandler","MetaData":{"dependencies":[],"name":"WebserviceActivationHandler"},"className":"WebserviceActivationHandler","debug":false,"version":329987})
122
activation 2018.06.05 15:01:45.263   ActivationHandler::getInstances(activation/base/ActivationHandler.cpp:61)  : Load plugin: QJsonObject({"IID":"governikus.ActivationHandler","MetaData":{"dependencies":[],"name":"InternalActivationHandler"},"className":"InternalActivationHandler","debug":false,"version":329987})
123
network    2018.06.05 15:01:45.263   HttpServer::HttpServer(network/HttpServer.cpp:23)                          : Listening on port: 24727
124
default    2018.06.05 15:01:45.263   AppController::start(core/controller/AppController.cpp:135)                : Successfully started activation handler: governikus::WebserviceActivationHandler(0x5c93230)
125
default    2018.06.05 15:01:45.263   AppController::start(core/controller/AppController.cpp:135)                : Successfully started activation handler: governikus::InternalActivationHandler(0x5c3deb0)
126
card_dr... 2018.06.05 15:01:45.271   const(card/drivers/ReaderDetector.cpp:59)                                  : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
127
card_dr... 2018.06.05 15:01:45.279   const(card/drivers/ReaderDetector.cpp:59)                                  : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
128
filepro... 2018.06.05 15:01:46.791   UpdatableFile::update(file_provider/UpdatableFile.cpp:304)                 : Update Triggered for Name: "supported-readers.json"  with URL: QUrl("https://appl.governikus-asp.de/ausweisapp2/updatable-files/supported-readers.json")
129
default    2018.06.05 15:01:46.791   Env::storeSingleton(global/Env.cpp:35)                                     : Add instance: governikus::Downloader
130
filepro... 2018.06.05 15:01:46.792   Downloader::downloadIfNew(file_provider/Downloader.cpp:208)                : Download: QUrl("https://appl.governikus-asp.de/ausweisapp2/updatable-files/supported-readers.json")
131
network    2018.06.05 15:01:46.792   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "appl.governikus-asp.de", localPort: -1, url: QUrl("https://appl.governikus-asp.de/ausweisapp2/updatable-files/supported-readers.json"))
132
network    2018.06.05 15:01:46.799   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
133
filepro... 2018.06.05 15:01:46.800   UpdatableFile::update(file_provider/UpdatableFile.cpp:304)                 : Update Triggered for Name: "supported-providers.json"  with URL: QUrl("https://appl.governikus-asp.de/ausweisapp2/updatable-files/supported-providers.json")
134
filepro... 2018.06.05 15:01:46.800   Downloader::downloadIfNew(file_provider/Downloader.cpp:208)                : Download: QUrl("https://appl.governikus-asp.de/ausweisapp2/updatable-files/supported-providers.json")
135
filepro... 2018.06.05 15:01:46.800   Downloader::startDownloadIfPending(file_provider/Downloader.cpp:44)        : A download is already in progress... delaying.
136
filepro... 2018.06.05 15:01:46.800   Downloader::download(file_provider/Downloader.cpp:198)                     : Download: QUrl("https://appl.governikus-asp.de/ausweisapp2/Appcast.json")
137
filepro... 2018.06.05 15:01:46.800   Downloader::startDownloadIfPending(file_provider/Downloader.cpp:44)        : A download is already in progress... delaying.
138
network    2018.06.05 15:01:46.998   TlsChecker::getFatalErrors(network/TlsChecker.cpp:205)                     : (ignored)  "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
139
network    2018.06.05 15:01:46.998   TlsChecker::containsFatalError(network/TlsChecker.cpp:218)                 : Ignore SSL errors
140
network    2018.06.05 15:01:46.998 I (:0)                                                                       : Used session cipher QSslCipher(name=ECDHE-RSA-AES128-GCM-SHA256, bits=128, proto=TLSv1.2)
141
network    2018.06.05 15:01:46.998 I (:0)                                                                       : Used session protocol: "TlsV1_2"
142
network    2018.06.05 15:01:46.998 I (:0)                                                                       : Used ephemeral server key: QSslKey(PublicKey, EC, 256)
143
network    2018.06.05 15:01:46.998 I (:0)                                                                       : Used peer certificate: QSslCertificate("3", "d5:b6:a4:dc:1f:d8:85:4a", "OPEtmOf3NCEwD34R8sNgNQ==", ("T-Systems International GmbH"), ("Governikus GmbH & Co. KG"), QMap((1, "appl.governikus-asp.de")), QDateTime(2017-12-01 10:47:32.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-12-06 23:59:59.000 UTC Qt::TimeSpec(UTC)))
144
network    2018.06.05 15:01:46.998 I Downloader::onSslHandshakeDone(file_provider/Downloader.cpp:75)            : Handshake of tls connection done!
145
filepro... 2018.06.05 15:01:47.035   Downloader::onMetadataChanged(file_provider/Downloader.cpp:96)             : Abort request for "supported-readers.json" with status 304 - NOT_MODIFIED
146
filepro... 2018.06.05 15:01:47.036   Downloader::onNetworkReplyFinished(file_provider/Downloader.cpp:110)       : Downloader::onNetworkReplyFinished()
147
filepro... 2018.06.05 15:01:47.036 W Downloader::onNetworkReplyFinished(file_provider/Downloader.cpp:139)       : Server did not provide a valid LastModifiedHeader
148
network    2018.06.05 15:01:47.036   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "appl.governikus-asp.de", localPort: -1, url: QUrl("https://appl.governikus-asp.de/ausweisapp2/updatable-files/supported-providers.json"))
149
network    2018.06.05 15:01:47.036   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
150
filepro... 2018.06.05 15:01:47.072   Downloader::onMetadataChanged(file_provider/Downloader.cpp:96)             : Abort request for "supported-providers.json" with status 304 - NOT_MODIFIED
151
filepro... 2018.06.05 15:01:47.072   Downloader::onNetworkReplyFinished(file_provider/Downloader.cpp:110)       : Downloader::onNetworkReplyFinished()
152
filepro... 2018.06.05 15:01:47.072 W Downloader::onNetworkReplyFinished(file_provider/Downloader.cpp:139)       : Server did not provide a valid LastModifiedHeader
153
network    2018.06.05 15:01:47.072   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "appl.governikus-asp.de", localPort: -1, url: QUrl("https://appl.governikus-asp.de/ausweisapp2/Appcast.json"))
154
network    2018.06.05 15:01:47.072   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
155
filepro... 2018.06.05 15:01:47.107   Downloader::onMetadataChanged(file_provider/Downloader.cpp:100)            : Continue request for "Appcast.json" with status 200 - OK
156
filepro... 2018.06.05 15:01:47.107   Downloader::onNetworkReplyFinished(file_provider/Downloader.cpp:110)       : Downloader::onNetworkReplyFinished()
157
appupdate  2018.06.05 15:01:47.108   AppUpdateData::checkPlatformObject(services/AppUpdateData.cpp:208)         : Unused platform: "mac"
158
appupdate  2018.06.05 15:01:47.108   AppUpdateData::checkPlatformObject(services/AppUpdateData.cpp:212)         : Found platform: "win"
159
appupdate  2018.06.05 15:01:47.108 I AppUpdater::onUpdateDownloadFinished(services/AppUpdater.cpp:83)           : Found new version: "1.14.1" , greater than old version "1.14.0"
160
filepro... 2018.06.05 15:01:47.108   Downloader::download(file_provider/Downloader.cpp:198)                     : Download: QUrl("https://appl.governikus-asp.de/ausweisapp2/ReleaseNotes.html#1.14.1")
161
filepro... 2018.06.05 15:01:47.108   Downloader::startDownloadIfPending(file_provider/Downloader.cpp:44)        : A download is already in progress... delaying.
162
network    2018.06.05 15:01:47.108   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "appl.governikus-asp.de", localPort: -1, url: QUrl("https://appl.governikus-asp.de/ausweisapp2/ReleaseNotes.html#1.14.1"))
163
network    2018.06.05 15:01:47.108   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
164
filepro... 2018.06.05 15:01:47.146   Downloader::onMetadataChanged(file_provider/Downloader.cpp:100)            : Continue request for "ReleaseNotes.html" with status 200 - OK
165
filepro... 2018.06.05 15:01:47.146   Downloader::onNetworkReplyFinished(file_provider/Downloader.cpp:110)       : Downloader::onNetworkReplyFinished()
166
appupdate  2018.06.05 15:01:47.146   AppUpdater::onUpdateDownloadFinished(services/AppUpdater.cpp:102)          : Release notes downloaded successfully
167
filepro... 2018.06.05 15:01:47.203   Downloader::startDownloadIfPending(file_provider/Downloader.cpp:51)        : No pending requests to be started.
168
network    2018.06.05 15:01:53.704   HttpRequest::insertHeader(network/HttpRequest.cpp:196)                     : Header | "Host": "127.0.0.1:24727"
169
network    2018.06.05 15:01:53.704   HttpRequest::insertHeader(network/HttpRequest.cpp:196)                     : Header | "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0"
170
network    2018.06.05 15:01:53.704   HttpRequest::insertHeader(network/HttpRequest.cpp:196)                     : Header | "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8"
171
network    2018.06.05 15:01:53.704   HttpRequest::insertHeader(network/HttpRequest.cpp:196)                     : Header | "Accept-Language": "de,en-US;q=0.7,en;q=0.3"
172
network    2018.06.05 15:01:53.704   HttpRequest::insertHeader(network/HttpRequest.cpp:196)                     : Header | "Accept-Encoding": "gzip, deflate"
173
network    2018.06.05 15:01:53.704   HttpRequest::insertHeader(network/HttpRequest.cpp:196)                     : Header | "Connection": "keep-alive"
174
network    2018.06.05 15:01:53.704   HttpRequest::insertHeader(network/HttpRequest.cpp:196)                     : Header | "Upgrade-Insecure-Requests": "1"
175
network    2018.06.05 15:01:53.705   HttpRequest::onHeadersComplete(network/HttpRequest.cpp:153)                : "GET"  | QUrl("/eID-Client?tcTokenURL=https%3A%2F%2Feid-prod.connect.verwalt-berlin.de%2FBuergerKontoWeb%2FSAMLRequestServlet%3FsessionId%3D07b1c398-cc77-4b92-902a-eddfb96eb62f")
176
network    2018.06.05 15:01:53.705   HttpRequest::onHeadersComplete(network/HttpRequest.cpp:154)                : Header completed
177
network    2018.06.05 15:01:53.705   HttpRequest::onMessageComplete(network/HttpRequest.cpp:144)                : Message completed
178
activation 2018.06.05 15:01:53.705   ...onNewRequest(activation/webservice/WebserviceActivationHandler.cpp:101) : Request type: authentication
179
default    2018.06.05 15:01:53.705   ...troller::onAuthenticationRequest(core/controller/AppController.cpp:258) : authentication requested
180
card       2018.06.05 15:01:53.705 W ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:42) : No valid chains could be built
181
card       2018.06.05 15:01:53.705 W ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:42) : No valid chains could be built
182
support    2018.06.05 15:01:53.705 I EnumAction::Action](core/controller/AppController.cpp:399)                 : Starting new workflow AUTH
183
default    2018.06.05 15:01:53.706   EnumAction::Action](core/controller/AppController.cpp:405)                 : Start governikus::AuthController
184
statema... 2018.06.05 15:01:53.787   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateProcessing"
185
statema... 2018.06.05 15:01:53.787   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateProcessing"
186
statema... 2018.06.05 15:01:53.787   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateProcessing" with status: No_Error | "Es ist kein Fehler aufgetreten."
187
statema... 2018.06.05 15:01:53.787   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateParseTcTokenUrl"
188
statema... 2018.06.05 15:01:53.787   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateParseTcTokenUrl"
189
statema... 2018.06.05 15:01:53.787   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateParseTcTokenUrl" with status: No_Error | "Es ist kein Fehler aufgetreten."
190
statema... 2018.06.05 15:01:53.787   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateGetTcToken"
191
statema... 2018.06.05 15:01:53.787   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateGetTcToken"
192
default    2018.06.05 15:01:53.787   StateGetTcToken::run(core/states/StateGetTcToken.cpp:42)                   : Got TC Token URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLRequestServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f")
193
network    2018.06.05 15:01:53.788   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "eid-prod.connect.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLRequestServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f"))
194
network    2018.06.05 15:01:53.788   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
195
network    2018.06.05 15:01:53.938   TlsChecker::getFatalErrors(network/TlsChecker.cpp:205)                     : (ignored)  "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
196
network    2018.06.05 15:01:53.938   TlsChecker::containsFatalError(network/TlsChecker.cpp:218)                 : Ignore SSL errors
197
network    2018.06.05 15:01:53.938 I (:0)                                                                       : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-GCM-SHA384, bits=256, proto=TLSv1.2)
198
network    2018.06.05 15:01:53.938 I (:0)                                                                       : Used session protocol: "TlsV1_2"
199
network    2018.06.05 15:01:53.938 I (:0)                                                                       : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
200
network    2018.06.05 15:01:53.938 I (:0)                                                                       : Used peer certificate: QSslCertificate("3", "e7:08:a6:d2:a3:00:be:42", "7d4jrw+Ie/197bX/lQTapw==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.connect.verwalt-berlin.de")), QDateTime(2016-07-20 04:59:12.000 UTC Qt::TimeSpec(UTC)), QDateTime(2019-07-25 23:59:59.000 UTC Qt::TimeSpec(UTC)))
201
network    2018.06.05 15:01:53.938 I StateGetTcToken::onSslHandshakeDone(core/states/StateGetTcToken.cpp:110)   : Handshake of tls connection done!
202
default    2018.06.05 15:01:53.938   TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49)        : Check certificate key of type "Rsa" and key size 2048
203
default    2018.06.05 15:01:53.938   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 2000
204
default    2018.06.05 15:01:53.938   TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84)          : Check ephemeral key of type "Ec" and key size 384
205
default    2018.06.05 15:01:53.939   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 224
206
default    2018.06.05 15:01:53.939   AuthContext::addCertificateData(core/context/AuthContext.h:143)            : Adding certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" for URL origin QUrl("https://eid-prod.connect.verwalt-berlin.de:443")
207
default    2018.06.05 15:01:53.995   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:139)       : Status Code:  303  | RedirectUrl:  QUrl("https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?SAMLRequest=nZLbbtswDEB%2FxdC7bFl2fBHiBOncAcG6YUh6AfZiyDKdGnCoTJK97e%2BrdCmwYkUfqjdBpHjIw%2BX693EMZjB20FiROGQkAFS6G%2FBQkbvbz7Qg69XSyuPIT2IzuUfcwc8JrAt8Ilrx96Uik0GhpR2sQHkEK5wS%2B83XG8FDJk5GO630SIKNtWCcL%2FVJo52OYPZg5kHB3e6mIo%2FOnayIIhg66lO6UGlEUC70eL%2Fk6GgLZhww7CC6msAcwHzR6PQDtNG51A4UDDOcfxzBrS3Yc0%2FbrmJ5G6ukLKhSeU7TtuS0ZFxS6Lq%2BLTNoM96ToPY9DSjPcG%2Bg%2FIcgijRNooOeGzk5QBdJ%2BwcVCbZ1RZoWkp73fUJjJjlNC1XSNskVzXhc5ixhvGfgQ62dYIvWSXQV4SwuKMsoW9zGiWCxWCThYlH8IMF3o%2BehA%2FPND7Yi9TXzJy3yZg%2B4Raz3jRxHqKWn6GH0cc19f0WZVxmHcUmztPAICU9TEty%2FePZWyMWqeMYw%2F%2Bp836Z8cUhWH2dZRs%2BLcym%2Bulxfb9jqCQ%3D%3D&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=hr9RBbyvfdUFJyCJefbC%2FcCIE4A4fTl5RtDwuPutCmqlcBuOECnrTKCLZ%2F3zLpCt0kFtiHmjk6RHParFwC%2F36hvbYIuKcGcDasWknJIUANY8%2FlRLqadT6B2Q42TuElDsjkgrQom%2BGARlaPjJmabFKVYdNpxhWa1z3TlgU9iRxZPHX4XLAm0JSmDABdZpuZg0KUvXRr2MPlYESE3HCaHs2uf2rpIzt1svmNvfeb73im2FawiDzthAIvTM1QatjnsZ1tsdNHunm0jXY0dUY57jIjh0tetU%2BJG9Veqk%2FMCLIQDN4p8i3pprrpyaGZD3cdr22C2FXmcjVDNSN77cj2n0TA%3D%3D")
208
network    2018.06.05 15:01:53.995   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Cache-Control": "no-cache, no-store"
209
network    2018.06.05 15:01:53.995   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Pragma": "no-cache"
210
network    2018.06.05 15:01:53.995   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Location": "https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?SAMLRequest=nZLbbtswDEB%2FxdC7bFl2fBHiBOncAcG6YUh6AfZiyDKdGnCoTJK97e%2BrdCmwYkUfqjdBpHjIw%2BX693EMZjB20FiROGQkAFS6G%2FBQkbvbz7Qg69XSyuPIT2IzuUfcwc8JrAt8Ilrx96Uik0GhpR2sQHkEK5wS%2B83XG8FDJk5GO630SIKNtWCcL%2FVJo52OYPZg5kHB3e6mIo%2FOnayIIhg66lO6UGlEUC70eL%2Fk6GgLZhww7CC6msAcwHzR6PQDtNG51A4UDDOcfxzBrS3Yc0%2FbrmJ5G6ukLKhSeU7TtuS0ZFxS6Lq%2BLTNoM96ToPY9DSjPcG%2Bg%2FIcgijRNooOeGzk5QBdJ%2BwcVCbZ1RZoWkp73fUJjJjlNC1XSNskVzXhc5ixhvGfgQ62dYIvWSXQV4SwuKMsoW9zGiWCxWCThYlH8IMF3o%2BehA%2FPND7Yi9TXzJy3yZg%2B4Raz3jRxHqKWn6GH0cc19f0WZVxmHcUmztPAICU9TEty%2FePZWyMWqeMYw%2F%2Bp836Z8cUhWH2dZRs%2BLcym%2Bulxfb9jqCQ%3D%3D&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=hr9RBbyvfdUFJyCJefbC%2FcCIE4A4fTl5RtDwuPutCmqlcBuOECnrTKCLZ%2F3zLpCt0kFtiHmjk6RHParFwC%2F36hvbYIuKcGcDasWknJIUANY8%2FlRLqadT6B2Q42TuElDsjkgrQom%2BGARlaPjJmabFKVYdNpxhWa1z3TlgU9iRxZPHX4XLAm0JSmDABdZpuZg0KUvXRr2MPlYESE3HCaHs2uf2rpIzt1svmNvfeb73im2FawiDzthAIvTM1QatjnsZ1tsdNHunm0jXY0dUY57jIjh0tetU%2BJG9Veqk%2FMCLIQDN4p8i3pprrpyaGZD3cdr22C2FXmcjVDNSN77cj2n0TA%3D%3D"
211
network    2018.06.05 15:01:53.995   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Content-Type": "text/html"
212
network    2018.06.05 15:01:53.995   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Content-Length": "0"
213
network    2018.06.05 15:01:53.995   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Date": "Tue, 05 Jun 2018 13:01:53 GMT"
214
network    2018.06.05 15:01:53.995   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Set-Cookie": "TS015f2d62=01d33437f96092ea00ce1bf9d1a67ceedbea601dcce261a9ef510cb657ac22bddf92e81c9ab4b7a5a7c393d2a6ab8a1b11950e9724; Path=/"
215
network    2018.06.05 15:01:53.996   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8443, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?SAMLRequest=nZLbbtswDEB%2FxdC7bFl2fBHiBOncAcG6YUh6AfZiyDKdGnCoTJK97e%2BrdCmwYkUfqjdBpHjIw%2BX693EMZjB20FiROGQkAFS6G%2FBQkbvbz7Qg69XSyuPIT2IzuUfcwc8JrAt8Ilrx96Uik0GhpR2sQHkEK5wS%2B83XG8FDJk5GO630SIKNtWCcL%2FVJo52OYPZg5kHB3e6mIo%2FOnayIIhg66lO6UGlEUC70eL%2Fk6GgLZhww7CC6msAcwHzR6PQDtNG51A4UDDOcfxzBrS3Yc0%2FbrmJ5G6ukLKhSeU7TtuS0ZFxS6Lq%2BLTNoM96ToPY9DSjPcG%2Bg%2FIcgijRNooOeGzk5QBdJ%2BwcVCbZ1RZoWkp73fUJjJjlNC1XSNskVzXhc5ixhvGfgQ62dYIvWSXQV4SwuKMsoW9zGiWCxWCThYlH8IMF3o%2BehA%2FPND7Yi9TXzJy3yZg%2B4Raz3jRxHqKWn6GH0cc19f0WZVxmHcUmztPAICU9TEty%2FePZWyMWqeMYw%2F%2Bp836Z8cUhWH2dZRs%2BLcym%2Bulxfb9jqCQ%3D%3D&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=hr9RBbyvfdUFJyCJefbC%2FcCIE4A4fTl5RtDwuPutCmqlcBuOECnrTKCLZ%2F3zLpCt0kFtiHmjk6RHParFwC%2F36hvbYIuKcGcDasWknJIUANY8%2FlRLqadT6B2Q42TuElDsjkgrQom%2BGARlaPjJmabFKVYdNpxhWa1z3TlgU9iRxZPHX4XLAm0JSmDABdZpuZg0KUvXRr2MPlYESE3HCaHs2uf2rpIzt1svmNvfeb73im2FawiDzthAIvTM1QatjnsZ1tsdNHunm0jXY0dUY57jIjh0tetU%2BJG9Veqk%2FMCLIQDN4p8i3pprrpyaGZD3cdr22C2FXmcjVDNSN77cj2n0TA%3D%3D"))
216
network    2018.06.05 15:01:53.996   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
217
network    2018.06.05 15:01:54.245   TlsChecker::getFatalErrors(network/TlsChecker.cpp:205)                     : (ignored)  "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
218
network    2018.06.05 15:01:54.245   TlsChecker::containsFatalError(network/TlsChecker.cpp:218)                 : Ignore SSL errors
219
network    2018.06.05 15:01:54.245 I (:0)                                                                       : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-SHA384, bits=256, proto=TLSv1.2)
220
network    2018.06.05 15:01:54.245 I (:0)                                                                       : Used session protocol: "TlsV1_2"
221
network    2018.06.05 15:01:54.245 I (:0)                                                                       : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
222
network    2018.06.05 15:01:54.246 I (:0)                                                                       : Used peer certificate: QSslCertificate("3", "3c:3f:e6:1c:7c:28:28:d9", "Kfl3PTkdwoi1P7sQWG1dvQ==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.verwalt-berlin.de")), QDateTime(2017-10-16 13:01:51.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-10-21 23:59:59.000 UTC Qt::TimeSpec(UTC)))
223
network    2018.06.05 15:01:54.246 I StateGetTcToken::onSslHandshakeDone(core/states/StateGetTcToken.cpp:110)   : Handshake of tls connection done!
224
default    2018.06.05 15:01:54.246   TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49)        : Check certificate key of type "Rsa" and key size 2048
225
default    2018.06.05 15:01:54.246   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 2000
226
default    2018.06.05 15:01:54.246   TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84)          : Check ephemeral key of type "Ec" and key size 384
227
default    2018.06.05 15:01:54.246   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 224
228
default    2018.06.05 15:01:54.246   AuthContext::addCertificateData(core/context/AuthContext.h:143)            : Adding certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" for URL origin QUrl("https://eid-prod.verwalt-berlin.de:8443")
229
default    2018.06.05 15:01:54.637   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:139)       : Status Code:  303  | RedirectUrl:  QUrl("https://eid-prod.verwalt-berlin.de:8443/ecardpaos/startauthentication?RestrictedId=true&idProviderUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8443%2Fgov_autent%2Fasync&IssuingState=true&FamilyNames=true&ArtisticName=true&PlaceOfBirth=true&AcademicTitle=true&PlaceOfResidence=true&Signature=m48LCeBbrVZcAaS9%2BohPoh2ePZBB3ZwS1A%2Fy%2BU7DwIgBaGtpxx3UWCS8o12RAQUTzxDrg4NtL142%0APjvxJQCV1DTqMIR0VMLpRXmOZ8axVQUG2zf%2BQ7YxMOimpY%2BF3Y5rCZUH6A40YGWtvowZZIdlLQb3%0AwIvyLaOGLxDuUogacfElJ9FJPMxexvryMlWybWAhl5AO404drpSG36MRLvqzRMPy6a3jR%2BD2kqjm%0Av%2FgdLKSgFeyfd4TNOAE%2Bivi0h%2Fs6cplw5rUXbyEjMdMjGFdWJ8%2BCZmUSVgA8u0gDhrwEJdzGPN40%0AkhPvEQx8%2BJy5kezGYKx9zsuBB1oVl5iBqumU5Q%3D%3D&Nationality=true&DateOfBirth=true&GivenNames=true&requestID=cbd5ac4bf2b50fb720032320c0b7b59290646fa&receiverUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8445%2Fecardpaos%2Fpaosreceiver&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%2Frsa-sha256&DocumentType=true&ResidencePermitI=true")
230
network    2018.06.05 15:01:54.637   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Server": "Apache-Coyote/1.1"
231
network    2018.06.05 15:01:54.637   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Location": "https://eid-prod.verwalt-berlin.de:8443/ecardpaos/startauthentication?RestrictedId=true&idProviderUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8443%2Fgov_autent%2Fasync&IssuingState=true&FamilyNames=true&ArtisticName=true&PlaceOfBirth=true&AcademicTitle=true&PlaceOfResidence=true&Signature=m48LCeBbrVZcAaS9%2BohPoh2ePZBB3ZwS1A%2Fy%2BU7DwIgBaGtpxx3UWCS8o12RAQUTzxDrg4NtL142%0APjvxJQCV1DTqMIR0VMLpRXmOZ8axVQUG2zf%2BQ7YxMOimpY%2BF3Y5rCZUH6A40YGWtvowZZIdlLQb3%0AwIvyLaOGLxDuUogacfElJ9FJPMxexvryMlWybWAhl5AO404drpSG36MRLvqzRMPy6a3jR%2BD2kqjm%0Av%2FgdLKSgFeyfd4TNOAE%2Bivi0h%2Fs6cplw5rUXbyEjMdMjGFdWJ8%2BCZmUSVgA8u0gDhrwEJdzGPN40%0AkhPvEQx8%2BJy5kezGYKx9zsuBB1oVl5iBqumU5Q%3D%3D&Nationality=true&DateOfBirth=true&GivenNames=true&requestID=cbd5ac4bf2b50fb720032320c0b7b59290646fa&receiverUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8445%2Fecardpaos%2Fpaosreceiver&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%2Frsa-sha256&DocumentType=true&ResidencePermitI=true"
232
network    2018.06.05 15:01:54.637   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Cache-Control": "no-cache, no-store"
233
network    2018.06.05 15:01:54.637   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Pragma": "no-cache"
234
network    2018.06.05 15:01:54.637   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Content-Length": "0"
235
network    2018.06.05 15:01:54.637   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Date": "Tue, 05 Jun 2018 13:01:54 GMT"
236
network    2018.06.05 15:01:54.637   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8443, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8443/ecardpaos/startauthentication?RestrictedId=true&idProviderUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8443%2Fgov_autent%2Fasync&IssuingState=true&FamilyNames=true&ArtisticName=true&PlaceOfBirth=true&AcademicTitle=true&PlaceOfResidence=true&Signature=m48LCeBbrVZcAaS9%2BohPoh2ePZBB3ZwS1A%2Fy%2BU7DwIgBaGtpxx3UWCS8o12RAQUTzxDrg4NtL142%0APjvxJQCV1DTqMIR0VMLpRXmOZ8axVQUG2zf%2BQ7YxMOimpY%2BF3Y5rCZUH6A40YGWtvowZZIdlLQb3%0AwIvyLaOGLxDuUogacfElJ9FJPMxexvryMlWybWAhl5AO404drpSG36MRLvqzRMPy6a3jR%2BD2kqjm%0Av%2FgdLKSgFeyfd4TNOAE%2Bivi0h%2Fs6cplw5rUXbyEjMdMjGFdWJ8%2BCZmUSVgA8u0gDhrwEJdzGPN40%0AkhPvEQx8%2BJy5kezGYKx9zsuBB1oVl5iBqumU5Q%3D%3D&Nationality=true&DateOfBirth=true&GivenNames=true&requestID=cbd5ac4bf2b50fb720032320c0b7b59290646fa&receiverUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8445%2Fecardpaos%2Fpaosreceiver&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%2Frsa-sha256&DocumentType=true&ResidencePermitI=true"))
237
network    2018.06.05 15:01:54.638   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
238
default    2018.06.05 15:01:54.684   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:139)       : Status Code:  200  | RedirectUrl:  QUrl("")
239
network    2018.06.05 15:01:54.684   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Server": "Apache-Coyote/1.1"
240
network    2018.06.05 15:01:54.684   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Content-Length": "638"
241
network    2018.06.05 15:01:54.685   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Date": "Tue, 05 Jun 2018 13:01:54 GMT"
242
default    2018.06.05 15:01:54.685   TcToken::parse(core/TcToken.cpp:39)                                        : Parsing TcToken:
243
default    2018.06.05 15:01:54.685   TcToken::parse(core/TcToken.cpp:40)                                        : "<TCTokenType>\n<ServerAddress>https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver</ServerAddress>\n<SessionIdentifier>cbd5ac4bf2b50fb720032320c0b7b59290646fa</SessionIdentifier>\n<RefreshAddress>https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=cbd5ac4bf2b50fb720032320c0b7b59290646fa</RefreshAddress>\n<Binding>urn:liberty:paos:2006-08</Binding>\n<PathSecurity-Protocol>urn:ietf:rfc:4279</PathSecurity-Protocol>\n<PathSecurity-Parameter>\n<PSK>621A9ED4FF15BCACF7A9834DC2F4875247FB52797CFC65B7D00E8ED0FA38339BF2DA9DC1D4982EAEA47117F2A87EEE26323F44366ED7B8629B49A83AE6D7923E</PSK>\n</PathSecurity-Parameter>\n</TCTokenType>\n"
244
statema... 2018.06.05 15:01:54.687   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateGetTcToken" with status: No_Error | "Es ist kein Fehler aufgetreten."
245
statema... 2018.06.05 15:01:54.687   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateStartPaos"
246
statema... 2018.06.05 15:01:54.687   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateStartPaos"
247
statema... 2018.06.05 15:01:54.687   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateStartPaos" with status: No_Error | "Es ist kein Fehler aufgetreten."
248
statema... 2018.06.05 15:01:54.687   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateSendStartPaos"
249
statema... 2018.06.05 15:01:54.687   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateSendStartPaos"
250
network    2018.06.05 15:01:54.687   StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213)  : Try to send raw data:
251
 "<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n  <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n   <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n   <paos:EndpointReference>\n    <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n    <paos:MetaData>\n     <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n    </paos:MetaData>\n   </paos:EndpointReference>\n  </paos:PAOS>\n  <wsa:ReplyTo>\n   <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n  </wsa:ReplyTo>\n  <wsa:MessageID>urn:uuid:39240635-52aa-47bd-a017-440756bbd1e2</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n  <StartPAOS xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n   <SessionIdentifier>cbd5ac4bf2b50fb720032320c0b7b59290646fa</SessionIdentifier>\n   <ConnectionHandle xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"ConnectionHandleType\">\n    <CardApplication>e80704007f00070302</CardApplication>\n    <SlotHandle>00</SlotHandle>\n   </ConnectionHandle>\n   <UserAgent>\n    <Name>AusweisApp2</Name>\n    <VersionMajor>1</VersionMajor>\n    <VersionMinor>14</VersionMinor>\n    <VersionSubminor>0</VersionSubminor>\n   </UserAgent>\n   <SupportedAPIVersions>\n    <Major>1</Major>\n    <Minor>1</Minor>\n    <Subminor>5</Subminor>\n   </SupportedAPIVersions>\n  </StartPAOS>\n </soap:Body>\n</soap:Envelope>\n"
252
network    2018.06.05 15:01:54.689   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
253
network    2018.06.05 15:01:54.689   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
254
network    2018.06.05 15:01:54.798   ...dKeyAuthenticationRequired(core/states/StateGenericSendReceive.cpp:141) : pre-shared key authentication requested: "Hint"
255
network    2018.06.05 15:01:54.852   TlsChecker::getFatalErrors(network/TlsChecker.cpp:205)                     : (ignored)  "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
256
network    2018.06.05 15:01:54.852   TlsChecker::containsFatalError(network/TlsChecker.cpp:218)                 : Ignore SSL errors
257
network    2018.06.05 15:01:54.852 I (:0)                                                                       : Used session cipher QSslCipher(name=RSA-PSK-AES256-CBC-SHA, bits=256, proto=SSLv3)
258
network    2018.06.05 15:01:54.852 I (:0)                                                                       : Used session protocol: "TlsV1_2"
259
network    2018.06.05 15:01:54.852 I (:0)                                                                       : Used ephemeral server key:
260
network    2018.06.05 15:01:54.853 I (:0)                                                                       : Used peer certificate: QSslCertificate("3", "3c:3f:e6:1c:7c:28:28:d9", "Kfl3PTkdwoi1P7sQWG1dvQ==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.verwalt-berlin.de")), QDateTime(2017-10-16 13:01:51.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-10-21 23:59:59.000 UTC Qt::TimeSpec(UTC)))
261
network    2018.06.05 15:01:54.853 I ...eceive::onSslHandshakeDone(core/states/StateGenericSendReceive.cpp:115) : Handshake of tls connection done!
262
default    2018.06.05 15:01:54.853   TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49)        : Check certificate key of type "Rsa" and key size 2048
263
default    2018.06.05 15:01:54.853   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 2000
264
default    2018.06.05 15:01:54.853   AuthContext::addCertificateData(core/context/AuthContext.h:143)            : Adding certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" for URL origin QUrl("https://eid-prod.verwalt-berlin.de:8445")
265
network    2018.06.05 15:01:54.894   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
266
network    2018.06.05 15:01:54.895   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
267
network    2018.06.05 15:01:54.895   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
268
network    2018.06.05 15:01:54.895   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
269
network    2018.06.05 15:01:54.895   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:01:54 GMT"
270
network    2018.06.05 15:01:54.895   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
271
 "<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n   <soap:Header>\n      <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id976\" refToMessageID=\"cbd5ac4bf2b50fb720032320c0b7b59290646fa\"/>\n   </soap:Header>\n   <soap:Body>\n   <InitializeFramework xmlns=\"http://www.bsi.bund.de/ecard/api/1.1\"/>\n</soap:Body>\n</soap:Envelope>\n"
272
network    2018.06.05 15:01:54.895   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: INITIALIZE_FRAMEWORK
273
statema... 2018.06.05 15:01:54.896   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateSendStartPaos" with status: No_Error | "Es ist kein Fehler aufgetreten."
274
statema... 2018.06.05 15:01:54.896   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateInitializeFramework"
275
statema... 2018.06.05 15:01:54.896   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateInitializeFramework"
276
statema... 2018.06.05 15:01:54.896   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateInitializeFramework" with status: No_Error | "Es ist kein Fehler aufgetreten."
277
statema... 2018.06.05 15:01:54.896   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateSendInitializeFrameworkResponse"
278
statema... 2018.06.05 15:01:54.896   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateSendInitializeFrameworkResponse"
279
network    2018.06.05 15:01:54.896   StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213)  : Try to send raw data:
280
 "<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n  <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n   <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n   <paos:EndpointReference>\n    <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n    <paos:MetaData>\n     <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n    </paos:MetaData>\n   </paos:EndpointReference>\n  </paos:PAOS>\n  <wsa:ReplyTo>\n   <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n  </wsa:ReplyTo>\n  <wsa:MessageID>urn:uuid:9cd94743-9512-4f37-9093-4892a28f1fa6</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n  <InitializeFrameworkResponse xmlns=\"http://www.bsi.bund.de/ecard/api/1.1\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n   <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n    <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n   </Result>\n   <Version>\n    <Major>1</Major>\n    <Minor>1</Minor>\n    <SubMinor>5</SubMinor>\n   </Version>\n  </InitializeFrameworkResponse>\n </soap:Body>\n</soap:Envelope>\n"
281
network    2018.06.05 15:01:54.896   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
282
network    2018.06.05 15:01:54.896   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
283
network    2018.06.05 15:01:54.938   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
284
network    2018.06.05 15:01:54.939   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
285
network    2018.06.05 15:01:54.939   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
286
network    2018.06.05 15:01:54.939   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
287
network    2018.06.05 15:01:54.939   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:01:54 GMT"
288
network    2018.06.05 15:01:54.939   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
289
 "<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n   <soap:Header>\n      <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id977\" refToMessageID=\"cbd5ac4bf2b50fb720032320c0b7b59290646fa\"/>\n   </soap:Header>\n   <soap:Body>\n   <DIDList xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<ConnectionHandle xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"ConnectionHandle\">\n<CardApplication>E80704007F00070302</CardApplication>\n<SlotHandle>00</SlotHandle>\n</ConnectionHandle>\n</DIDList>\n</soap:Body>\n</soap:Envelope>\n"
290
network    2018.06.05 15:01:54.939   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DID_LIST
291
statema... 2018.06.05 15:01:54.939   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateSendInitializeFrameworkResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
292
statema... 2018.06.05 15:01:54.939   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateDidList"
293
statema... 2018.06.05 15:01:54.939   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateDidList"
294
statema... 2018.06.05 15:01:54.939   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateDidList" with status: No_Error | "Es ist kein Fehler aufgetreten."
295
statema... 2018.06.05 15:01:54.940   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateSendDIDListResponse"
296
statema... 2018.06.05 15:01:54.940   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateSendDIDListResponse"
297
network    2018.06.05 15:01:54.940   StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213)  : Try to send raw data:
298
 "<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n  <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n   <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n   <paos:EndpointReference>\n    <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n    <paos:MetaData>\n     <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n    </paos:MetaData>\n   </paos:EndpointReference>\n  </paos:PAOS>\n  <wsa:ReplyTo>\n   <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n  </wsa:ReplyTo>\n  <wsa:MessageID>urn:uuid:e2ba4c83-f16b-4132-a263-3b2e429d879d</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n  <DIDListResponse xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n   <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n    <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n   </Result>\n   <DIDNameList>\n    <DIDName>PIN</DIDName>\n   </DIDNameList>\n  </DIDListResponse>\n </soap:Body>\n</soap:Envelope>\n"
299
network    2018.06.05 15:01:54.940   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
300
network    2018.06.05 15:01:54.940   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
301
network    2018.06.05 15:01:55.020   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
302
network    2018.06.05 15:01:55.020   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
303
network    2018.06.05 15:01:55.020   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
304
network    2018.06.05 15:01:55.020   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
305
network    2018.06.05 15:01:55.020   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:01:54 GMT"
306
network    2018.06.05 15:01:55.020   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
307
 "<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n   <soap:Header>\n      <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id978\" refToMessageID=\"cbd5ac4bf2b50fb720032320c0b7b59290646fa\"/>\n   </soap:Header>\n   <soap:Body>\n   <DIDAuthenticate xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<ConnectionHandle xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"ConnectionHandle\">\n<CardApplication>E80704007F00070302</CardApplication>\n<SlotHandle>00</SlotHandle>\n</ConnectionHandle>\n<DIDName>PIN</DIDName>\n<AuthenticationProtocolData Protocol=\"urn:oid:1.3.162.15480.3.0.14.2\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"EAC1InputType\">\n<Certificate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ertificate>\n<Certificate>7F2181E77F4E81A05F290100420E44454356434165494430303130347F494F060A04007F00070202020203864104623D7CEBFF7918590B4D5C53D507DCF1EE3AE9E20A5E62AFEB8DBFC958F7EFFB4CCF7952FDA2B3F6254E9DC34FE5ECD1E084D4C23658319EC5BBE5A009D1E0EC5F2010444544566549444454523130313433337F4C12060904007F0007030102025305400513FF975F25060108000501075F24060108000801055F374054483CEF8791A094D40343B753FA83689C2B56256BB8428C56DDCDAB94709CAE8107DE8649DC37F7D130D75E36936CD85DAC818D1297C348BA408DA179A20CE4</Certificate>\n<Certificate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ertificate>\n<Certificate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ertificate>\n<CertificateDescription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ertificateDescription>\n<RequiredCHAT>7F4C12060904007F0007030102025305000503FB04</RequiredCHAT>\n<OptionalCHAT>7F4C12060904007F00070301020253050000000000</OptionalCHAT>\n<AuthenticatedAuxiliaryData>67177315060904007F00070301040253083230313830363035</AuthenticatedAuxiliaryData>\n</AuthenticationProtocolData>\n</DIDAuthenticate>\n</soap:Body>\n</soap:Envelope>\n"
308
paos       2018.06.05 15:01:55.020   ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:36) : "ConnectionHandle"
309
paos       2018.06.05 15:01:55.020   ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "CardApplication"
310
paos       2018.06.05 15:01:55.020   ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "SlotHandle"
311
paos       2018.06.05 15:01:55.020   ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:36) : "DIDName"
312
paos       2018.06.05 15:01:55.021   ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:36) : "AuthenticationProtocolData"
313
paos       2018.06.05 15:01:55.021   ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate"
314
paos       2018.06.05 15:01:55.021   ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate"
315
paos       2018.06.05 15:01:55.021   ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate"
316
paos       2018.06.05 15:01:55.021   ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate"
317
paos       2018.06.05 15:01:55.021   ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "CertificateDescription"
318
paos       2018.06.05 15:01:55.021   ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "RequiredCHAT"
319
paos       2018.06.05 15:01:55.021   ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "OptionalCHAT"
320
paos       2018.06.05 15:01:55.021   ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "AuthenticatedAuxiliaryData"
321
network    2018.06.05 15:01:55.021   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DID_AUTHENTICATE_EAC1
322
statema... 2018.06.05 15:01:55.021   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateSendDIDListResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
323
statema... 2018.06.05 15:01:55.022   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateExtractCvcsFromEac1InputType"
324
statema... 2018.06.05 15:01:55.022   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateExtractCvcsFromEac1InputType"
325
card       2018.06.05 15:01:55.022   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])
326
card       2018.06.05 15:01:55.022   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"])
327
card       2018.06.05 15:01:55.022   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"])
328
card       2018.06.05 15:01:55.022   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"])
329
card       2018.06.05 15:01:55.022   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"])
330
card       2018.06.05 15:01:55.022   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"])
331
card       2018.06.05 15:01:55.022   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"])
332
card       2018.06.05 15:01:55.023   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
333
card       2018.06.05 15:01:55.023   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
334
card       2018.06.05 15:01:55.023   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
335
card       2018.06.05 15:01:55.023   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
336
card       2018.06.05 15:01:55.023   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])
337
card       2018.06.05 15:01:55.023   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"])
338
card       2018.06.05 15:01:55.023   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"])
339
card       2018.06.05 15:01:55.023   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"])
340
card       2018.06.05 15:01:55.024   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00001", chr="DETESTeID00001", valid=["2010-08-13","2013-08-13"])
341
card       2018.06.05 15:01:55.024   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00001", chr="DETESTeID00002", valid=["2010-09-21","2013-09-21"])
342
card       2018.06.05 15:01:55.024   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00002", chr="DETESTeID00004", valid=["2012-05-11","2015-05-11"])
343
card       2018.06.05 15:01:55.024   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00004", chr="DETESTeID00005", valid=["2015-05-04","2018-05-04"])
344
card       2018.06.05 15:01:55.024   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeIDCTL0401", chr="DECVCAeIDCTL0402", valid=["2016-03-01","2019-03-01"])
345
card       2018.06.05 15:01:55.024   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeIDCT00001", chr="DECVCAeIDCTL0401", valid=["2016-03-01","2019-03-01"])
346
card       2018.06.05 15:01:55.024   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeIDCT00001", chr="DECVCAeIDCT00001", valid=["2016-03-01","2019-03-01"])
347
card       2018.06.05 15:01:55.024   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
348
statema... 2018.06.05 15:01:55.024   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateExtractCvcsFromEac1InputType" with status: No_Error | "Es ist kein Fehler aufgetreten."
349
statema... 2018.06.05 15:01:55.024   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StatePreVerification"
350
statema... 2018.06.05 15:01:55.024   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StatePreVerification"
351
default    2018.06.05 15:01:55.024   StatePreVerification::run(core/states/StatePreVerification.cpp:33)         : Try to build a cvc chain for one of the known trust points
352
card       2018.06.05 15:01:55.024   const(card/base/asn1/CVCertificateChainBuilder.cpp:109)                    : Get chain for root CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"])
353
card       2018.06.05 15:01:55.024   const(card/base/asn1/CVCertificateChainBuilder.cpp:119)                    : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
354
default    2018.06.05 15:01:55.030   StatePreVerification::isValid(core/states/StatePreVerification.cpp:97)     : Check certificate chain validity on "2018-06-05T15:01:53"
355
default    2018.06.05 15:01:55.030   StatePreVerification::isValid(core/states/StatePreVerification.cpp:108)    : CVC "DE000048700233" AT | valid from/to [ "2018-06-05" , "2018-06-06" ]
356
default    2018.06.05 15:01:55.030   StatePreVerification::isValid(core/states/StatePreVerification.cpp:108)    : CVC "DEDVeIDDTR101433" DV_no_f | valid from/to [ "2018-05-17" , "2018-08-15" ]
357
default    2018.06.05 15:01:55.030   StatePreVerification::isValid(core/states/StatePreVerification.cpp:108)    : CVC "DECVCAeID00104" CVCA | valid from/to [ "2015-09-14" , "2018-09-14" ]
358
statema... 2018.06.05 15:01:55.038   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StatePreVerification" with status: No_Error | "Es ist kein Fehler aufgetreten."
359
statema... 2018.06.05 15:01:55.038   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateCertificateDescriptionCheck"
360
statema... 2018.06.05 15:01:55.038   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateCertificateDescriptionCheck"
361
network    2018.06.05 15:01:55.038   UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46)                : SOP-Check( "https://eid-prod.connect.verwalt-berlin.de:443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= true
362
statema... 2018.06.05 15:01:55.038   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateCertificateDescriptionCheck" with status: No_Error | "Es ist kein Fehler aufgetreten."
363
statema... 2018.06.05 15:01:55.038   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateCheckCertificates"
364
statema... 2018.06.05 15:01:55.038   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateCheckCertificates"
365
default    2018.06.05 15:01:55.038   TlsChecker::checkCertificate(network/TlsChecker.cpp:29)                    : Check certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42"
366
default    2018.06.05 15:01:55.038   TlsChecker::checkCertificate(network/TlsChecker.cpp:31)                    : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "774af1694f2280b09d0d640948b22a77ea638f1157f517923c255bd2aae56b94"
367
default    2018.06.05 15:01:55.038   TlsChecker::checkCertificate(network/TlsChecker.cpp:32)                    : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
368
default    2018.06.05 15:01:55.039   TlsChecker::checkCertificate(network/TlsChecker.cpp:29)                    : Check certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9"
369
default    2018.06.05 15:01:55.039   TlsChecker::checkCertificate(network/TlsChecker.cpp:31)                    : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "0546c2b01048cb77669003ab0743255f94582f010baa85308133f514e218ff3c"
370
default    2018.06.05 15:01:55.039   TlsChecker::checkCertificate(network/TlsChecker.cpp:32)                    : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
371
default    2018.06.05 15:01:55.039   TlsChecker::checkCertificate(network/TlsChecker.cpp:29)                    : Check certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9"
372
default    2018.06.05 15:01:55.039   TlsChecker::checkCertificate(network/TlsChecker.cpp:31)                    : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "0546c2b01048cb77669003ab0743255f94582f010baa85308133f514e218ff3c"
373
default    2018.06.05 15:01:55.039   TlsChecker::checkCertificate(network/TlsChecker.cpp:32)                    : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
374
statema... 2018.06.05 15:01:55.039   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateCheckCertificates" with status: No_Error | "Es ist kein Fehler aufgetreten."
375
statema... 2018.06.05 15:01:55.039   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateEditAccessRights"
376
card_pcsc  2018.06.05 15:01:55.113   PcscReader::updateCard(card/pcsc/PcscReader.cpp:194)                       : old state: "(0x20022) CHANGED PRESENT" | new state: "(0x20422) CHANGED PRESENT UNPOWERED"
377
statema... 2018.06.05 15:01:56.256   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateEditAccessRights"
378
statema... 2018.06.05 15:01:56.256   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateEditAccessRights" with status: No_Error | "Es ist kein Fehler aufgetreten."
379
statema... 2018.06.05 15:01:56.256   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateSelectReader"
380
statema... 2018.06.05 15:01:56.257   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateSelectReader"
381
statema... 2018.06.05 15:01:56.257   ...SelectReader::onReaderInfoChanged(core/states/StateSelectReader.cpp:71) : Select first found reader "REINER SCT cyberJack RFID basis 0" of type PCSC
382
card       2018.06.05 15:01:56.257   ReaderManagerWorker::startScan(card/base/ReaderManagerWorker.cpp:114)      : Start scan on plugin: governikus::PcscReaderManagerPlugIn
383
card       2018.06.05 15:01:56.257   ReaderManagerWorker::startScan(card/base/ReaderManagerWorker.cpp:114)      : Start scan on plugin: governikus::RemoteReaderManagerPlugIn
384
statema... 2018.06.05 15:01:56.257   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateSelectReader" with status: No_Error | "Es ist kein Fehler aufgetreten."
385
statema... 2018.06.05 15:01:56.257   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateConnectCard"
386
statema... 2018.06.05 15:01:56.257   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateConnectCard"
387
statema... 2018.06.05 15:01:56.257   StateConnectCard::run(core/states/StateConnectCard.cpp:24)                 : StateConnectCard::run()
388
card_dr... 2018.06.05 15:01:56.260   const(card/drivers/ReaderDetector.cpp:59)                                  : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
389
statema... 2018.06.05 15:01:56.260   StateConnectCard::onCardInserted(core/states/StateConnectCard.cpp:40)      : Card has been inserted, trying to connect
390
network    2018.06.05 15:01:56.261   ...ramHandlerImpl::DatagramHandlerImpl(network/DatagramHandlerImpl.cpp:57) : Bound on port: 24727
391
card_pcsc  2018.06.05 15:01:56.265   PcscCard::connect(card/pcsc/PcscCard.cpp:111)                              : SCardConnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" | cardHandle: 3926130688 | protocol: "SCARD_PROTOCOL_T1"
392
card_pcsc  2018.06.05 15:01:56.265   PcscCard::connect(card/pcsc/PcscCard.cpp:118)                              : SCardBeginTransaction for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
393
card_dr... 2018.06.05 15:01:56.270   const(card/drivers/ReaderDetector.cpp:59)                                  : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
394
statema... 2018.06.05 15:01:56.270   StateConnectCard::onCommandDone(core/states/StateConnectCard.cpp:49)       : Card connection command completed
395
statema... 2018.06.05 15:01:56.270   StateConnectCard::onCommandDone(core/states/StateConnectCard.cpp:57)       : Card connection was successful
396
statema... 2018.06.05 15:01:56.270   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateConnectCard" with status: No_Error | "Es ist kein Fehler aufgetreten."
397
statema... 2018.06.05 15:01:56.270   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateUpdateRetryCounter"
398
statema... 2018.06.05 15:01:56.270   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateUpdateRetryCounter"
399
default    2018.06.05 15:01:56.271   StateUpdateRetryCounter::run(core/states/StateUpdateRetryCounter.cpp:22)   : StateUpdateRetryCounter::run()
400
card_pcsc  2018.06.05 15:01:56.271   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "00a4020c02011c"
401
card_pcsc  2018.06.05 15:01:56.304   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
402
card_pcsc  2018.06.05 15:01:56.304   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "9000"
403
card_pcsc  2018.06.05 15:01:56.304   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0022c1a412800a04007f0007020204020283010384010d"
404
card_pcsc  2018.06.05 15:01:56.332   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
405
card_pcsc  2018.06.05 15:01:56.332   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "9000"
406
card       2018.06.05 15:01:56.332   Reader::getRetryCounter(card/base/Reader.cpp:151)                          : StatusCode:  SUCCESS
407
support    2018.06.05 15:01:56.332 I Reader::updateRetryCounter(card/base/Reader.cpp:103)                       : retrieved retry counter: 3 , was: 3 , PIN deactivated: false
408
card       2018.06.05 15:01:56.332   BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42)         : ReturnCode of internal execute: OK
409
default    2018.06.05 15:01:56.332   ...r::onUpdateRetryCounterDone(core/states/StateUpdateRetryCounter.cpp:39) : StateUpdateRetryCounter::onUpdateRetryCounterDone()
410
statema... 2018.06.05 15:01:56.332   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateUpdateRetryCounter" with status: No_Error | "Es ist kein Fehler aufgetreten."
411
statema... 2018.06.05 15:01:56.332   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateHandleRetryCounter"
412
statema... 2018.06.05 15:01:56.332   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateHandleRetryCounter"
413
default    2018.06.05 15:01:56.332   StateHandleRetryCounter::run(core/states/StateHandleRetryCounter.cpp:37)   : PIN allowed
414
statema... 2018.06.05 15:01:56.332   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateHandleRetryCounter" with status: No_Error | "Es ist kein Fehler aufgetreten."
415
statema... 2018.06.05 15:01:56.333   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateEstablishPacePin"
416
card_pcsc  2018.06.05 15:01:56.614   PcscReader::updateCard(card/pcsc/PcscReader.cpp:194)                       : old state: "(0x20422) CHANGED PRESENT UNPOWERED" | new state: "(0x20122) CHANGED PRESENT INUSE"
417
statema... 2018.06.05 15:01:58.632   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateEstablishPacePin"
418
default    2018.06.05 15:01:58.632   AuthContext::encodeEffectiveChat(core/context/AuthContext.cpp:223)         : Using effective chat: "7f4c12060904007f0007030102025305000503fb04"
419
default    2018.06.05 15:01:58.632   StateEstablishPacePin::run(core/states/StateEstablishPacePin.cpp:38)       : Establish connection using PIN
420
support    2018.06.05 15:01:58.632 I ...ionWorker::establishPaceChannel(card/base/CardConnectionWorker.cpp:179) : Starting PACE for PACE_PIN
421
card       2018.06.05 15:01:58.633   const(card/base/pace/PaceHandler.cpp:141)                                  : Use ECDH with standardized domain parameters:  "0.4.0.127.0.7.2.2.4.2.2"
422
card       2018.06.05 15:01:58.633   ...urveFactory::createCurve(card/base/pace/ec/EllipticCurveFactory.cpp:41) : Create elliptic curve  brainpoolP256r1
423
card_pcsc  2018.06.05 15:01:58.633   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "00a4020c02011c"
424
card_pcsc  2018.06.05 15:01:58.645   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
425
card_pcsc  2018.06.05 15:01:58.645   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "9000"
426
card_pcsc  2018.06.05 15:01:58.645   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0022c1a427800a04007f0007020204020283010384010d7f4c12060904007f0007030102025305000503fb04"
427
card_pcsc  2018.06.05 15:01:58.686   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
428
card_pcsc  2018.06.05 15:01:58.686   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "9000"
429
card_pcsc  2018.06.05 15:01:58.686   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "10860000027c0000"
430
card_pcsc  2018.06.05 15:01:58.741   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
431
card_pcsc  2018.06.05 15:01:58.741   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "7c1280101d17b027156768f8e11b3892ab4450029000"
432
card_pcsc  2018.06.05 15:01:58.742   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "10860000457c438141045095ae46bbd75a3b04e3bc709fffcb741e16ee267f66964b60b9230904ba7e33565ebd948c3bbd3ec8d7726653e1e788f8a647c3211ae80cb671979c6b3e335900"
433
card_pcsc  2018.06.05 15:01:58.969   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
434
card_pcsc  2018.06.05 15:01:58.970   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "7c438241048b12ac3afd13a24fa0999a072fe3d0b4a60124ee43fb59bd9078f76c8f7a1b991513d48037e8b76cec075f9e5a6253a2a525a0905315d8c928d3e080c59e79a09000"
435
card_pcsc  2018.06.05 15:01:58.973   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "10860000457c43834104021c00743b6825a826fd1f217a66b3c83ecfaf74b5c653df50c1b196463d6ec71543dccbd8e139cd6022494f1ff1dfcf0c47af6e86f53857baf4724d9477429400"
436
card_pcsc  2018.06.05 15:01:59.135   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
437
card_pcsc  2018.06.05 15:01:59.135   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "7c43844104903653e62ab456bfd17ed6ae240e5ad9251764d554d2bf460ea80030726f109d3d24668325d87d7962e9cf02b7d3c60238c71a069e03c0476845e9f1872f049e9000"
438
card_pcsc  2018.06.05 15:01:59.137   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "008600000c7c0a85081132a9f20a1b4c1700"
439
card_pcsc  2018.06.05 15:01:59.248   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
440
card_pcsc  2018.06.05 15:01:59.249   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "7c2a8608b288fa2e22642864870e4445435643416549443030313034880e44454356434165494430303130339000"
441
default    2018.06.05 15:01:59.249   ...ynamicAuthenticationData(card/base/GeneralAuthenticateResponse.cpp:219) : mCarCurr "DECVCAeID00104"
442
default    2018.06.05 15:01:59.249   ...ynamicAuthenticationData(card/base/GeneralAuthenticateResponse.cpp:220) : mCarPrev "DECVCAeID00103"
443
card       2018.06.05 15:01:59.249   ...reement::performMutualAuthenticate(card/base/pace/KeyAgreement.cpp:170) : Successfully authenticated
444
card       2018.06.05 15:01:59.249   PaceHandler::establishPaceChannel(card/base/pace/PaceHandler.cpp:93)       : Pace channel established
445
support    2018.06.05 15:01:59.249 I ...ionWorker::establishPaceChannel(card/base/CardConnectionWorker.cpp:206) : Finished PACE for PACE_PIN with result OK
446
card       2018.06.05 15:01:59.249   BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42)         : ReturnCode of internal execute: OK
447
statema... 2018.06.05 15:01:59.249   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateEstablishPacePin" with status: No_Error | "Es ist kein Fehler aufgetreten."
448
statema... 2018.06.05 15:01:59.249   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateDidAuthenticateEac1"
449
statema... 2018.06.05 15:01:59.257   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateDidAuthenticateEac1"
450
card_pcsc  2018.06.05 15:01:59.257   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c8400000d9701088e0843e7b18792e0fce900"
451
card_pcsc  2018.06.05 15:01:59.292   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
452
card_pcsc  2018.06.05 15:01:59.292   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "871101168be941eacc35a6424b433ef3da4413990290008e080b8860512a726aa39000"
453
card       2018.06.05 15:01:59.293   BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42)         : ReturnCode of internal execute: OK
454
default    2018.06.05 15:01:59.293   AuthContext::encodeEffectiveChat(core/context/AuthContext.cpp:223)         : Using effective chat: "7f4c12060904007f0007030102025305000503fb04"
455
card       2018.06.05 15:01:59.293   const(card/base/asn1/CVCertificateChainBuilder.cpp:85)                     : Get chain for authority "DECVCAeID00104"
456
card       2018.06.05 15:01:59.293   const(card/base/asn1/CVCertificateChainBuilder.cpp:96)                     : Found valid chain QVector(CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
457
statema... 2018.06.05 15:01:59.293   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateDidAuthenticateEac1" with status: No_Error | "Es ist kein Fehler aufgetreten."
458
statema... 2018.06.05 15:01:59.293   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateSendDIDAuthenticateResponseEAC1"
459
statema... 2018.06.05 15:01:59.293   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateSendDIDAuthenticateResponseEAC1"
460
network    2018.06.05 15:01:59.294   StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213)  : Try to send raw data:
461
 "<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n  <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n   <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n   <paos:EndpointReference>\n    <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n    <paos:MetaData>\n     <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n    </paos:MetaData>\n   </paos:EndpointReference>\n  </paos:PAOS>\n  <wsa:ReplyTo>\n   <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n  </wsa:ReplyTo>\n  <wsa:MessageID>urn:uuid:dc3ea58a-be90-462c-bedb-2e3d52af0dd1</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n  <DIDAuthenticateResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n   <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n    <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n   </Result>\n   <AuthenticationProtocolData Protocol=\"urn:oid:1.3.162.15480.3.0.14.2\" xsi:type=\"iso:EAC1OutputType\">\n    <CertificateHolderAuthorizationTemplate>7f4c12060904007f0007030102025305000503fb04</CertificateHolderAuthorizationTemplate>\n    <EFCardAccess>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</EFCardAccess>\n    <IDPICC>903653e62ab456bfd17ed6ae240e5ad9251764d554d2bf460ea80030726f109d</IDPICC>\n    <Challenge>b970753ad2e85e20</Challenge>\n   </AuthenticationProtocolData>\n  </DIDAuthenticateResponse>\n </soap:Body>\n</soap:Envelope>\n"
462
network    2018.06.05 15:01:59.295   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
463
network    2018.06.05 15:01:59.295   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
464
network    2018.06.05 15:01:59.372   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
465
network    2018.06.05 15:01:59.372   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
466
network    2018.06.05 15:01:59.372   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
467
network    2018.06.05 15:01:59.372   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
468
network    2018.06.05 15:01:59.372   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:01:58 GMT"
469
network    2018.06.05 15:01:59.372   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
470
 "<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n   <soap:Header>\n      <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id979\" refToMessageID=\"cbd5ac4bf2b50fb720032320c0b7b59290646fa\"/>\n   </soap:Header>\n   <soap:Body>\n   <DIDAuthenticate xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<ConnectionHandle xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"ConnectionHandle\">\n<CardApplication>E80704007F00070302</CardApplication>\n<SlotHandle>00</SlotHandle>\n</ConnectionHandle>\n<DIDName>PIN</DIDName>\n<AuthenticationProtocolData Protocol=\"urn:oid:1.3.162.15480.3.0.14.2\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"EAC2InputType\">\n<Certificates xmlns=\"unknownNamespace\"/>\n<EphemeralPublicKey>049E1AFEDB227F8456AA4ADE1083E61239F9B16361EE873A864DC305528A8019562618BB53D8068968B3097569F27D941C12C4B10639AF57926A690A988E8D9519</EphemeralPublicKey>\n<Signature>5E9E3238FAC60B3BDA32CA1739BBAFAB301959FB6B9CDE4EBB5A1220C930EE2B1442C9DCF6EEFC84B86169DAB14380AA9219136C8940C056A91DD448E1FBC89B</Signature>\n</AuthenticationProtocolData>\n</DIDAuthenticate>\n</soap:Body>\n</soap:Envelope>\n"
471
paos       2018.06.05 15:01:59.373   ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:37) : "ConnectionHandle"
472
paos       2018.06.05 15:01:59.373   ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "CardApplication"
473
paos       2018.06.05 15:01:59.373   ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "SlotHandle"
474
paos       2018.06.05 15:01:59.373   ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:37) : "DIDName"
475
paos       2018.06.05 15:01:59.373   ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:37) : "AuthenticationProtocolData"
476
paos       2018.06.05 15:01:59.373   ...parseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:80) : "Certificates"
477
paos       2018.06.05 15:01:59.373 W ...arseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:111) : Unknown element: "Certificates"
478
paos       2018.06.05 15:01:59.373   ...parseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:80) : "EphemeralPublicKey"
479
paos       2018.06.05 15:01:59.373   ...parseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:80) : "Signature"
480
network    2018.06.05 15:01:59.373   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DID_AUTHENTICATE_EAC2
481
statema... 2018.06.05 15:01:59.373   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateSendDIDAuthenticateResponseEAC1" with status: No_Error | "Es ist kein Fehler aufgetreten."
482
statema... 2018.06.05 15:01:59.374   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateEACAdditionalInputType"
483
statema... 2018.06.05 15:01:59.374   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateEACAdditionalInputType"
484
statema... 2018.06.05 15:01:59.374   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateEACAdditionalInputType" with status: No_Error | "Es ist kein Fehler aufgetreten."
485
statema... 2018.06.05 15:01:59.374   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateProcessCertificatesFromEac2"
486
statema... 2018.06.05 15:01:59.374   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateProcessCertificatesFromEac2"
487
card       2018.06.05 15:01:59.374   const(card/base/asn1/CVCertificateChainBuilder.cpp:85)                     : Get chain for authority "DECVCAeID00104"
488
card       2018.06.05 15:01:59.374   const(card/base/asn1/CVCertificateChainBuilder.cpp:96)                     : Found valid chain QVector(CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
489
default    2018.06.05 15:01:59.374   ...catesFromEac2::run(core/states/StateProcessCertificatesFromEac2.cpp:26) : CVC chain already determined, skip further processing
490
statema... 2018.06.05 15:01:59.374   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateProcessCertificatesFromEac2" with status: No_Error | "Es ist kein Fehler aufgetreten."
491
statema... 2018.06.05 15:01:59.374   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateDidAuthenticateEac2"
492
statema... 2018.06.05 15:01:59.375   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateDidAuthenticateEac2"
493
card       2018.06.05 15:01:59.376   const(card/base/asn1/CVCertificateChainBuilder.cpp:85)                     : Get chain for authority "DECVCAeID00104"
494
card       2018.06.05 15:01:59.376   const(card/base/asn1/CVCertificateChainBuilder.cpp:96)                     : Found valid chain QVector(CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
495
card       2018.06.05 15:01:59.376   ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:125) : Performing TA MSE:Set DST
496
card       2018.06.05 15:01:59.376   ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:126) : Sending CAR "DECVCAeID00104"
497
card_pcsc  2018.06.05 15:01:59.376   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c2281b62d872101821d44460aed420846fe31cf903a4c830d5099a31ae4499a0676a14f9cb6d13b8e08059ab7dfc630883a00"
498
card_pcsc  2018.06.05 15:01:59.402   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
499
card_pcsc  2018.06.05 15:01:59.403   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08d3dcdfd7219eeb6d9000"
500
card       2018.06.05 15:01:59.403   ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:144) : Performing TA PSO:Verify Certificate
501
card       2018.06.05 15:01:59.403   ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:145) : Sending certificate CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"])
502
card_pcsc  2018.06.05 15:01:59.403   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "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"
503
card_pcsc  2018.06.05 15:01:59.614   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
504
card_pcsc  2018.06.05 15:01:59.614   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e087b4a86db5c6f68359000"
505
card       2018.06.05 15:01:59.614   ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:125) : Performing TA MSE:Set DST
506
card       2018.06.05 15:01:59.614   ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:126) : Sending CAR "DEDVeIDDTR101433"
507
card_pcsc  2018.06.05 15:01:59.614   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c2281b62d872101bc2f4c476a6678b3bb8141adcc7efe16c95c8a52296c8ab0c0ca6ec6a473fa618e0831c46f4d39a6216100"
508
card_pcsc  2018.06.05 15:01:59.648   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
509
card_pcsc  2018.06.05 15:01:59.648   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08a97b7d2f5aff3f369000"
510
card       2018.06.05 15:01:59.648   ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:144) : Performing TA PSO:Verify Certificate
511
card       2018.06.05 15:01:59.648   ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:145) : Sending certificate CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])
512
card_pcsc  2018.06.05 15:01:59.648   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c2a00be00015f8782015101a9e336b10b5cad3a322e2fa307af20180cc2e95c1a6622f0e3f93a595253fdc2f0940059bd63aa7ae420d30f2f509b17bd139f747b4afcf0c1327dd0bbceed2e2fe1ca317bab68027245b1d2daa94cea79d4796a76bf1fdf9951b137e9d0aeaba33d8dfdd1fba1c261cf450f7fe48859ce0223e46b301d1783c637000bcdad0569ebd1366644930e3af8ef40a302fa779c79c8468077776b2bd1ecd91d3471b25c2c838b3c0c7699fefd05d1f1e17ddc2d4c1580dfff1cff29877190335c189b8d128fbc30653f409e8d0f5a47edb6a0bf7c016f41b7fa6f62cc270012d27cce907c4b3966f7485f6da59871fc806428bf3452b9a682ff9d3c990cca58a13f2c1117203b137088f797af42161eab6627cbd70f0c1ad507aaf2ba55bc25bab105e5728a174268583ca509e9f31e9f8ac131ceb0a19e9782a524117d258c82bcd27304b0f5e8836332c7947bfbf10d923a8e08eb59b87ec62979750000"
513
card_pcsc  2018.06.05 15:01:59.846   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
514
card_pcsc  2018.06.05 15:01:59.846   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08e69b0f536330ec439000"
515
card       2018.06.05 15:01:59.846   ...nalAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:178) : Performing TA MSE:Set AT
516
card_pcsc  2018.06.05 15:01:59.846   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c2281a46d876101c4943fdfd59a3a35cbf0d6e84eaf4cc39c105c6f129cb433ee764d52fd1d5f025ccd884dfe9bc8db4b37771a6f32d10b87059c96b0ee7fd0f50a26a54256cb650d8262add3428e09ca0867e058550fa3e26b63ceaae224bc96dce48e910fb8108e08fa764cc0302b845600"
517
card_pcsc  2018.06.05 15:01:59.902   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
518
card_pcsc  2018.06.05 15:01:59.902   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e088cfb7540acb8dc429000"
519
card       2018.06.05 15:01:59.902   ...nalAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:194) : Performing TA External Authenticate
520
card_pcsc  2018.06.05 15:01:59.902   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c8200005d875101bca5451d03fb4a0ba3205dcdac168f4aba779ec282c11270231cb8ed04a0e2cd519ecf512b511f0d3b7d2a0a4915cea05152b1f9305e646755ffe0ba9bc1b6d5173c31108b371b0a52b6c8f1a11891e68e081d3f35fd0aa1effb00"
521
card_pcsc  2018.06.05 15:02:00.044   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
522
card_pcsc  2018.06.05 15:02:00.044   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e0878796963fa87232f9000"
523
card       2018.06.05 15:02:00.044   ...d::internalExecute(card/base/command/DidAuthenticateEAC2Command.cpp:82) : Performing Read EF.CardSecurity
524
card_pcsc  2018.06.05 15:02:00.044   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d87110134054dfbb271b5652ac0902f10b4910b8e086fa14c533fd958db00"
525
card_pcsc  2018.06.05 15:02:00.072   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
526
card_pcsc  2018.06.05 15:02:00.072   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e0872edc7ff474681ae9000"
527
card_pcsc  2018.06.05 15:02:00.072   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb000000d9701ff8e08ef09526d399ae4d400"
528
card_pcsc  2018.06.05 15:02:00.101   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
529
card_pcsc  2018.06.05 15:02:00.101   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8781e101165491c5acaeb8494246be8e79cc143ed120b8f9e84ee8608fa21c717dd1effd37d9ae8e31fbd26f739133c0a433279469feded02d6a908c15472191f7c386e04ad444f33761dd0231c0b09a576ed03563aa9b4ecbf27c169b3a5998a98bfbda1b92a7eb93778fe43e8f27f7ca3ad3e17ef6548e3703a8812a6a8cac522dbe6704c9a0bffb49323afcbf25571e6170767752cd8126a029cd771c152d34c2dc6fafa4a2d35dd2a56a0bdbd8dd229a088958dcc55a2317978dc20d505510f65c06bf21c448dbb811de092661e9ad2f8df7b6926271f9190c084daf6aecde6ac208990290008e081511c2084cfb8f0f9000"
530
card_pcsc  2018.06.05 15:02:00.101   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb000df0d9701ff8e081e6dcd8de57d895700"
531
card_pcsc  2018.06.05 15:02:00.130   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
532
card_pcsc  2018.06.05 15:02:00.130   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8781e10110fb41abe5e63765358e8e9e5ea0d6f4c77cd3ace92e17f320a4a94c5715e47b279a3259fd49f311d91d3b0e7dd9be857b6199e9460530e0b035b80b2c6c737f89380defca7f7460977c908a18d6ef6e1bd3f65d6d629baf87200d2709e24c783266dc46e634d143e159a9d772723d1be2a52040c2fc67ff6578e9f11064c22735ab3bd05a5bb6d9e1fe9bd9a9a04398bf35d034dbe93850fce1895ec7b1a1bc87ebea98dc313fbd01f517fca72836788e0a4bd89ea3a22a1332c5fa51cfbc22b4d6c6a2877239827baf2136ba383be9511c759b573856a99b13365c8dea9d3d990290008e08acec4082437ff27f9000"
533
card_pcsc  2018.06.05 15:02:00.130   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb001be0d9701ff8e08b0df66e289acbf7500"
534
card_pcsc  2018.06.05 15:02:00.158   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
535
card_pcsc  2018.06.05 15:02:00.159   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8781e101e60d61931eeac56ed089d25ebb9f12affe96f57525920522c15cf5c31e3e987df5d414a53e69017171b7c9c3363111390109825a1b20540ea48c960e17363a4cab1ba5f2594c7d31073522ddbe851a4bcf95c008b4d84f48b43dc79e3a81a3e1efb6b2283c6616baa74eb57a95358e3e212d1140b78ba4cfa5aa77ed72df4857df92242be45da6659939d6e1dcf10762c3789c23569d8002ec4da2eea4db52d1599c23d3766044865908d6a26b0835fa3e2106e619d1c5f02b38be0dc4a919da988939f7a2d6303293cdffa8c1e325d43b6277ed2dfed97f3292268f97387c0a990290008e08fdf1bd01744c95a39000"
536
card_pcsc  2018.06.05 15:02:00.159   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0029d0d9701ff8e08309cb52fef854fc100"
537
card_pcsc  2018.06.05 15:02:00.187   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
538
card_pcsc  2018.06.05 15:02:00.187   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8781e10140e47f3b7bdf3b98e2aea9d94debaa1c9ea516668dd68d7ba44007a182c7f83aa47be2b1b92037db537f8ad3e561644b9722769daf7b53d98d018d4c37ced88221a364f2498bc7cfc59afc53b36b9611a2a5c35f9cef9db8236b1c054db52803c186029578463fbcf9eeae4d8d4c351b6470de8aaef7d25d0f95d3809294134f4bea402e01818e6d7f90f60647dcdfcfc2146272fdac3ffd047624feff6bfceee542289922c8670b7f7839d2f985bb3731dce3c4f7910b3ae991727351442bb3042b0e042a503de923c3deea094d1f7f12fb1dfd57c4d0c4a6189eb9bbd5e0a3990290008e08fa031495e4ec9b349000"
539
card_pcsc  2018.06.05 15:02:00.188   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0037c0d9701ff8e08379e96732296be1100"
540
card_pcsc  2018.06.05 15:02:00.216   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
541
card_pcsc  2018.06.05 15:02:00.217   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8781e101de51a6ddb0cd0d6e348d3eb57179fd9938fb7e376fad460b5f290fa1d2831c69ffe3185409b824dc37d5e211add634361a40d51177e48c64f0b856403657163a33880a83a06088f28d67c6f97ac04b89bdfc3cffcaf65ffddbd4bb9c2f657455cb8a8df88fa96ac8121d2680dce5548fd701aceb963744e9bf013280aec3e43f45a7eb5a77303d8959bac7297dfbbbac8f0a43d5691df2fe89f72d27af3a053e48c2d2d1c5bc20bd06994cfbdc3e50ae49834ce4f89724e56cf18d12a28cda8538177e3471aab03e3d0e025e9d828a654d41ab85d848da2cdf6735553c8372cd990290008e088330e1b4f628e1429000"
542
card_pcsc  2018.06.05 15:02:00.217   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0045b0d9701ff8e086407fa9eba70b93f00"
543
card_pcsc  2018.06.05 15:02:00.245   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
544
card_pcsc  2018.06.05 15:02:00.246   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8781e101adc90921449477dd1945548c0265c26b432a928299025a615c1eae53be1c9023759299ef76e02bed2338d06e34e78075d94bf2b3bc8c7c3ab87087d782c79321d081f337252333e65f932e21a3fa1b2ec1ed0ea0d9fdbb908226cc62c7e48036ad656c0171cb860ce217ede5f74d5eec2b8104b24f35f591715e587b24b632abb9a556edf1ebf8f9e4dca16d71bf3a4a2f2848f67cb4730101a2c6ccb37e9fa5b52184ae578306542bf2e940dfed2ea6a96096111fa2c523401acee84c18d0d91f5143da5226fc351693c8c8e2d2503759a46a37a62cb71c4ef259734c89619f990290008e080796f357aa9cb8cc9000"
545
card_pcsc  2018.06.05 15:02:00.246   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0053a0d9701ff8e08dde51808a3670a1500"
546
card_pcsc  2018.06.05 15:02:00.274   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
547
card_pcsc  2018.06.05 15:02:00.274   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8781e101d2e7172b0d435f2c7204e160009772db5e837181737bb5d2c9e95d47921c28e69ae4387cac592a624e64b6d4f04b01bf4fc1d988f0e64f66d505e64816a17dd05d30d8d1bc60de8ad9b730a03c1297d1d462a62e64ea9bf0d5bc6c188ddb9bec3743cbdc74c8c942189596a87e45130dc4a9b3990e691d23e125eddc42d4ce541e07ff4b7d442e3f80c65229287aceb79a26fc6bc23ad3430070ef33097704f6cefb9b8150c087117dc4cdbe7ef934483b157e96c705372cd5703abf18e3ec00377474b10141572da950960e54f676effdad6a8cd4489ccfc3ec73193468666d990290008e08cab6aa0cada662719000"
548
card_pcsc  2018.06.05 15:02:00.275   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb006190d9701ff8e0871942f6ed7231e9000"
549
card_pcsc  2018.06.05 15:02:00.300   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
550
card_pcsc  2018.06.05 15:02:00.301   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "87818101a271645a7a6d28d965a3f2a585f58b06e402f60d8c7cbce728016d0c97cc8fcf6828dcd99324ccd9a154ec850d1a08f9a1494831e1fd36e3b8ff0304eca67cec5d5ec27478613e2726a013264c915833ef26c6f19bc38c1ac28d4d8c922e6cdc0c0902e0e14fe76eb54bfd0effd9fb4fccd573c10736ee402a3df44b1788c225990262828e080474d697fd1dc4056282"
551
card       2018.06.05 15:02:00.301   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73)                 : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.2"
552
card       2018.06.05 15:02:00.301   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:67)                 : Parsed ChipAuthenticationInfo
553
card       2018.06.05 15:02:00.301   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:61)                 : Parsed PACEInfo
554
card       2018.06.05 15:02:00.301   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73)                 : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.5.2.3"
555
card       2018.06.05 15:02:00.302   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73)                 : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.5.2.3"
556
card       2018.06.05 15:02:00.302   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73)                 : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.5.2"
557
card       2018.06.05 15:02:00.302   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73)                 : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.3.2"
558
card       2018.06.05 15:02:00.302   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73)                 : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.6"
559
card       2018.06.05 15:02:00.302   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73)                 : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.1.2"
560
card       2018.06.05 15:02:00.302   ...::internalExecute(card/base/command/DidAuthenticateEAC2Command.cpp:106) : Chose ChipAuthenticationInfo(0): protocol "0.4.0.127.0.7.2.2.3.2.2" , keyId "48"
561
card       2018.06.05 15:02:00.303   ...hipAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:221) : Performing CA MSE:Set AT
562
card_pcsc  2018.06.05 15:02:00.303   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c2241a41d871101a775e9c5405037634e666ec9329e57948e089a24ee99bb1e783c00"
563
card_pcsc  2018.06.05 15:02:00.337   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
564
card_pcsc  2018.06.05 15:02:00.337   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e0880c12d79ead8016a9000"
565
card       2018.06.05 15:02:00.337   ...hipAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:237) : Performing CA General Authenticate
566
card_pcsc  2018.06.05 15:02:00.337   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c8600006087510101672efbf421984de4f073339211bc7347be4845d2469697a33189bfc7671b2158130d199bb5fe1393d7379dabf9fe712fec93e8f8d0da138f586fac40a59bbecb823da11936b278a6db000cce6347539701008e08bd338166daafec1b00"
567
card_pcsc  2018.06.05 15:02:00.471   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
568
card_pcsc  2018.06.05 15:02:00.471   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "87210131a71a3fd9fc92e16254f31369fea90f61f3a83ac83cff4c6b877bf6078fbd95990290008e0821b4e07ef7861a309000"
569
card       2018.06.05 15:02:00.471   BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42)         : ReturnCode of internal execute: OK
570
statema... 2018.06.05 15:02:00.472   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateDidAuthenticateEac2" with status: No_Error | "Es ist kein Fehler aufgetreten."
571
statema... 2018.06.05 15:02:00.472   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateSendDIDAuthenticateResponseEAC2"
572
statema... 2018.06.05 15:02:00.472   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateSendDIDAuthenticateResponseEAC2"
573
network    2018.06.05 15:02:00.473   StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213)  : Try to send raw data:
574
 "<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n  <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n   <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n   <paos:EndpointReference>\n    <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n    <paos:MetaData>\n     <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n    </paos:MetaData>\n   </paos:EndpointReference>\n  </paos:PAOS>\n  <wsa:ReplyTo>\n   <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n  </wsa:ReplyTo>\n  <wsa:MessageID>urn:uuid:af87b6f7-9684-4772-90ec-2c286bce75c4</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n  <DIDAuthenticateResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n   <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n    <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n   </Result>\n   <AuthenticationProtocolData Protocol=\"urn:oid:1.3.162.15480.3.0.14.2\" xsi:type=\"iso:EAC2OutputType\">\n    <EFCardSecurity>3082069206092a864886f70d010702a08206833082067f020103310f300d0609608648016503040201050030820148060804007f0007030201a082013a0482013631820132300d060804007f00070202020201023012060a04007f000702020302020201020201483012060a04007f0007020204020202010202010d3017060a04007f00070202050203300902010102014a0101ff3017060a04007f00070202050203300902010102014c0101003019060904007f000702020502300c060704007f0007010202010d301c060904007f000702020302300c060704007f0007010202010d020148302a060804007f0007020206161e687474703a2f2f6273692e62756e642e64652f6369662f6e70612e786d6c3062060904007f0007020201023052300c060704007f0007010202010d034200049f330d477801519415b1430541995be968029cc53322ad86bb2a907a68a44892325d3e4a89b077f8b174af37d207889e69afaafd680a2e7054708647e3bf6572020148a0820409308204053082038ca003020102020162300a06082a8648ce3d040303304f310b3009060355040613024445310d300b060355040a0c0462756e64310c300a060355040b0c03627369310c300a060355040513033130313115301306035504030c0c637363612d6765726d616e79301e170d3134303631363131333434385a170d3235303131363233353935395a3062310b300906035504061302444531183016060355040a0c0f42756e646573647275636b65726569310c300a06035504051303313337312b302906035504030c22446f63756d656e74205369676e6572204964656e7469747920446f63756d656e7473308201333081ec06072a8648ce3d02013081e0020101302c06072a8648ce3d0101022100a9fb57dba1eea9bc3e660a909d838d726e3bf623d52620282013481d1f6e5377304404207d5a0975fc2c3057eef67530417affe7fb8055c126dc5c6ce94a4b44f330b5d9042026dc5c6ce94a4b44f330b5d9bbd77cbf958416295cf7e1ce6bccdc18ff8c07b60441048bd2aeb9cb7e57cb2c4b482ffc81b7afb9de27e1e3bd23c23a4453bd9ace3262547ef835c3dac4fd97f8461a14611dc9c27745132ded8e545c1d54c72f046997022100a9fb57dba1eea9bc3e660a909d838d718c397aa3b561a6f7901e0e82974856a702010103420004525eaa95c4b38bbf72cb3d612c0826fba8b12b611ac165d6ca46e63e34b13903835c77a631bdec7fc246d2c69a8ffacda389967ee12ebfee0e7b1d9c5ab16df0a382016830820164301f0603551d23041830168014c17ba915f75cddd26b3d609a2354de12ee3f0ec6301d0603551d0e041604148faf71d3bfb0fe1e97189b6e3160bcf5c5acd14c300e0603551d0f0101ff040403020780302b0603551d1004243022800f32303134303631363131333434385a810f32303135303131363233353935395a30160603551d20040f300d300b060904007f000703010101302d0603551d1104263024821262756e646573647275636b657265692e6465a40e300c310a300806035504070c014430510603551d12044a30488118637363612d6765726d616e79406273692e62756e642e6465861c68747470733a2f2f7777772e6273692e62756e642e64652f63736361a40e300c310a300806035504070c01443019060767810801010602040e300c02010031071301411302494430300603551d1f042930273025a023a021861f687474703a2f2f7777772e6273692e62756e642e64652f637363615f63726c300a06082a8648ce3d04030303670030640230162678f9f9a9c6650ff7a54067b036196c1ca2280b5194e54c111385ae12cec1f5f0120357a68a3d47960e9c9f2083d702305b13ae766257a326517a85e02209f0d9e71349dd9341954467c671a05150e9ba0868ce4a7e8cdcede51e6888d5fdd1643182010e3082010a0201013054304f310b3009060355040613024445310d300b060355040a0c0462756e64310c300a060355040b0c03627369310c300a060355040513033130313115301306035504030c0c637363612d6765726d616e79020162300d06096086480165030402010500a04a301706092a864886f70d010903310a060804007f0007030201302f06092a864886f70d0109043122042028967df31b6de034d26a7696d104dc8e2053bcb95604588442a520f20180c332300c06082a8648ce3d04030205000446304402207766557ff4e409c11d0d89ec251f540d4b9a4dda3808d5ed013abe68576753a10220145b80e6dd4b0b4cce3e3af425cf03c950f96d6f6bbe875bc6b95db97075975c</EFCardSecurity>\n    <AuthenticationToken>7b8e96d3560b48b2</AuthenticationToken>\n    <Nonce>3ce84d651c5b35cc</Nonce>\n   </AuthenticationProtocolData>\n  </DIDAuthenticateResponse>\n </soap:Body>\n</soap:Envelope>\n"
575
network    2018.06.05 15:02:00.473   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
576
network    2018.06.05 15:02:00.473   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
577
network    2018.06.05 15:02:00.639   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
578
network    2018.06.05 15:02:00.640   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
579
network    2018.06.05 15:02:00.640   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
580
network    2018.06.05 15:02:00.640   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
581
network    2018.06.05 15:02:00.640   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:02:00 GMT"
582
network    2018.06.05 15:02:00.640   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
583
 "<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n   <soap:Header>\n      <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id980\" refToMessageID=\"cbd5ac4bf2b50fb720032320c0b7b59290646fa\"/>\n   </soap:Header>\n   <soap:Body>\n   <Transmit xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<SlotHandle>00</SlotHandle>\n<InputAPDUInfo>\n<InputAPDU>0CA4040C1D8711018EDC7870E963ACDE19EA91F6B537B22B8E085A8F0B05CBA14A4100</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>8C2080001D871101F08651936CD32CCD9FC06D9FEAA29E638E08305444AF21184F2500</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0C2241A41D871101C1F92B4D150913FCF75221195784FF758E08777E4438FE2F07C400</InputAPDU>\n<AcceptableStatusCode>9000</AcceptableStatusCode>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<Input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nputAPDU>\n<AcceptableStatusCode>9000</AcceptableStatusCode>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0C2241A41D871101974CA0410BCBBEB717BB73460B90963D8E088DC871EDD8196B8400</InputAPDU>\n<AcceptableStatusCode>9000</AcceptableStatusCode>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<Input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nputAPDU>\n<AcceptableStatusCode>9000</AcceptableStatusCode>\n</InputAPDUInfo>\n</Transmit>\n</soap:Body>\n</soap:Envelope>\n"
584
paos       2018.06.05 15:02:00.640   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "SlotHandle"
585
paos       2018.06.05 15:02:00.640   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
586
paos       2018.06.05 15:02:00.640   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
587
paos       2018.06.05 15:02:00.641   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
588
paos       2018.06.05 15:02:00.641   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
589
paos       2018.06.05 15:02:00.641   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
590
paos       2018.06.05 15:02:00.641   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
591
paos       2018.06.05 15:02:00.641   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode"
592
paos       2018.06.05 15:02:00.641   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
593
paos       2018.06.05 15:02:00.641   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
594
paos       2018.06.05 15:02:00.641   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode"
595
paos       2018.06.05 15:02:00.641   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
596
paos       2018.06.05 15:02:00.641   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
597
paos       2018.06.05 15:02:00.641   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode"
598
paos       2018.06.05 15:02:00.641   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
599
paos       2018.06.05 15:02:00.641   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
600
paos       2018.06.05 15:02:00.641   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode"
601
network    2018.06.05 15:02:00.641   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: TRANSMIT
602
statema... 2018.06.05 15:02:00.642   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateSendDIDAuthenticateResponseEAC2" with status: No_Error | "Es ist kein Fehler aufgetreten."
603
statema... 2018.06.05 15:02:00.642   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateTransmit"
604
statema... 2018.06.05 15:02:00.642   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateTransmit"
605
card_pcsc  2018.06.05 15:02:00.643   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4040c1d8711018edc7870e963acde19ea91f6b537b22b8e085a8f0b05cba14a4100"
606
card_pcsc  2018.06.05 15:02:00.668   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
607
card_pcsc  2018.06.05 15:02:00.668   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08cc6ee400ecd650029000"
608
card_pcsc  2018.06.05 15:02:00.668   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "8c2080001d871101f08651936cd32ccd9fc06d9feaa29e638e08305444af21184f2500"
609
card_pcsc  2018.06.05 15:02:00.693   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
610
card_pcsc  2018.06.05 15:02:00.693   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08d582c9464ed02c4e9000"
611
card_pcsc  2018.06.05 15:02:00.693   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c2241a41d871101c1f92b4d150913fcf75221195784ff758e08777e4438fe2f07c400"
612
card_pcsc  2018.06.05 15:02:00.744   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
613
card_pcsc  2018.06.05 15:02:00.745   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e0832e5258df69b0fa69000"
614
card_pcsc  2018.06.05 15:02:00.745   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "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"
615
card_pcsc  2018.06.05 15:02:00.888   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
616
card_pcsc  2018.06.05 15:02:00.888   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "873101c5fd58c62bbeae8a9e73280ea8755b902245bb62012bd81576ade95668c8e174d8687c3e849ce7a7f241d80fd3b62d49990290008e083ebf660fd38889799000"
617
card_pcsc  2018.06.05 15:02:00.888   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c2241a41d871101974ca0410bcbbeb717bb73460b90963d8e088dc871edd8196b8400"
618
card_pcsc  2018.06.05 15:02:00.941   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
619
card_pcsc  2018.06.05 15:02:00.941   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08cefb066f2b6941b29000"
620
card_pcsc  2018.06.05 15:02:00.941   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "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"
621
card_pcsc  2018.06.05 15:02:01.085   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
622
card_pcsc  2018.06.05 15:02:01.085   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "873101e5973bcc6c94404ddc2fc272b707428288f2c648fe7a4c9f4a9f76773c8fd20f1b5795eb0df98441dbb03f49233a5a85990290008e082af7db87b8794de49000"
623
card       2018.06.05 15:02:01.085   TransmitCommand::internalExecute(card/base/command/TransmitCommand.cpp:74) : transmit end
624
card       2018.06.05 15:02:01.085   BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42)         : ReturnCode of internal execute: OK
625
statema... 2018.06.05 15:02:01.085   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateTransmit" with status: No_Error | "Es ist kein Fehler aufgetreten."
626
statema... 2018.06.05 15:02:01.085   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateSendTransmitResponse"
627
statema... 2018.06.05 15:02:01.085   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateSendTransmitResponse"
628
network    2018.06.05 15:02:01.086   StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213)  : Try to send raw data:
629
 "<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n  <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n   <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n   <paos:EndpointReference>\n    <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n    <paos:MetaData>\n     <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n    </paos:MetaData>\n   </paos:EndpointReference>\n  </paos:PAOS>\n  <wsa:ReplyTo>\n   <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n  </wsa:ReplyTo>\n  <wsa:MessageID>urn:uuid:9aecd72b-7e4f-4bbe-92aa-a4ca3ead28af</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n  <TransmitResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n   <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n    <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n   </Result>\n   <OutputAPDU>990290008e08cc6ee400ecd650029000</OutputAPDU>\n   <OutputAPDU>990290008e08d582c9464ed02c4e9000</OutputAPDU>\n   <OutputAPDU>990290008e0832e5258df69b0fa69000</OutputAPDU>\n   <OutputAPDU>873101c5fd58c62bbeae8a9e73280ea8755b902245bb62012bd81576ade95668c8e174d8687c3e849ce7a7f241d80fd3b62d49990290008e083ebf660fd38889799000</OutputAPDU>\n   <OutputAPDU>990290008e08cefb066f2b6941b29000</OutputAPDU>\n   <OutputAPDU>873101e5973bcc6c94404ddc2fc272b707428288f2c648fe7a4c9f4a9f76773c8fd20f1b5795eb0df98441dbb03f49233a5a85990290008e082af7db87b8794de49000</OutputAPDU>\n  </TransmitResponse>\n </soap:Body>\n</soap:Envelope>\n"
630
network    2018.06.05 15:02:01.086   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
631
network    2018.06.05 15:02:01.086   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
632
network    2018.06.05 15:02:01.175   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
633
network    2018.06.05 15:02:01.175   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
634
network    2018.06.05 15:02:01.175   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
635
network    2018.06.05 15:02:01.175   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
636
network    2018.06.05 15:02:01.175   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:02:00 GMT"
637
network    2018.06.05 15:02:01.175   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
638
 "<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n   <soap:Header>\n      <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id981\" refToMessageID=\"cbd5ac4bf2b50fb720032320c0b7b59290646fa\"/>\n   </soap:Header>\n   <soap:Body>\n   <Transmit xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<SlotHandle>00</SlotHandle>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101CEA20EFDDB4183852841775F53D972B38E089BFA8F920540484100</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08EE714CBF7208A5F20000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101A7C333E97A9D7C7C8665E61A99E4A76A8E084B2A8ACCAA037CC800</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08705311EC633A41D80000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101B67186FDBA9B07A66BBAE9019931E61E8E08D35E694D6019F7C800</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E082966825BDF92C49E0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D8711013A076D986463BC211CFDDEB9E77675708E0847000562C8DE55AF00</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E084C9FE7D09D14CF350000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101D3FD24962708F561705FA8DCD2C9FAC58E08F56B25EB93DE652600</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E0850F74B32FE0BA5EE0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101A4D5E1F5BFDE2D3A0E1E26B13C3BBAF08E087B14DA1B19D2A73C00</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E0827B823C584AAFB0E0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D87110164781FD5CAF72BC1C5343C4E64EF11A88E089EDA9EF500680A8A00</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08ADA0D07C243043A80000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101314E365996BBD9EC98E9E5C164C22C088E082FADF94E068550A800</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E089900D78637D0FDFF0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D8711014EC8D4F5A77B2AD20F46F45617ACB0C88E08E9D5D6C134C4432000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E085D8A034FD8B57F3F0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101CD72782FFABE8BBC5420449C60D62B848E08EA41FB155EC2B14700</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08DFEFACBF137CA4F40000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101D5A12B7FAAFAA634B3F6D7F7E315ABBC8E08F7546E644B93DADF00</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08562160CEE15BE9BE0000</InputAPDU>\n</InputAPDUInfo>\n</Transmit>\n</soap:Body>\n</soap:Envelope>\n"
639
paos       2018.06.05 15:02:01.176   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "SlotHandle"
640
paos       2018.06.05 15:02:01.176   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
641
paos       2018.06.05 15:02:01.176   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
642
paos       2018.06.05 15:02:01.176   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
643
paos       2018.06.05 15:02:01.176   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
644
paos       2018.06.05 15:02:01.176   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
645
paos       2018.06.05 15:02:01.176   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
646
paos       2018.06.05 15:02:01.176   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
647
paos       2018.06.05 15:02:01.176   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
648
paos       2018.06.05 15:02:01.176   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
649
paos       2018.06.05 15:02:01.176   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
650
paos       2018.06.05 15:02:01.176   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
651
paos       2018.06.05 15:02:01.176   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
652
paos       2018.06.05 15:02:01.177   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
653
paos       2018.06.05 15:02:01.177   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
654
paos       2018.06.05 15:02:01.177   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
655
paos       2018.06.05 15:02:01.177   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
656
paos       2018.06.05 15:02:01.177   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
657
paos       2018.06.05 15:02:01.177   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
658
paos       2018.06.05 15:02:01.177   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
659
paos       2018.06.05 15:02:01.177   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
660
paos       2018.06.05 15:02:01.177   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
661
paos       2018.06.05 15:02:01.177   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
662
paos       2018.06.05 15:02:01.177   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
663
paos       2018.06.05 15:02:01.177   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
664
paos       2018.06.05 15:02:01.177   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
665
paos       2018.06.05 15:02:01.177   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
666
paos       2018.06.05 15:02:01.177   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
667
paos       2018.06.05 15:02:01.177   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
668
paos       2018.06.05 15:02:01.178   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
669
paos       2018.06.05 15:02:01.178   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
670
paos       2018.06.05 15:02:01.178   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
671
paos       2018.06.05 15:02:01.178   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
672
paos       2018.06.05 15:02:01.178   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
673
paos       2018.06.05 15:02:01.178   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
674
paos       2018.06.05 15:02:01.178   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
675
paos       2018.06.05 15:02:01.178   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
676
paos       2018.06.05 15:02:01.178   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
677
paos       2018.06.05 15:02:01.178   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
678
paos       2018.06.05 15:02:01.178   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
679
paos       2018.06.05 15:02:01.178   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
680
paos       2018.06.05 15:02:01.178   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
681
paos       2018.06.05 15:02:01.178   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
682
paos       2018.06.05 15:02:01.178   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
683
paos       2018.06.05 15:02:01.178   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
684
network    2018.06.05 15:02:01.179   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: TRANSMIT
685
statema... 2018.06.05 15:02:01.179   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateSendTransmitResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
686
statema... 2018.06.05 15:02:01.179   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateTransmit"
687
statema... 2018.06.05 15:02:01.179   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateTransmit"
688
card_pcsc  2018.06.05 15:02:01.179   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d871101cea20efddb4183852841775f53d972b38e089bfa8f920540484100"
689
card_pcsc  2018.06.05 15:02:01.208   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
690
card_pcsc  2018.06.05 15:02:01.208   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08c65e297951cdcc7a9000"
691
card_pcsc  2018.06.05 15:02:01.208   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08ee714cbf7208a5f20000"
692
card_pcsc  2018.06.05 15:02:01.232   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
693
card_pcsc  2018.06.05 15:02:01.232   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8711016fe8e25d6eb6fcbe15d870ddbd1ee1b5990290008e0883d0f9c2a5b681e19000"
694
card_pcsc  2018.06.05 15:02:01.233   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d871101a7c333e97a9d7c7c8665e61a99e4a76a8e084b2a8accaa037cc800"
695
card_pcsc  2018.06.05 15:02:01.257   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
696
card_pcsc  2018.06.05 15:02:01.257   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e082278a2ad6b1020709000"
697
card_pcsc  2018.06.05 15:02:01.258   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08705311ec633a41d80000"
698
card_pcsc  2018.06.05 15:02:01.281   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
699
card_pcsc  2018.06.05 15:02:01.281   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8711013acf0837c4c8bf55a743c126e6f13828990290008e089c63c4642f98fc6a9000"
700
card_pcsc  2018.06.05 15:02:01.282   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d871101b67186fdba9b07a66bbae9019931e61e8e08d35e694d6019f7c800"
701
card_pcsc  2018.06.05 15:02:01.311   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
702
card_pcsc  2018.06.05 15:02:01.311   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e086123fc3f15b9e0759000"
703
card_pcsc  2018.06.05 15:02:01.311   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e082966825bdf92c49e0000"
704
card_pcsc  2018.06.05 15:02:01.335   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
705
card_pcsc  2018.06.05 15:02:01.336   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8721017c3ab20962756105b4d7c14e65b43f88bda6cbd85e0b2be3ae3157908e58e315990290008e085e585835bb14efed9000"
706
card_pcsc  2018.06.05 15:02:01.336   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d8711013a076d986463bc211cfddeb9e77675708e0847000562c8de55af00"
707
card_pcsc  2018.06.05 15:02:01.360   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
708
card_pcsc  2018.06.05 15:02:01.360   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e0807bfa2846b414fed9000"
709
card_pcsc  2018.06.05 15:02:01.361   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e084c9fe7d09d14cf350000"
710
card_pcsc  2018.06.05 15:02:01.385   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
711
card_pcsc  2018.06.05 15:02:01.385   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "871101e1d8c2589c29fc9b027fa704e7867f16990290008e08198ee16589d8824d9000"
712
card_pcsc  2018.06.05 15:02:01.385   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d871101d3fd24962708f561705fa8dcd2c9fac58e08f56b25eb93de652600"
713
card_pcsc  2018.06.05 15:02:01.414   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
714
card_pcsc  2018.06.05 15:02:01.414   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e0860b0ae4ef7768e1a9000"
715
card_pcsc  2018.06.05 15:02:01.415   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e0850f74b32fe0ba5ee0000"
716
card_pcsc  2018.06.05 15:02:01.439   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
717
card_pcsc  2018.06.05 15:02:01.439   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8711011f0b9ccf6cc950fcbd6b1f663881132b990290008e08772545cdd99fd1dd9000"
718
card_pcsc  2018.06.05 15:02:01.439   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d871101a4d5e1f5bfde2d3a0e1e26b13c3bbaf08e087b14da1b19d2a73c00"
719
card_pcsc  2018.06.05 15:02:01.464   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
720
card_pcsc  2018.06.05 15:02:01.464   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e0855ec2916594692389000"
721
card_pcsc  2018.06.05 15:02:01.464   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e0827b823c584aafb0e0000"
722
card_pcsc  2018.06.05 15:02:01.489   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
723
card_pcsc  2018.06.05 15:02:01.489   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "871101c7660039d3d4d7bb07577545658d73de990290008e080127efba355568139000"
724
card_pcsc  2018.06.05 15:02:01.489   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d87110164781fd5caf72bc1c5343c4e64ef11a88e089eda9ef500680a8a00"
725
card_pcsc  2018.06.05 15:02:01.518   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
726
card_pcsc  2018.06.05 15:02:01.518   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e083bd7e9e733fa4f269000"
727
card_pcsc  2018.06.05 15:02:01.518   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08ada0d07c243043a80000"
728
card_pcsc  2018.06.05 15:02:01.542   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
729
card_pcsc  2018.06.05 15:02:01.542   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8711012980af56659c4e903cf49eedbfb1d9ff990290008e08760d05cc1ce6acbd9000"
730
card_pcsc  2018.06.05 15:02:01.543   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d871101314e365996bbd9ec98e9e5c164c22c088e082fadf94e068550a800"
731
card_pcsc  2018.06.05 15:02:01.568   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
732
card_pcsc  2018.06.05 15:02:01.568   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08f0a5d0ce2fbc5e8f9000"
733
card_pcsc  2018.06.05 15:02:01.568   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e089900d78637d0fdff0000"
734
card_pcsc  2018.06.05 15:02:01.593   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
735
card_pcsc  2018.06.05 15:02:01.593   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "872101a5e512f7f3a83a01436258ae5d9d4a5abe6e6e3a068079584c7cd110a96d7b57990290008e080ca24a9586397eb99000"
736
card_pcsc  2018.06.05 15:02:01.593   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d8711014ec8d4f5a77b2ad20f46f45617acb0c88e08e9d5d6c134c4432000"
737
card_pcsc  2018.06.05 15:02:01.611   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
738
card_pcsc  2018.06.05 15:02:01.611   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "99026a828e08890a19675db479316a82"
739
card_pcsc  2018.06.05 15:02:01.611   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e085d8a034fd8b57f3f0000"
740
card_pcsc  2018.06.05 15:02:01.636   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
741
card_pcsc  2018.06.05 15:02:01.637   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8721019c6a1cde9450687fdada4b136e68880abfbe2a6e7154a649774916da94b3a160990290008e089630d1e3905bfd249000"
742
card_pcsc  2018.06.05 15:02:01.637   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d871101cd72782ffabe8bbc5420449c60d62b848e08ea41fb155ec2b14700"
743
card_pcsc  2018.06.05 15:02:01.668   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
744
card_pcsc  2018.06.05 15:02:01.668   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08623dc1f5adee33069000"
745
card_pcsc  2018.06.05 15:02:01.668   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08dfefacbf137ca4f40000"
746
card_pcsc  2018.06.05 15:02:01.696   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
747
card_pcsc  2018.06.05 15:02:01.696   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8741017c82efcb7e6edc741208c116bdef3ce9dda1360eaebcfc84abaf7ad717603af2ed5d76a5842a4da1a45ce59e530832de61be3a269adcc1966143f054d42d25df990290008e08eb72599421eb049d9000"
748
card_pcsc  2018.06.05 15:02:01.696   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d871101d5a12b7faafaa634b3f6d7f7e315abbc8e08f7546e644b93dadf00"
749
card_pcsc  2018.06.05 15:02:01.714   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
750
card_pcsc  2018.06.05 15:02:01.714   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "99026a828e081325a83115f9dc766a82"
751
card_pcsc  2018.06.05 15:02:01.714   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08562160cee15be9be0000"
752
card_pcsc  2018.06.05 15:02:01.742   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
753
card_pcsc  2018.06.05 15:02:01.742   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "87410134c2bf3d0d27ff6ebdaf88820bb367c8045b7b1e2f315d5186b8f94efcd2319a65bf75ad10f6ebb5bb5d648666039cc64717cd198d7f58f4386bfac681266019990290008e08df189c96a643ee2b9000"
754
card       2018.06.05 15:02:01.743   TransmitCommand::internalExecute(card/base/command/TransmitCommand.cpp:74) : transmit end
755
card       2018.06.05 15:02:01.743   BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42)         : ReturnCode of internal execute: OK
756
statema... 2018.06.05 15:02:01.743   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateTransmit" with status: No_Error | "Es ist kein Fehler aufgetreten."
757
statema... 2018.06.05 15:02:01.743   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateSendTransmitResponse"
758
statema... 2018.06.05 15:02:01.743   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateSendTransmitResponse"
759
network    2018.06.05 15:02:01.744   StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213)  : Try to send raw data:
760
 "<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n  <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n   <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n   <paos:EndpointReference>\n    <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n    <paos:MetaData>\n     <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n    </paos:MetaData>\n   </paos:EndpointReference>\n  </paos:PAOS>\n  <wsa:ReplyTo>\n   <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n  </wsa:ReplyTo>\n  <wsa:MessageID>urn:uuid:b9e9bba8-d11d-4993-b626-1175be000339</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n  <TransmitResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n   <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n    <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n   </Result>\n   <OutputAPDU>990290008e08c65e297951cdcc7a9000</OutputAPDU>\n   <OutputAPDU>8711016fe8e25d6eb6fcbe15d870ddbd1ee1b5990290008e0883d0f9c2a5b681e19000</OutputAPDU>\n   <OutputAPDU>990290008e082278a2ad6b1020709000</OutputAPDU>\n   <OutputAPDU>8711013acf0837c4c8bf55a743c126e6f13828990290008e089c63c4642f98fc6a9000</OutputAPDU>\n   <OutputAPDU>990290008e086123fc3f15b9e0759000</OutputAPDU>\n   <OutputAPDU>8721017c3ab20962756105b4d7c14e65b43f88bda6cbd85e0b2be3ae3157908e58e315990290008e085e585835bb14efed9000</OutputAPDU>\n   <OutputAPDU>990290008e0807bfa2846b414fed9000</OutputAPDU>\n   <OutputAPDU>871101e1d8c2589c29fc9b027fa704e7867f16990290008e08198ee16589d8824d9000</OutputAPDU>\n   <OutputAPDU>990290008e0860b0ae4ef7768e1a9000</OutputAPDU>\n   <OutputAPDU>8711011f0b9ccf6cc950fcbd6b1f663881132b990290008e08772545cdd99fd1dd9000</OutputAPDU>\n   <OutputAPDU>990290008e0855ec2916594692389000</OutputAPDU>\n   <OutputAPDU>871101c7660039d3d4d7bb07577545658d73de990290008e080127efba355568139000</OutputAPDU>\n   <OutputAPDU>990290008e083bd7e9e733fa4f269000</OutputAPDU>\n   <OutputAPDU>8711012980af56659c4e903cf49eedbfb1d9ff990290008e08760d05cc1ce6acbd9000</OutputAPDU>\n   <OutputAPDU>990290008e08f0a5d0ce2fbc5e8f9000</OutputAPDU>\n   <OutputAPDU>872101a5e512f7f3a83a01436258ae5d9d4a5abe6e6e3a068079584c7cd110a96d7b57990290008e080ca24a9586397eb99000</OutputAPDU>\n   <OutputAPDU>99026a828e08890a19675db479316a82</OutputAPDU>\n   <OutputAPDU>8721019c6a1cde9450687fdada4b136e68880abfbe2a6e7154a649774916da94b3a160990290008e089630d1e3905bfd249000</OutputAPDU>\n   <OutputAPDU>990290008e08623dc1f5adee33069000</OutputAPDU>\n   <OutputAPDU>8741017c82efcb7e6edc741208c116bdef3ce9dda1360eaebcfc84abaf7ad717603af2ed5d76a5842a4da1a45ce59e530832de61be3a269adcc1966143f054d42d25df990290008e08eb72599421eb049d9000</OutputAPDU>\n   <OutputAPDU>99026a828e081325a83115f9dc766a82</OutputAPDU>\n   <OutputAPDU>87410134c2bf3d0d27ff6ebdaf88820bb367c8045b7b1e2f315d5186b8f94efcd2319a65bf75ad10f6ebb5bb5d648666039cc64717cd198d7f58f4386bfac681266019990290008e08df189c96a643ee2b9000</OutputAPDU>\n  </TransmitResponse>\n </soap:Body>\n</soap:Envelope>\n"
761
network    2018.06.05 15:02:01.744   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
762
network    2018.06.05 15:02:01.744   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
763
network    2018.06.05 15:02:01.795   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
764
network    2018.06.05 15:02:01.795   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
765
network    2018.06.05 15:02:01.795   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
766
network    2018.06.05 15:02:01.795   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
767
network    2018.06.05 15:02:01.795   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:02:01 GMT"
768
network    2018.06.05 15:02:01.796   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
769
 "<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n   <soap:Header>\n      <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id982\" refToMessageID=\"cbd5ac4bf2b50fb720032320c0b7b59290646fa\"/>\n   </soap:Header>\n   <soap:Body>\n   <Disconnect xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<SlotHandle>00</SlotHandle>\n</Disconnect>\n</soap:Body>\n</soap:Envelope>\n"
770
network    2018.06.05 15:02:01.796   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DISCONNECT
771
statema... 2018.06.05 15:02:01.796   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateSendTransmitResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
772
statema... 2018.06.05 15:02:01.796   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateSendDisconnectResponse"
773
statema... 2018.06.05 15:02:01.796   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateSendDisconnectResponse"
774
network    2018.06.05 15:02:01.796   StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213)  : Try to send raw data:
775
 "<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n  <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n   <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n   <paos:EndpointReference>\n    <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n    <paos:MetaData>\n     <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n    </paos:MetaData>\n   </paos:EndpointReference>\n  </paos:PAOS>\n  <wsa:ReplyTo>\n   <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n  </wsa:ReplyTo>\n  <wsa:MessageID>urn:uuid:a8d2cd6e-c83f-4645-bb1c-a5e7447d0988</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n  <DisconnectResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n   <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n    <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n   </Result>\n  </DisconnectResponse>\n </soap:Body>\n</soap:Envelope>\n"
776
network    2018.06.05 15:02:01.796   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
777
network    2018.06.05 15:02:01.796   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
778
network    2018.06.05 15:02:01.838   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
779
network    2018.06.05 15:02:01.838   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
780
network    2018.06.05 15:02:01.838   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
781
network    2018.06.05 15:02:01.838   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
782
network    2018.06.05 15:02:01.838   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:02:01 GMT"
783
network    2018.06.05 15:02:01.838   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
784
 "<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n   <soap:Header>\n      <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id983\" refToMessageID=\"cbd5ac4bf2b50fb720032320c0b7b59290646fa\"/>\n   </soap:Header>\n   <soap:Body>\n   <StartPAOSResponse Profile=\"http://www.bsi.bund.de/ecard/api/1.1\" xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n<ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n</Result>\n</StartPAOSResponse>\n</soap:Body>\n</soap:Envelope>\n"
785
network    2018.06.05 15:02:01.838   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: STARTPAOS_RESPONSE
786
statema... 2018.06.05 15:02:01.838   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateSendDisconnectResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
787
statema... 2018.06.05 15:02:01.838   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateStartPaosResponse"
788
statema... 2018.06.05 15:02:01.838   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateStartPaosResponse"
789
statema... 2018.06.05 15:02:01.839   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateStartPaosResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
790
statema... 2018.06.05 15:02:01.839   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateUpdateRetryCounter"
791
statema... 2018.06.05 15:02:01.839   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateUpdateRetryCounter"
792
default    2018.06.05 15:02:01.839   StateUpdateRetryCounter::run(core/states/StateUpdateRetryCounter.cpp:22)   : StateUpdateRetryCounter::run()
793
card_pcsc  2018.06.05 15:02:01.839   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "00a4020c02011c"
794
card_pcsc  2018.06.05 15:02:01.846   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
795
card_pcsc  2018.06.05 15:02:01.846   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "6a82"
796
card_pcsc  2018.06.05 15:02:01.846   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0022c1a412800a04007f0007020204020283010384010d"
797
card_pcsc  2018.06.05 15:02:01.872   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
798
card_pcsc  2018.06.05 15:02:01.872   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "9000"
799
card       2018.06.05 15:02:01.872   Reader::getRetryCounter(card/base/Reader.cpp:151)                          : StatusCode:  SUCCESS
800
support    2018.06.05 15:02:01.872 I Reader::updateRetryCounter(card/base/Reader.cpp:103)                       : retrieved retry counter: 3 , was: 3 , PIN deactivated: false
801
card       2018.06.05 15:02:01.872   BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42)         : ReturnCode of internal execute: OK
802
default    2018.06.05 15:02:01.872   ...r::onUpdateRetryCounterDone(core/states/StateUpdateRetryCounter.cpp:39) : StateUpdateRetryCounter::onUpdateRetryCounterDone()
803
statema... 2018.06.05 15:02:01.872   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateUpdateRetryCounter" with status: No_Error | "Es ist kein Fehler aufgetreten."
804
statema... 2018.06.05 15:02:01.872   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateCleanUpReaderManager"
805
statema... 2018.06.05 15:02:01.872   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateCleanUpReaderManager"
806
default    2018.06.05 15:02:01.872   ...CleanUpReaderManager::run(core/states/StateCleanUpReaderManager.cpp:24) : Going to disconnect card connection
807
card       2018.06.05 15:02:01.872   ReaderManagerWorker::stopScan(card/base/ReaderManagerWorker.cpp:130)       : Stop scan on plugin: governikus::PcscReaderManagerPlugIn
808
default    2018.06.05 15:02:01.872   ...CleanUpReaderManager::run(core/states/StateCleanUpReaderManager.cpp:28) : Going to disconnect readers
809
card       2018.06.05 15:02:01.872   ReaderManagerWorker::stopScan(card/base/ReaderManagerWorker.cpp:130)       : Stop scan on plugin: governikus::RemoteReaderManagerPlugIn
810
statema... 2018.06.05 15:02:01.872   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateCleanUpReaderManager" with status: No_Error | "Es ist kein Fehler aufgetreten."
811
statema... 2018.06.05 15:02:01.872   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateCheckRefreshAddress"
812
statema... 2018.06.05 15:02:01.874   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateCheckRefreshAddress"
813
default    2018.06.05 15:02:01.889   StateCheckRefreshAddress::run(core/states/StateCheckRefreshAddress.cpp:80) : Current URL:  "https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=cbd5ac4bf2b50fb720032320c0b7b59290646fa"
814
default    2018.06.05 15:02:01.889   StateCheckRefreshAddress::run(core/states/StateCheckRefreshAddress.cpp:82) : SubjectUrl:  "https://eid-prod.connect.verwalt-berlin.de"
815
network    2018.06.05 15:02:01.889   UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46)                : SOP-Check( "https://eid-prod.verwalt-berlin.de:8443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= false
816
default    2018.06.05 15:02:01.889   StateCheckRefreshAddress::run(core/states/StateCheckRefreshAddress.cpp:91) : SOP-Check failed, start process
817
default    2018.06.05 15:02:01.889   ...shAddress::sendGetRequest(core/states/StateCheckRefreshAddress.cpp:133) : Send GET request to URL:  "https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=cbd5ac4bf2b50fb720032320c0b7b59290646fa"
818
network    2018.06.05 15:02:01.889   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8443, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=cbd5ac4bf2b50fb720032320c0b7b59290646fa"))
819
network    2018.06.05 15:02:01.889   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
820
network    2018.06.05 15:02:01.892   ...amHandlerImpl::~DatagramHandlerImpl(network/DatagramHandlerImpl.cpp:70) : Shutdown socket
821
card_pcsc  2018.06.05 15:02:01.895   PcscCard::disconnect(card/pcsc/PcscCard.cpp:143)                           : SCardEndTransaction for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
822
card_pcsc  2018.06.05 15:02:01.958   PcscCard::disconnect(card/pcsc/PcscCard.cpp:148)                           : SCardDisconnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
823
network    2018.06.05 15:02:02.064   TlsChecker::getFatalErrors(network/TlsChecker.cpp:205)                     : (ignored)  "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
824
network    2018.06.05 15:02:02.064   TlsChecker::containsFatalError(network/TlsChecker.cpp:218)                 : Ignore SSL errors
825
network    2018.06.05 15:02:02.064 I (:0)                                                                       : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-SHA384, bits=256, proto=TLSv1.2)
826
network    2018.06.05 15:02:02.064 I (:0)                                                                       : Used session protocol: "TlsV1_2"
827
network    2018.06.05 15:02:02.064 I (:0)                                                                       : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
828
network    2018.06.05 15:02:02.064 I (:0)                                                                       : Used peer certificate: QSslCertificate("3", "3c:3f:e6:1c:7c:28:28:d9", "Kfl3PTkdwoi1P7sQWG1dvQ==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.verwalt-berlin.de")), QDateTime(2017-10-16 13:01:51.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-10-21 23:59:59.000 UTC Qt::TimeSpec(UTC)))
829
network    2018.06.05 15:02:02.065 I ...dress::onSslHandshakeDone(core/states/StateCheckRefreshAddress.cpp:162) : Handshake of tls connection done!
830
default    2018.06.05 15:02:02.065   TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49)        : Check certificate key of type "Rsa" and key size 2048
831
default    2018.06.05 15:02:02.065   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 2000
832
default    2018.06.05 15:02:02.065   TlsChecker::checkCertificate(network/TlsChecker.cpp:29)                    : Check certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9"
833
default    2018.06.05 15:02:02.065   TlsChecker::checkCertificate(network/TlsChecker.cpp:31)                    : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "0546c2b01048cb77669003ab0743255f94582f010baa85308133f514e218ff3c"
834
default    2018.06.05 15:02:02.065   TlsChecker::checkCertificate(network/TlsChecker.cpp:32)                    : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
835
default    2018.06.05 15:02:02.065   AuthContext::addCertificateData(core/context/AuthContext.h:143)            : Adding certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" for URL origin QUrl("https://eid-prod.verwalt-berlin.de:8443")
836
default    2018.06.05 15:02:02.065   TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84)          : Check ephemeral key of type "Ec" and key size 384
837
default    2018.06.05 15:02:02.065   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 224
838
card_pcsc  2018.06.05 15:02:02.110   PcscReader::updateCard(card/pcsc/PcscReader.cpp:194)                       : old state: "(0x20122) CHANGED PRESENT INUSE" | new state: "(0x20022) CHANGED PRESENT"
839
default    2018.06.05 15:02:02.203   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:212) : Status Code:  303  | redirect URL:  QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1omGhJc1NIlWCSRfv1R3j7bZe%2B%2FYtXzKIMIJ9%2BPhftyDP%2F357Luf9mJZX%2BPwy1f4Z%2BjrT8WQjflrqH756nviN%2Brrn3%2F905r0HTJ9d4p1Goe1%2BOleNKzffx%2F95et7Gb6Pyfpavw9JX6zft%2By7yxj6d%2BRn6Pu0jNuYjd3Xn%2Fhi3V5Dsv32onrbpvU7CBav%2FNs9Jf85G4ehyLaf760cSbd9S4ulew0%2F5wXIvoulKhZtHLYxLFLwh2inyIrXXrjFsnfF9ue1WH%2FsX8l%2FgcgUzlCa%2BpZlJPkNS2nkGw0hybciz8uUJoqUQMqvPyn8L1%2FzIi2T7H4EQWV2z0TxbymFlN8gEk1wNCuIMsPvmcNfdPbGX77%2Bd1qgJVKW6DcYSpBvGJXR31KUzL4RCEyTEAohJVTci9b1XSjDuiXD9stXBIKpbxDxDcI9GP0OId8h%2BGeCwuKvPwV%2FMfttqK9%2FGPn7b4uXv7fw%2F27gZF2L5YdRv%2F76V2P%2BixH%2FBP6G1R%2FC%2F4qnuyXbe%2F2nv9yYFz8FSfcu%2FvcX3%2Brdi7%2B77yy7zf8V%2FPWPl0zf%2F0Hsd2HIls%2B0FTnzl53%2BR8r96bz98m%2FC%2BGRL%2FpDz48HvHnU71HEcPx%2Foz%2BNSgQgEwSCEgbez3jP%2B68YlvyGEyiJJioxC7l9GJUVRkCRNwkWGUCmZoujXn7zPdKv%2Bf5QndEVfDNsN3N%2Fv7AbCKLZ6zH9iumpcXlvd%2F1%2FISooVRm6nTbMfdszX71rxUYZy%2FEPDfP03MiAQon%2Fol6%2Bv6r%2F%2BaSdFfgv5XWcMh1AExnIMhfGMxrPbZTMcT9AMxm9bpNT%2FFx2WNfkG%2Fzf%2Bjwr8pswTh%2BgfeP31D%2FfDY8tXlmzFr4ai8BfPccziVsyhsEylcIxtHLwdqdoYK%2FWePRhb0FmbOap4PLmLUdnqEbBM5DGtIxo29WMuH9i28kU4Yi5%2BqmsSYid%2FMY%2FfJ2Ye26pd1p9T2gi%2BwSoSA%2FsCVxu6GzhC%2BGL%2FtoZntN%2FXrN4XBgqkRyO8DI75bQFzHLEPiQ9PpLsktLdMVveYw5sUwd9x%2BICeUGDal1AbLCVx7iy5SorytqAyTuR%2BicOutaUOiuVxi%2Frgk0rdW%2B%2BdzmCxJ%2B8JqOEJx%2BMSYONSDkMc7zHln8f%2Bqv6Xf6f%2Ff6L%2Bl3%2Bn%2F3%2Bi%2Fpd%2Fp%2F%2B%2FVV9RWKX5AVQ71%2B1Log%2BIvdEWGcbkvjA2xdzuwXKVdruEwCDmx0qVZM8L2S1BnqEOzaSj0vE%2FCMYpeJ5g8Mt8VoMejGDC2ZV%2FbVhjKS54NswXWdWvSCAcUgkkLrMvzS6u5OR92jYbRx8NwV0JvoiCp5yYPSXSgf1g9vSTowXQuDH6LEz9kyKbhqr78OVdgWEaz5ZRBBvIiMqSJQWypmf7IeO9cos69hqv4SN3DFiFe5%2B%2B3UKPtxsNqes0yb7UnICPTJzjWDt%2BoVQLx72Qd89zJGepw0BEtUMkB5x0%2BchYdQxCoQ3kGJSQusjICyRmAWEr39CCxsLiPa3Yc4DDyjM%2B4hes0KYqj5ENwAVG3RbfEodYwKIkEEj5k%2BOF3%2BCpH7ErRfEYfLYYAyb9ofCMzbDjOR4S%2F%2Fvxkh1D%2BMI0DGMw6w%2Fvz%2FnjRuBQhJb%2FZ7TW39D6AdBiPULGBy4%2BGZ0l1eWpAedaGxJKFYIvTlOXM05SiwQSw4M%2BptLvS8iDWwFbOZGR38uspg6ZSaXglKkC1E%2BHiJyGqOCNad5ocFWj8Xgj43ukqy8YChB025fNUx7oih%2FaaSgJEGc23mZGIx9nqT5ltiiXgBx2HIja1%2FZOB971YhbQLF2jwUOm8g3pwaj4Qr%2FN6xC33IwNSIWRZ%2FkUNNWufSrJAT9m8762%2FO08AUI4ziwG6hOkiZxTqUr2JGmtxsONiEI3URZY3l%2BKbR5f4diR91b2%2FuV%2BAHV8FcZGo1nv6HRryBHGaBrUj6zhayWIWO%2BGUGEbsaDc0lJUx99qSW8X3onclywviYCMnO745Zc%2FgX%2BE0r%2BPnn8d%2FD2%2B%2FpjyR%2Br4Iy1xr6kult%2Bf%2Fpanfh%2F4Lb%2F%2Fqqgpl6z81hWV8uqiajqKdKy9AtAAypaf4TptjOlv6dB0AeRJRNLH8UauVSXOTt9Rz563yP5EOdG4%2BMP9FNT%2BbLNLemkRrc5NYCHj4Apy26CgKZmNLM4vYY%2FM1ZFhZXqKByoGJHsV2h4Rk7VD9ExXnvmQp8%2FTt0wIlIZBC8tYljfBGFOJ6Do6%2F2RPTV9YGvtMTLRICNu8wustpA8HcXqTmMMZMvoN3OJjer4Y1%2FrI6id0WehpQsCjRKrrqe7soqhGuYO96g0PgW0alEfMKwxPowttXK30Ku41BGW0ZHWbD%2FoYeVgmMWs7iUtlnu2QN1rSa2UlhE6nWLsQlSaTsyO9PrIEj2b7B1T%2FYup%2FGPoDrH9kNDdu%2F88APqaKHjP1iOGV7WV1CT6Fzeb5C0AVjUvx1hFkamNo3eS1BNarvpvuWJpERZPQXhfVE47EJr9reV%2FcoYa05ey9TEXdCngzIW3XuZdIVUhgNxGo0BidjPlUNEP%2B2F388%2BBoT7qNZTX1KZC47H6UQJM9%2FxAfE6mhsT7FnnJHFX4lF76nYsCaXD8tSJfZZkK7ameTL2oZHq3zvpwu4XWFXl5v29aYPG0e0PpcZ%2BQjlItsPcMm6Ci5hjpjvaatp65NKoB25qieuQGkaCCmNqPmTrHKia6h0Zez0ImNyysD61OAO4R%2B%2BUZFKlpUVesdDGN9k9n8gD%2B4pqN%2B%2BhAbrY%2B6g4TcApMlx4tnB1C3XW7PA%2BwjVim8Rk1JjVgT34e3lkQkccLGAH0oLUFP4pM2fYkUTsKTRxF%2B7RXpLXNT8PlmHOGD5%2BjPnknqqge7KuPN%2BjnKcnyHuvd4hYLD%2BMfEP%2Fi0aUxlnKfyzW1jh6jp3iiSYD6A%2Bn2NF7sB5fy0zkyeRm8x3irt%2Bwoz9tpsiVRp4XRb2D1jb6CPrA%2BQkL046N92Jk2PPisjiFr4zXm8lqbxYQUje2qi65TEx9eypfEAHow5l%2F6T18agSQGfpbo8ArIXQ34u1ICf49G2uypMJpcVG0KXx5Gw%2FqR7DZs3K1NYnsuXXkV76XR1ZqH0llcfHAUlu2ppuezOC9zUh4mPdManoJCvF1d1rE8VH2jgzx5JpxNYmw%2BdohrwLuPm0WLnY%2FAoyh%2BrzHyMXblg44hlAkbEiKcqKuCSDMFGYzLxAB1U2lCu3Xp81oLIkfJKz3Ij97r71Lyu3mCfd%2Fatn6WlWx9OUxaZDODAQBYmxJPepcUFK4WdFV3Xk7bxrA3b9R7Y5O%2Fqna1L9CMAdJKpioe%2FN2eKmc3zGWGIacHbrfequYLdawD3THMzQ6cNXO%2FgoJSYy2n69alsYZRln41lFvC1bN36wa4cE6cVZus2GmRVx3bSIIqCEK7AR0RL21p4JUJGInx9LqNqDbhtNDzj5b65QDDfgNUQ6isciEcsr1W%2FPDbUDd7Fi9Zo%2BjWBui2cITlIueA6L15VcijVLY8OP1NYFnQExvK8bGWPCPIrdMH4rUOZGIjK6Pj1MUfJZQGZK6rdmqDOjGxg%2FcmEqNsZsqRJnu4c9o0tchMfg%2FwSQacGkDcCX1DkDNo7sq3AmOvi6fYsMT%2BCjNLWfFIzJS6R5YWlSGm6iGLE4Z0w3NU5rcknujJsOWiTpYaU56dYEGrKilGhdJP7Nm82hmcdahoh7iYC2NcSDUu25ui1JcvDOsWfYCJS9dIVnFBeYVi1aDigT3zpGonQcH9GC%2BOEAZ3tWDQ0jXfxXKwM1io0dJuxwKUtc1g%2BuzMPAvlNIAIiU7erH064Fu8Uig9P3t605nY2XRRj72TQ9oPWBGmTOikxTXUl7ye10O3oY7JBo2COLTBHMCgVvgy39wFeJik4oCKdVkjlvCRDX9XkWAGJN1haWrGgFea1UwkMRuoKGHEeW3WRgfkKTxm32iwxiTfKfHQq2rUkzdaOQhFkG4OaCI83e5PZjTQvaO%2FX%2FcQep6MYSPVY%2BkIrurFFxL032QTQ2Lw8BCVzaucO885LWYPhIa%2FDefupJgRc5Yy5thX4VS%2BuhcT9IwOkT4DTpjJAdzn08UhOLY69lBV1HCDB6X1fsEHokkRvwcD0KZL%2BakM6985FqBgE6vOo8BvYE%2BEtu%2FNJz31MZZI8dzR%2Fogmtr3ceat4M6%2Bawvpl18FJkpVRopIR1dmw9iYcvwCum%2BVG1vh5bpMgdQQcM5hF5uEoasKqsNk%2BSHySpeSZ%2F8WOTUqi59YAKB4zlpu6rLMuluGO7GG0T%2FYkg63gO8eqnb9C69GybnsBxwmJTeEmP7zWAhviaWJiNtLX%2BKFyOsciFWAoZQ0jrcgUpIdDXDIQSPw5CqlWqQufwMkcRlbjSxQpBks73cZ6eIbRMDESpu4H1N6fAX3U8SXxaJTkpNp95pAkIq12aDtqwBZo7%2FP2IcymvCdLMvVXAGPEMuJ5YYXvLZRIfGkZOjTsyBjfpaQA1qq0GqN%2BAQ%2FTdUvMkl8ZbleY%2BvlI2A4qpudVp0rIDKYNZlKLYU9QSzV7ndymJluFdlN4xQ1Le5qcEw1FjVrhIZsApniz0GtibgnKF5%2BvN8py5FeNn1cx01vc11ABMD2It4ROX7vvdkhWN6qgUPcsYlXptVe86ZvnEGntiDmxfkk3Ne6i9vPHNDTEUOsFYBd4j0tlCeJmGpFsZnZl%2Br7YqhGuiiDJvQE%2BYR7PV73BDkV1dWVM9nzLRTuiBgjiJ05NVYQsKd490Z4M4Cww8Jug64WCCE20VGSCG9UFo%2FjTIMeK%2B%2BiQMHC1FUN622LqZJOmXz3BE%2BNeWdKPHQAoz9zwXEIUlZPGOOV0ZoHo6T2j3ICBiLq5tMgJLn5%2FpYT2x%2FHKZhH551jQr6va%2BFu1lNzQ%2FcNzZBe%2B9skHTyAqMSQt7N8oPHW%2FgM7E0bKFxhH2Yj1UZinIbpXKNpYW58IH2zBct1pWJpXyTK1YDlfXwNO8eJ00PLXBnynf8CgAni4SyDcyAbTFRPh93hblCgb5wx1s%2FdXdHmzpdGJibJjJnzqOUFt4GYfolczF3RsSR509T56f6tNjVPIscUo8zEmprXZ448RCDNiL0M6zJp03me8YvpnlNuRQeT9KjsSoKk9Xo54VJu903cF9ZALlFdISoZsq%2F6CTS1vZmA0HmTNpjm%2FQPHTm49%2By09kls6mHgK%2Fnm8iWDNjASGck4nQx87JQsj9yQBnNzUyiSMQ6Y8i07P2eJm2%2Bwqrt674qDRVbMZ7L6nBwqswuABGQAaEbVl4AomqcKvugo8vTzuek3tS1YFNgsOsa02YN2blX9RD%2BYLMikx4iubMAZcvfarKM4FlicBCWnG2FM81W26Rl1Syw22b3vPiOVILjIfaDGVlyyWSmfB4jSZ14R5bZ9w8SRE0j8qSxq44uP4YmeWVi6IfJpFYujWJwQZ7DcifdU8%2BuJ0PXY%2By8EAm2RFu3eu4y%2BUSdp2boLm9vXIr4mY0ngEU1C6RBAd7M3lOyJkAsCeEdOZHq7z8Kbbp5l3PXVcDZxVr%2FvLrn1jNVO8bIonfok06NGWRuzMTYLH0YkEduiJBFAIjGTioDoU9JAsISQbcoKJFCrJ4NW%2BUQ8qcYz59klqHtTsmJEFMYiKm2tFwdWXYrsoE7tZr591h2xk9H7wHH1eTcdXIXI7AqyyBD0mMMer9nXkKSoPSM01AiGySSrPCXCbDmm3Lr%2ByMjcCKiLNpA7GpxBOSVhYENpLSxRm6B1Cg3jrLAlTrHqfG7eXp%2Fmo9Us0BAeoloPGMLiB1UrCR3hR640Jk25wJjVtX%2BEIXIzn5xF4BesfzY3nB8kKlbVG0KFqb9AOwM6nPLVmnDuiOm0Pjm2slgCnJyU8BnnvqzniXCkZ2FqpSRLBInVTgk%2FlLoeqE08kbf%2FKTDomh5a2yOr9znHvEPog0U1li9LslRyxJWNl0fwL%2FX9OuRrSaJ3NDhTwn1sDX2thMFygliPRgqoVXPCYDdD6RQH8mjoVLokuCO%2Fpb26af%2Foi3PknaxWFFIw1v3zwp2OTA6IOn3sgAeyo4lgGNlcf0nd0i%2Fledbra3otTD2u9VG1Bc%2BUnxcD%2BXQr75%2FYfgmtUUs4H4o0ZprjHMf005TwRX3iLlLdBW0J3hlghzdAXxWRHe9zO5DkEEyNeSfvAvI3LfDyyXYt%2BcGNrK4D%2FLsL4zTweceK7gxhMQMzcuYa6ILjHcwEuo9HgeQCr5tSEi1LqHbaCzs5l7ClClSQxVgJ0wlREZM67Wl%2Bxhdxd2ETwM39rGsvZztSlc%2BLSG0w387dPhRs3S9VdngzBTVnva08Hufq0u%2BtCxAh9pXj8k4ZqihXLoIypZZdYC8QMwscj6%2BzSUaxz%2FxssrLxZA0MpfYwzJQUvlvStA67MwAuA3EdbapgbOFFxDr%2FqEgROQNtq0eIdQLuTgLUKnbYgiRJClGIev5YbB38PgNyAaYrZ40kqZiAMevPaFF0DemgvZgh8dGW%2BdhK3hwpGVr2NKN15dnCCKspkJ3FGLrV1UPrV2W1iuQVl54K3mQH%2FSAVzvjWvAy4JLLiyjiKQGfec2nJkX2SSj6M3gXX08qipBY6NBlbjUm2Q5SRO7sa2247diQG3HbakAB2HHuElnofF%2F%2BU2GBd9yeCO9ETtVxfQlT%2FDpof7PUKYhcwSLJ4bss2B3hwFWgmMPX%2BKFAq5VtY7UD08fTYgGoh6RjgMgOQkCFgeZyG83152LStP9otZgKL56OLyeEoi%2FbmcmTF2g2wSZKovKm3eITbrjdWx8DuQxpb9toQcnw0iPICwn3PObDK86HKo6HiriQbw1cSwFKgBDSj0Pu0WMnxGHMOys%2Faxawn9%2BDuFgzTJHFL9sJka9MWjyM6r2%2BEIYoXSy4sKlSISuzGodxEqd%2BCAMHuV%2BWQKUq%2B%2F0kgyCHENn%2BvQtD4YacEtZG3BRJzzDjrd3tTOuWGfxfxDi%2FZY7H1m5RpTMx96ACU3tsgHsjEbkEKZhB%2B4LqOXFAaFib3OCuxyaR9fPd7M%2FZGkHXVnGIthCieDAGZf58OVufdraJ2c2SaUdG19IlzRaCEziXVQ%2F2BnVcuAe%2B9JFuYvj2po7lKjnipoXfJoY4Ma3eJatNXgK13cUKHrly7U9uAujkbRng6GPcAzDTmDlGCWprRzSDlOcZh9EGi%2BHQM7xJv531pgMRtGqSPILqwHyvmTjUEkBz3nQsXgP3dTEZtzDx4UUkI7NlEawicPpFWKPVW5BqQ5jQmQIbSpgEfA3sJrtnIYMwr9R2%2FS%2FHjlek2WzAlbFBN%2FYxmii13w%2Fdu19b5d9nQ11LnFvAYr8%2FoVblYNeuME0LGtk1%2FoazcKo7nLjcTfWxV10%2F2iAUbGt%2BtdM9m3duLjaOI72a0qe1rNn%2BGD%2FER6fC4mNkxADo%2FpZCX7718Ns%2B6HNbn4dX6UMazDSISLUFWA42rJsa56KuVrj7oqwqlmQdzPzBlS7mb95%2FnpSAEVXfZBQx4i%2BkhcHWSvJJ7Y233bdLWOlT80TWnLlnFIqaX4gtzFq%2BxdbH0kVoz%2F8gonRFRRJ11SA0eUf2Sgo0Y3Mf12VD4RBH7LhHLafCYbXLe1FDkYI9ZfNI9WI5tkMcd0F%2FF3JoaPhPgSUcDvRKqY%2Bq4W9ApKat42lX8%2FnFlAJT9t7PybxF1Lnxm1tGTgPWwTcjgzRkR6alI4ktzb2%2BQ%2B2Rp4jcYLESeEjPMf1RJAQqZ82KHoiiFLkCQH1NeUm06edss7uWpkZFBprz7MmTANni%2BNVaZy7GK7uuCDBxrxTAcbY5W1cxPCLOw6C58SPqhDNHdBKnL8MliRoCl%2BA6lJLrcTXqXjDUes0ZI9MGZ3P2mfH8uoOvf%2FUsxIG1yNcWXKGfEy%2FzhWCH%2BacH0Va6IwqNWNuyPanFFHZtqC8idEfC715483pzZ6TI1EhwVAt47gRWIgFkHJijm%2BdEhqn6kb3pKX8X2Li98sYatBFeGovV8rwitlwUkDMlgJ2zngWKfVuvtEJhUQHgEkFZLp5tfCK5pFpMzZtcOCfRRwvD10axKF6yNu%2BPpNb863Er1%2FGWZomw5ETEW8rLSC00eON8COlqwb3uw8qCqCgxQNnh4J97NJaE3xehpMdBgC8t05D80KYPNcF%2FIZVY4g%2BvQPC0KG4VIa9UZwkdy2W6laTo77LAP5RTGYdH6l7eZhS3XsLsb5OvZyQGCkEm%2BAp%2FKinB6bVytT1n0TgCKGoHOyT2eYEIUOLUC6NWzJPS4r4u4XvJTA7RnWq7bNKDvaqAa6JtFPKEjOHNkU5UlAMxl7gmJbRQMqK4ehJFXl0zda1kIRoH1l60YJVmZfjbyivV6PqeaU0HQxJEWB4LAUveGIAXvDUY0x0ZvrZW121%2FG2idVV7OTuL%2FPsbfVzxzGrySQ%2BUW0RFQAD02PvRXPuaPl83g3BdsujsE4xwD3X%2BJoR9juHfnLP7Bw51PabgVDJHN9DyFILEuglxvNUepujsScPS9vchSSYcv7PqD9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=G3Q%2BjzFaEwmal2YdOPC%2FnOr%2B60CpKL%2BgfE15Zqb9HPkaFGMGvJnJXTTJZnq%2Fk39%2BdxYr%2B%2BGxURMn%0AvQiCxIoQJALN06iIEMPVr6Ihvp%2BYBCmTxfJenbiJpr1eUUQL4fC7qmZ8xWWbuX4z882omXpcpwyJ%0A7KBZaimyq%2FRkTy4QazvrfldEuPj5x0DpDkKOVoxjZQIUn5155U%2FS1Wyb%2BUNnAoSx4vELycvxs8zj%0A1C4O189P9kDa3VkJd7CwF%2B7neTofd1L5jQBqB1JeaSgFyNhMLZ0FcUSymVM1wNbeLuvbfcSpFhCC%0AWbzr3rlL8O%2BSs1nMZcebHBrYOz7xiuhIWl8mcA%3D%3D")
840
network    2018.06.05 15:02:02.204   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Server": "Apache-Coyote/1.1"
841
network    2018.06.05 15:02:02.204   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Location": "https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1omGhJc1NIlWCSRfv1R3j7bZe%2B%2FYtXzKIMIJ9%2BPhftyDP%2F357Luf9mJZX%2BPwy1f4Z%2BjrT8WQjflrqH756nviN%2Brrn3%2F905r0HTJ9d4p1Goe1%2BOleNKzffx%2F95et7Gb6Pyfpavw9JX6zft%2By7yxj6d%2BRn6Pu0jNuYjd3Xn%2Fhi3V5Dsv32onrbpvU7CBav%2FNs9Jf85G4ehyLaf760cSbd9S4ulew0%2F5wXIvoulKhZtHLYxLFLwh2inyIrXXrjFsnfF9ue1WH%2FsX8l%2FgcgUzlCa%2BpZlJPkNS2nkGw0hybciz8uUJoqUQMqvPyn8L1%2FzIi2T7H4EQWV2z0TxbymFlN8gEk1wNCuIMsPvmcNfdPbGX77%2Bd1qgJVKW6DcYSpBvGJXR31KUzL4RCEyTEAohJVTci9b1XSjDuiXD9stXBIKpbxDxDcI9GP0OId8h%2BGeCwuKvPwV%2FMfttqK9%2FGPn7b4uXv7fw%2F27gZF2L5YdRv%2F76V2P%2BixH%2FBP6G1R%2FC%2F4qnuyXbe%2F2nv9yYFz8FSfcu%2FvcX3%2Brdi7%2B77yy7zf8V%2FPWPl0zf%2F0Hsd2HIls%2B0FTnzl53%2BR8r96bz98m%2FC%2BGRL%2FpDz48HvHnU71HEcPx%2Foz%2BNSgQgEwSCEgbez3jP%2B68YlvyGEyiJJioxC7l9GJUVRkCRNwkWGUCmZoujXn7zPdKv%2Bf5QndEVfDNsN3N%2Fv7AbCKLZ6zH9iumpcXlvd%2F1%2FISooVRm6nTbMfdszX71rxUYZy%2FEPDfP03MiAQon%2Fol6%2Bv6r%2F%2BaSdFfgv5XWcMh1AExnIMhfGMxrPbZTMcT9AMxm9bpNT%2FFx2WNfkG%2Fzf%2Bjwr8pswTh%2BgfeP31D%2FfDY8tXlmzFr4ai8BfPccziVsyhsEylcIxtHLwdqdoYK%2FWePRhb0FmbOap4PLmLUdnqEbBM5DGtIxo29WMuH9i28kU4Yi5%2BqmsSYid%2FMY%2FfJ2Ye26pd1p9T2gi%2BwSoSA%2FsCVxu6GzhC%2BGL%2FtoZntN%2FXrN4XBgqkRyO8DI75bQFzHLEPiQ9PpLsktLdMVveYw5sUwd9x%2BICeUGDal1AbLCVx7iy5SorytqAyTuR%2BicOutaUOiuVxi%2Frgk0rdW%2B%2BdzmCxJ%2B8JqOEJx%2BMSYONSDkMc7zHln8f%2Bqv6Xf6f%2Ff6L%2Bl3%2Bn%2F3%2Bi%2Fpd%2Fp%2F%2B%2FVV9RWKX5AVQ71%2B1Log%2BIvdEWGcbkvjA2xdzuwXKVdruEwCDmx0qVZM8L2S1BnqEOzaSj0vE%2FCMYpeJ5g8Mt8VoMejGDC2ZV%2FbVhjKS54NswXWdWvSCAcUgkkLrMvzS6u5OR92jYbRx8NwV0JvoiCp5yYPSXSgf1g9vSTowXQuDH6LEz9kyKbhqr78OVdgWEaz5ZRBBvIiMqSJQWypmf7IeO9cos69hqv4SN3DFiFe5%2B%2B3UKPtxsNqes0yb7UnICPTJzjWDt%2BoVQLx72Qd89zJGepw0BEtUMkB5x0%2BchYdQxCoQ3kGJSQusjICyRmAWEr39CCxsLiPa3Yc4DDyjM%2B4hes0KYqj5ENwAVG3RbfEodYwKIkEEj5k%2BOF3%2BCpH7ErRfEYfLYYAyb9ofCMzbDjOR4S%2F%2Fvxkh1D%2BMI0DGMw6w%2Fvz%2FnjRuBQhJb%2FZ7TW39D6AdBiPULGBy4%2BGZ0l1eWpAedaGxJKFYIvTlOXM05SiwQSw4M%2BptLvS8iDWwFbOZGR38uspg6ZSaXglKkC1E%2BHiJyGqOCNad5ocFWj8Xgj43ukqy8YChB025fNUx7oih%2FaaSgJEGc23mZGIx9nqT5ltiiXgBx2HIja1%2FZOB971YhbQLF2jwUOm8g3pwaj4Qr%2FN6xC33IwNSIWRZ%2FkUNNWufSrJAT9m8762%2FO08AUI4ziwG6hOkiZxTqUr2JGmtxsONiEI3URZY3l%2BKbR5f4diR91b2%2FuV%2BAHV8FcZGo1nv6HRryBHGaBrUj6zhayWIWO%2BGUGEbsaDc0lJUx99qSW8X3onclywviYCMnO745Zc%2FgX%2BE0r%2BPnn8d%2FD2%2B%2FpjyR%2Br4Iy1xr6kult%2Bf%2Fpanfh%2F4Lb%2F%2Fqqgpl6z81hWV8uqiajqKdKy9AtAAypaf4TptjOlv6dB0AeRJRNLH8UauVSXOTt9Rz563yP5EOdG4%2BMP9FNT%2BbLNLemkRrc5NYCHj4Apy26CgKZmNLM4vYY%2FM1ZFhZXqKByoGJHsV2h4Rk7VD9ExXnvmQp8%2FTt0wIlIZBC8tYljfBGFOJ6Do6%2F2RPTV9YGvtMTLRICNu8wustpA8HcXqTmMMZMvoN3OJjer4Y1%2FrI6id0WehpQsCjRKrrqe7soqhGuYO96g0PgW0alEfMKwxPowttXK30Ku41BGW0ZHWbD%2FoYeVgmMWs7iUtlnu2QN1rSa2UlhE6nWLsQlSaTsyO9PrIEj2b7B1T%2FYup%2FGPoDrH9kNDdu%2F88APqaKHjP1iOGV7WV1CT6Fzeb5C0AVjUvx1hFkamNo3eS1BNarvpvuWJpERZPQXhfVE47EJr9reV%2FcoYa05ey9TEXdCngzIW3XuZdIVUhgNxGo0BidjPlUNEP%2B2F388%2BBoT7qNZTX1KZC47H6UQJM9%2FxAfE6mhsT7FnnJHFX4lF76nYsCaXD8tSJfZZkK7ameTL2oZHq3zvpwu4XWFXl5v29aYPG0e0PpcZ%2BQjlItsPcMm6Ci5hjpjvaatp65NKoB25qieuQGkaCCmNqPmTrHKia6h0Zez0ImNyysD61OAO4R%2B%2BUZFKlpUVesdDGN9k9n8gD%2B4pqN%2B%2BhAbrY%2B6g4TcApMlx4tnB1C3XW7PA%2BwjVim8Rk1JjVgT34e3lkQkccLGAH0oLUFP4pM2fYkUTsKTRxF%2B7RXpLXNT8PlmHOGD5%2BjPnknqqge7KuPN%2BjnKcnyHuvd4hYLD%2BMfEP%2Fi0aUxlnKfyzW1jh6jp3iiSYD6A%2Bn2NF7sB5fy0zkyeRm8x3irt%2Bwoz9tpsiVRp4XRb2D1jb6CPrA%2BQkL046N92Jk2PPisjiFr4zXm8lqbxYQUje2qi65TEx9eypfEAHow5l%2F6T18agSQGfpbo8ArIXQ34u1ICf49G2uypMJpcVG0KXx5Gw%2FqR7DZs3K1NYnsuXXkV76XR1ZqH0llcfHAUlu2ppuezOC9zUh4mPdManoJCvF1d1rE8VH2jgzx5JpxNYmw%2BdohrwLuPm0WLnY%2FAoyh%2BrzHyMXblg44hlAkbEiKcqKuCSDMFGYzLxAB1U2lCu3Xp81oLIkfJKz3Ij97r71Lyu3mCfd%2Fatn6WlWx9OUxaZDODAQBYmxJPepcUFK4WdFV3Xk7bxrA3b9R7Y5O%2Fqna1L9CMAdJKpioe%2FN2eKmc3zGWGIacHbrfequYLdawD3THMzQ6cNXO%2FgoJSYy2n69alsYZRln41lFvC1bN36wa4cE6cVZus2GmRVx3bSIIqCEK7AR0RL21p4JUJGInx9LqNqDbhtNDzj5b65QDDfgNUQ6isciEcsr1W%2FPDbUDd7Fi9Zo%2BjWBui2cITlIueA6L15VcijVLY8OP1NYFnQExvK8bGWPCPIrdMH4rUOZGIjK6Pj1MUfJZQGZK6rdmqDOjGxg%2FcmEqNsZsqRJnu4c9o0tchMfg%2FwSQacGkDcCX1DkDNo7sq3AmOvi6fYsMT%2BCjNLWfFIzJS6R5YWlSGm6iGLE4Z0w3NU5rcknujJsOWiTpYaU56dYEGrKilGhdJP7Nm82hmcdahoh7iYC2NcSDUu25ui1JcvDOsWfYCJS9dIVnFBeYVi1aDigT3zpGonQcH9GC%2BOEAZ3tWDQ0jXfxXKwM1io0dJuxwKUtc1g%2BuzMPAvlNIAIiU7erH064Fu8Uig9P3t605nY2XRRj72TQ9oPWBGmTOikxTXUl7ye10O3oY7JBo2COLTBHMCgVvgy39wFeJik4oCKdVkjlvCRDX9XkWAGJN1haWrGgFea1UwkMRuoKGHEeW3WRgfkKTxm32iwxiTfKfHQq2rUkzdaOQhFkG4OaCI83e5PZjTQvaO%2FX%2FcQep6MYSPVY%2BkIrurFFxL032QTQ2Lw8BCVzaucO885LWYPhIa%2FDefupJgRc5Yy5thX4VS%2BuhcT9IwOkT4DTpjJAdzn08UhOLY69lBV1HCDB6X1fsEHokkRvwcD0KZL%2BakM6985FqBgE6vOo8BvYE%2BEtu%2FNJz31MZZI8dzR%2Fogmtr3ceat4M6%2Bawvpl18FJkpVRopIR1dmw9iYcvwCum%2BVG1vh5bpMgdQQcM5hF5uEoasKqsNk%2BSHySpeSZ%2F8WOTUqi59YAKB4zlpu6rLMuluGO7GG0T%2FYkg63gO8eqnb9C69GybnsBxwmJTeEmP7zWAhviaWJiNtLX%2BKFyOsciFWAoZQ0jrcgUpIdDXDIQSPw5CqlWqQufwMkcRlbjSxQpBks73cZ6eIbRMDESpu4H1N6fAX3U8SXxaJTkpNp95pAkIq12aDtqwBZo7%2FP2IcymvCdLMvVXAGPEMuJ5YYXvLZRIfGkZOjTsyBjfpaQA1qq0GqN%2BAQ%2FTdUvMkl8ZbleY%2BvlI2A4qpudVp0rIDKYNZlKLYU9QSzV7ndymJluFdlN4xQ1Le5qcEw1FjVrhIZsApniz0GtibgnKF5%2BvN8py5FeNn1cx01vc11ABMD2It4ROX7vvdkhWN6qgUPcsYlXptVe86ZvnEGntiDmxfkk3Ne6i9vPHNDTEUOsFYBd4j0tlCeJmGpFsZnZl%2Br7YqhGuiiDJvQE%2BYR7PV73BDkV1dWVM9nzLRTuiBgjiJ05NVYQsKd490Z4M4Cww8Jug64WCCE20VGSCG9UFo%2FjTIMeK%2B%2BiQMHC1FUN622LqZJOmXz3BE%2BNeWdKPHQAoz9zwXEIUlZPGOOV0ZoHo6T2j3ICBiLq5tMgJLn5%2FpYT2x%2FHKZhH551jQr6va%2BFu1lNzQ%2FcNzZBe%2B9skHTyAqMSQt7N8oPHW%2FgM7E0bKFxhH2Yj1UZinIbpXKNpYW58IH2zBct1pWJpXyTK1YDlfXwNO8eJ00PLXBnynf8CgAni4SyDcyAbTFRPh93hblCgb5wx1s%2FdXdHmzpdGJibJjJnzqOUFt4GYfolczF3RsSR509T56f6tNjVPIscUo8zEmprXZ448RCDNiL0M6zJp03me8YvpnlNuRQeT9KjsSoKk9Xo54VJu903cF9ZALlFdISoZsq%2F6CTS1vZmA0HmTNpjm%2FQPHTm49%2By09kls6mHgK%2Fnm8iWDNjASGck4nQx87JQsj9yQBnNzUyiSMQ6Y8i07P2eJm2%2Bwqrt674qDRVbMZ7L6nBwqswuABGQAaEbVl4AomqcKvugo8vTzuek3tS1YFNgsOsa02YN2blX9RD%2BYLMikx4iubMAZcvfarKM4FlicBCWnG2FM81W26Rl1Syw22b3vPiOVILjIfaDGVlyyWSmfB4jSZ14R5bZ9w8SRE0j8qSxq44uP4YmeWVi6IfJpFYujWJwQZ7DcifdU8%2BuJ0PXY%2By8EAm2RFu3eu4y%2BUSdp2boLm9vXIr4mY0ngEU1C6RBAd7M3lOyJkAsCeEdOZHq7z8Kbbp5l3PXVcDZxVr%2FvLrn1jNVO8bIonfok06NGWRuzMTYLH0YkEduiJBFAIjGTioDoU9JAsISQbcoKJFCrJ4NW%2BUQ8qcYz59klqHtTsmJEFMYiKm2tFwdWXYrsoE7tZr591h2xk9H7wHH1eTcdXIXI7AqyyBD0mMMer9nXkKSoPSM01AiGySSrPCXCbDmm3Lr%2ByMjcCKiLNpA7GpxBOSVhYENpLSxRm6B1Cg3jrLAlTrHqfG7eXp%2Fmo9Us0BAeoloPGMLiB1UrCR3hR640Jk25wJjVtX%2BEIXIzn5xF4BesfzY3nB8kKlbVG0KFqb9AOwM6nPLVmnDuiOm0Pjm2slgCnJyU8BnnvqzniXCkZ2FqpSRLBInVTgk%2FlLoeqE08kbf%2FKTDomh5a2yOr9znHvEPog0U1li9LslRyxJWNl0fwL%2FX9OuRrSaJ3NDhTwn1sDX2thMFygliPRgqoVXPCYDdD6RQH8mjoVLokuCO%2Fpb26af%2Foi3PknaxWFFIw1v3zwp2OTA6IOn3sgAeyo4lgGNlcf0nd0i%2Fledbra3otTD2u9VG1Bc%2BUnxcD%2BXQr75%2FYfgmtUUs4H4o0ZprjHMf005TwRX3iLlLdBW0J3hlghzdAXxWRHe9zO5DkEEyNeSfvAvI3LfDyyXYt%2BcGNrK4D%2FLsL4zTweceK7gxhMQMzcuYa6ILjHcwEuo9HgeQCr5tSEi1LqHbaCzs5l7ClClSQxVgJ0wlREZM67Wl%2Bxhdxd2ETwM39rGsvZztSlc%2BLSG0w387dPhRs3S9VdngzBTVnva08Hufq0u%2BtCxAh9pXj8k4ZqihXLoIypZZdYC8QMwscj6%2BzSUaxz%2FxssrLxZA0MpfYwzJQUvlvStA67MwAuA3EdbapgbOFFxDr%2FqEgROQNtq0eIdQLuTgLUKnbYgiRJClGIev5YbB38PgNyAaYrZ40kqZiAMevPaFF0DemgvZgh8dGW%2BdhK3hwpGVr2NKN15dnCCKspkJ3FGLrV1UPrV2W1iuQVl54K3mQH%2FSAVzvjWvAy4JLLiyjiKQGfec2nJkX2SSj6M3gXX08qipBY6NBlbjUm2Q5SRO7sa2247diQG3HbakAB2HHuElnofF%2F%2BU2GBd9yeCO9ETtVxfQlT%2FDpof7PUKYhcwSLJ4bss2B3hwFWgmMPX%2BKFAq5VtY7UD08fTYgGoh6RjgMgOQkCFgeZyG83152LStP9otZgKL56OLyeEoi%2FbmcmTF2g2wSZKovKm3eITbrjdWx8DuQxpb9toQcnw0iPICwn3PObDK86HKo6HiriQbw1cSwFKgBDSj0Pu0WMnxGHMOys%2Faxawn9%2BDuFgzTJHFL9sJka9MWjyM6r2%2BEIYoXSy4sKlSISuzGodxEqd%2BCAMHuV%2BWQKUq%2B%2F0kgyCHENn%2BvQtD4YacEtZG3BRJzzDjrd3tTOuWGfxfxDi%2FZY7H1m5RpTMx96ACU3tsgHsjEbkEKZhB%2B4LqOXFAaFib3OCuxyaR9fPd7M%2FZGkHXVnGIthCieDAGZf58OVufdraJ2c2SaUdG19IlzRaCEziXVQ%2F2BnVcuAe%2B9JFuYvj2po7lKjnipoXfJoY4Ma3eJatNXgK13cUKHrly7U9uAujkbRng6GPcAzDTmDlGCWprRzSDlOcZh9EGi%2BHQM7xJv531pgMRtGqSPILqwHyvmTjUEkBz3nQsXgP3dTEZtzDx4UUkI7NlEawicPpFWKPVW5BqQ5jQmQIbSpgEfA3sJrtnIYMwr9R2%2FS%2FHjlek2WzAlbFBN%2FYxmii13w%2Fdu19b5d9nQ11LnFvAYr8%2FoVblYNeuME0LGtk1%2FoazcKo7nLjcTfWxV10%2F2iAUbGt%2BtdM9m3duLjaOI72a0qe1rNn%2BGD%2FER6fC4mNkxADo%2FpZCX7718Ns%2B6HNbn4dX6UMazDSISLUFWA42rJsa56KuVrj7oqwqlmQdzPzBlS7mb95%2FnpSAEVXfZBQx4i%2BkhcHWSvJJ7Y233bdLWOlT80TWnLlnFIqaX4gtzFq%2BxdbH0kVoz%2F8gonRFRRJ11SA0eUf2Sgo0Y3Mf12VD4RBH7LhHLafCYbXLe1FDkYI9ZfNI9WI5tkMcd0F%2FF3JoaPhPgSUcDvRKqY%2Bq4W9ApKat42lX8%2FnFlAJT9t7PybxF1Lnxm1tGTgPWwTcjgzRkR6alI4ktzb2%2BQ%2B2Rp4jcYLESeEjPMf1RJAQqZ82KHoiiFLkCQH1NeUm06edss7uWpkZFBprz7MmTANni%2BNVaZy7GK7uuCDBxrxTAcbY5W1cxPCLOw6C58SPqhDNHdBKnL8MliRoCl%2BA6lJLrcTXqXjDUes0ZI9MGZ3P2mfH8uoOvf%2FUsxIG1yNcWXKGfEy%2FzhWCH%2BacH0Va6IwqNWNuyPanFFHZtqC8idEfC715483pzZ6TI1EhwVAt47gRWIgFkHJijm%2BdEhqn6kb3pKX8X2Li98sYatBFeGovV8rwitlwUkDMlgJ2zngWKfVuvtEJhUQHgEkFZLp5tfCK5pFpMzZtcOCfRRwvD10axKF6yNu%2BPpNb863Er1%2FGWZomw5ETEW8rLSC00eON8COlqwb3uw8qCqCgxQNnh4J97NJaE3xehpMdBgC8t05D80KYPNcF%2FIZVY4g%2BvQPC0KG4VIa9UZwkdy2W6laTo77LAP5RTGYdH6l7eZhS3XsLsb5OvZyQGCkEm%2BAp%2FKinB6bVytT1n0TgCKGoHOyT2eYEIUOLUC6NWzJPS4r4u4XvJTA7RnWq7bNKDvaqAa6JtFPKEjOHNkU5UlAMxl7gmJbRQMqK4ehJFXl0zda1kIRoH1l60YJVmZfjbyivV6PqeaU0HQxJEWB4LAUveGIAXvDUY0x0ZvrZW121%2FG2idVV7OTuL%2FPsbfVzxzGrySQ%2BUW0RFQAD02PvRXPuaPl83g3BdsujsE4xwD3X%2BJoR9juHfnLP7Bw51PabgVDJHN9DyFILEuglxvNUepujsScPS9vchSSYcv7PqD9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=G3Q%2BjzFaEwmal2YdOPC%2FnOr%2B60CpKL%2BgfE15Zqb9HPkaFGMGvJnJXTTJZnq%2Fk39%2BdxYr%2B%2BGxURMn%0AvQiCxIoQJALN06iIEMPVr6Ihvp%2BYBCmTxfJenbiJpr1eUUQL4fC7qmZ8xWWbuX4z882omXpcpwyJ%0A7KBZaimyq%2FRkTy4QazvrfldEuPj5x0DpDkKOVoxjZQIUn5155U%2FS1Wyb%2BUNnAoSx4vELycvxs8zj%0A1C4O189P9kDa3VkJd7CwF%2B7neTofd1L5jQBqB1JeaSgFyNhMLZ0FcUSymVM1wNbeLuvbfcSpFhCC%0AWbzr3rlL8O%2BSs1nMZcebHBrYOz7xiuhIWl8mcA%3D%3D"
842
network    2018.06.05 15:02:02.204   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Cache-Control": "no-cache, no-store"
843
network    2018.06.05 15:02:02.204   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Pragma": "no-cache"
844
network    2018.06.05 15:02:02.204   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Content-Length": "0"
845
network    2018.06.05 15:02:02.204   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Date": "Tue, 05 Jun 2018 13:02:01 GMT"
846
network    2018.06.05 15:02:02.205   UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46)                : SOP-Check( "https://eid-prod.verwalt-berlin.de:8443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= false
847
default    2018.06.05 15:02:02.205   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:291) : SOP-Check failed, continue process
848
default    2018.06.05 15:02:02.205   ...shAddress::sendGetRequest(core/states/StateCheckRefreshAddress.cpp:133) : Send GET request to URL:  "https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1omGhJc1NIlWCSRfv1R3j7bZe%2B%2FYtXzKIMIJ9%2BPhftyDP%2F357Luf9mJZX%2BPwy1f4Z%2BjrT8WQjflrqH756nviN%2Brrn3%2F905r0HTJ9d4p1Goe1%2BOleNKzffx%2F95et7Gb6Pyfpavw9JX6zft%2By7yxj6d%2BRn6Pu0jNuYjd3Xn%2Fhi3V5Dsv32onrbpvU7CBav%2FNs9Jf85G4ehyLaf760cSbd9S4ulew0%2F5wXIvoulKhZtHLYxLFLwh2inyIrXXrjFsnfF9ue1WH%2FsX8l%2FgcgUzlCa%2BpZlJPkNS2nkGw0hybciz8uUJoqUQMqvPyn8L1%2FzIi2T7H4EQWV2z0TxbymFlN8gEk1wNCuIMsPvmcNfdPbGX77%2Bd1qgJVKW6DcYSpBvGJXR31KUzL4RCEyTEAohJVTci9b1XSjDuiXD9stXBIKpbxDxDcI9GP0OId8h%2BGeCwuKvPwV%2FMfttqK9%2FGPn7b4uXv7fw%2F27gZF2L5YdRv%2F76V2P%2BixH%2FBP6G1R%2FC%2F4qnuyXbe%2F2nv9yYFz8FSfcu%2FvcX3%2Brdi7%2B77yy7zf8V%2FPWPl0zf%2F0Hsd2HIls%2B0FTnzl53%2BR8r96bz98m%2FC%2BGRL%2FpDz48HvHnU71HEcPx%2Foz%2BNSgQgEwSCEgbez3jP%2B68YlvyGEyiJJioxC7l9GJUVRkCRNwkWGUCmZoujXn7zPdKv%2Bf5QndEVfDNsN3N%2Fv7AbCKLZ6zH9iumpcXlvd%2F1%2FISooVRm6nTbMfdszX71rxUYZy%2FEPDfP03MiAQon%2Fol6%2Bv6r%2F%2BaSdFfgv5XWcMh1AExnIMhfGMxrPbZTMcT9AMxm9bpNT%2FFx2WNfkG%2Fzf%2Bjwr8pswTh%2BgfeP31D%2FfDY8tXlmzFr4ai8BfPccziVsyhsEylcIxtHLwdqdoYK%2FWePRhb0FmbOap4PLmLUdnqEbBM5DGtIxo29WMuH9i28kU4Yi5%2BqmsSYid%2FMY%2FfJ2Ye26pd1p9T2gi%2BwSoSA%2FsCVxu6GzhC%2BGL%2FtoZntN%2FXrN4XBgqkRyO8DI75bQFzHLEPiQ9PpLsktLdMVveYw5sUwd9x%2BICeUGDal1AbLCVx7iy5SorytqAyTuR%2BicOutaUOiuVxi%2Frgk0rdW%2B%2BdzmCxJ%2B8JqOEJx%2BMSYONSDkMc7zHln8f%2Bqv6Xf6f%2Ff6L%2Bl3%2Bn%2F3%2Bi%2Fpd%2Fp%2F%2B%2FVV9RWKX5AVQ71%2B1Log%2BIvdEWGcbkvjA2xdzuwXKVdruEwCDmx0qVZM8L2S1BnqEOzaSj0vE%2FCMYpeJ5g8Mt8VoMejGDC2ZV%2FbVhjKS54NswXWdWvSCAcUgkkLrMvzS6u5OR92jYbRx8NwV0JvoiCp5yYPSXSgf1g9vSTowXQuDH6LEz9kyKbhqr78OVdgWEaz5ZRBBvIiMqSJQWypmf7IeO9cos69hqv4SN3DFiFe5%2B%2B3UKPtxsNqes0yb7UnICPTJzjWDt%2BoVQLx72Qd89zJGepw0BEtUMkB5x0%2BchYdQxCoQ3kGJSQusjICyRmAWEr39CCxsLiPa3Yc4DDyjM%2B4hes0KYqj5ENwAVG3RbfEodYwKIkEEj5k%2BOF3%2BCpH7ErRfEYfLYYAyb9ofCMzbDjOR4S%2F%2Fvxkh1D%2BMI0DGMw6w%2Fvz%2FnjRuBQhJb%2FZ7TW39D6AdBiPULGBy4%2BGZ0l1eWpAedaGxJKFYIvTlOXM05SiwQSw4M%2BptLvS8iDWwFbOZGR38uspg6ZSaXglKkC1E%2BHiJyGqOCNad5ocFWj8Xgj43ukqy8YChB025fNUx7oih%2FaaSgJEGc23mZGIx9nqT5ltiiXgBx2HIja1%2FZOB971YhbQLF2jwUOm8g3pwaj4Qr%2FN6xC33IwNSIWRZ%2FkUNNWufSrJAT9m8762%2FO08AUI4ziwG6hOkiZxTqUr2JGmtxsONiEI3URZY3l%2BKbR5f4diR91b2%2FuV%2BAHV8FcZGo1nv6HRryBHGaBrUj6zhayWIWO%2BGUGEbsaDc0lJUx99qSW8X3onclywviYCMnO745Zc%2FgX%2BE0r%2BPnn8d%2FD2%2B%2FpjyR%2Br4Iy1xr6kult%2Bf%2Fpanfh%2F4Lb%2F%2Fqqgpl6z81hWV8uqiajqKdKy9AtAAypaf4TptjOlv6dB0AeRJRNLH8UauVSXOTt9Rz563yP5EOdG4%2BMP9FNT%2BbLNLemkRrc5NYCHj4Apy26CgKZmNLM4vYY%2FM1ZFhZXqKByoGJHsV2h4Rk7VD9ExXnvmQp8%2FTt0wIlIZBC8tYljfBGFOJ6Do6%2F2RPTV9YGvtMTLRICNu8wustpA8HcXqTmMMZMvoN3OJjer4Y1%2FrI6id0WehpQsCjRKrrqe7soqhGuYO96g0PgW0alEfMKwxPowttXK30Ku41BGW0ZHWbD%2FoYeVgmMWs7iUtlnu2QN1rSa2UlhE6nWLsQlSaTsyO9PrIEj2b7B1T%2FYup%2FGPoDrH9kNDdu%2F88APqaKHjP1iOGV7WV1CT6Fzeb5C0AVjUvx1hFkamNo3eS1BNarvpvuWJpERZPQXhfVE47EJr9reV%2FcoYa05ey9TEXdCngzIW3XuZdIVUhgNxGo0BidjPlUNEP%2B2F388%2BBoT7qNZTX1KZC47H6UQJM9%2FxAfE6mhsT7FnnJHFX4lF76nYsCaXD8tSJfZZkK7ameTL2oZHq3zvpwu4XWFXl5v29aYPG0e0PpcZ%2BQjlItsPcMm6Ci5hjpjvaatp65NKoB25qieuQGkaCCmNqPmTrHKia6h0Zez0ImNyysD61OAO4R%2B%2BUZFKlpUVesdDGN9k9n8gD%2B4pqN%2B%2BhAbrY%2B6g4TcApMlx4tnB1C3XW7PA%2BwjVim8Rk1JjVgT34e3lkQkccLGAH0oLUFP4pM2fYkUTsKTRxF%2B7RXpLXNT8PlmHOGD5%2BjPnknqqge7KuPN%2BjnKcnyHuvd4hYLD%2BMfEP%2Fi0aUxlnKfyzW1jh6jp3iiSYD6A%2Bn2NF7sB5fy0zkyeRm8x3irt%2Bwoz9tpsiVRp4XRb2D1jb6CPrA%2BQkL046N92Jk2PPisjiFr4zXm8lqbxYQUje2qi65TEx9eypfEAHow5l%2F6T18agSQGfpbo8ArIXQ34u1ICf49G2uypMJpcVG0KXx5Gw%2FqR7DZs3K1NYnsuXXkV76XR1ZqH0llcfHAUlu2ppuezOC9zUh4mPdManoJCvF1d1rE8VH2jgzx5JpxNYmw%2BdohrwLuPm0WLnY%2FAoyh%2BrzHyMXblg44hlAkbEiKcqKuCSDMFGYzLxAB1U2lCu3Xp81oLIkfJKz3Ij97r71Lyu3mCfd%2Fatn6WlWx9OUxaZDODAQBYmxJPepcUFK4WdFV3Xk7bxrA3b9R7Y5O%2Fqna1L9CMAdJKpioe%2FN2eKmc3zGWGIacHbrfequYLdawD3THMzQ6cNXO%2FgoJSYy2n69alsYZRln41lFvC1bN36wa4cE6cVZus2GmRVx3bSIIqCEK7AR0RL21p4JUJGInx9LqNqDbhtNDzj5b65QDDfgNUQ6isciEcsr1W%2FPDbUDd7Fi9Zo%2BjWBui2cITlIueA6L15VcijVLY8OP1NYFnQExvK8bGWPCPIrdMH4rUOZGIjK6Pj1MUfJZQGZK6rdmqDOjGxg%2FcmEqNsZsqRJnu4c9o0tchMfg%2FwSQacGkDcCX1DkDNo7sq3AmOvi6fYsMT%2BCjNLWfFIzJS6R5YWlSGm6iGLE4Z0w3NU5rcknujJsOWiTpYaU56dYEGrKilGhdJP7Nm82hmcdahoh7iYC2NcSDUu25ui1JcvDOsWfYCJS9dIVnFBeYVi1aDigT3zpGonQcH9GC%2BOEAZ3tWDQ0jXfxXKwM1io0dJuxwKUtc1g%2BuzMPAvlNIAIiU7erH064Fu8Uig9P3t605nY2XRRj72TQ9oPWBGmTOikxTXUl7ye10O3oY7JBo2COLTBHMCgVvgy39wFeJik4oCKdVkjlvCRDX9XkWAGJN1haWrGgFea1UwkMRuoKGHEeW3WRgfkKTxm32iwxiTfKfHQq2rUkzdaOQhFkG4OaCI83e5PZjTQvaO%2FX%2FcQep6MYSPVY%2BkIrurFFxL032QTQ2Lw8BCVzaucO885LWYPhIa%2FDefupJgRc5Yy5thX4VS%2BuhcT9IwOkT4DTpjJAdzn08UhOLY69lBV1HCDB6X1fsEHokkRvwcD0KZL%2BakM6985FqBgE6vOo8BvYE%2BEtu%2FNJz31MZZI8dzR%2Fogmtr3ceat4M6%2Bawvpl18FJkpVRopIR1dmw9iYcvwCum%2BVG1vh5bpMgdQQcM5hF5uEoasKqsNk%2BSHySpeSZ%2F8WOTUqi59YAKB4zlpu6rLMuluGO7GG0T%2FYkg63gO8eqnb9C69GybnsBxwmJTeEmP7zWAhviaWJiNtLX%2BKFyOsciFWAoZQ0jrcgUpIdDXDIQSPw5CqlWqQufwMkcRlbjSxQpBks73cZ6eIbRMDESpu4H1N6fAX3U8SXxaJTkpNp95pAkIq12aDtqwBZo7%2FP2IcymvCdLMvVXAGPEMuJ5YYXvLZRIfGkZOjTsyBjfpaQA1qq0GqN%2BAQ%2FTdUvMkl8ZbleY%2BvlI2A4qpudVp0rIDKYNZlKLYU9QSzV7ndymJluFdlN4xQ1Le5qcEw1FjVrhIZsApniz0GtibgnKF5%2BvN8py5FeNn1cx01vc11ABMD2It4ROX7vvdkhWN6qgUPcsYlXptVe86ZvnEGntiDmxfkk3Ne6i9vPHNDTEUOsFYBd4j0tlCeJmGpFsZnZl%2Br7YqhGuiiDJvQE%2BYR7PV73BDkV1dWVM9nzLRTuiBgjiJ05NVYQsKd490Z4M4Cww8Jug64WCCE20VGSCG9UFo%2FjTIMeK%2B%2BiQMHC1FUN622LqZJOmXz3BE%2BNeWdKPHQAoz9zwXEIUlZPGOOV0ZoHo6T2j3ICBiLq5tMgJLn5%2FpYT2x%2FHKZhH551jQr6va%2BFu1lNzQ%2FcNzZBe%2B9skHTyAqMSQt7N8oPHW%2FgM7E0bKFxhH2Yj1UZinIbpXKNpYW58IH2zBct1pWJpXyTK1YDlfXwNO8eJ00PLXBnynf8CgAni4SyDcyAbTFRPh93hblCgb5wx1s%2FdXdHmzpdGJibJjJnzqOUFt4GYfolczF3RsSR509T56f6tNjVPIscUo8zEmprXZ448RCDNiL0M6zJp03me8YvpnlNuRQeT9KjsSoKk9Xo54VJu903cF9ZALlFdISoZsq%2F6CTS1vZmA0HmTNpjm%2FQPHTm49%2By09kls6mHgK%2Fnm8iWDNjASGck4nQx87JQsj9yQBnNzUyiSMQ6Y8i07P2eJm2%2Bwqrt674qDRVbMZ7L6nBwqswuABGQAaEbVl4AomqcKvugo8vTzuek3tS1YFNgsOsa02YN2blX9RD%2BYLMikx4iubMAZcvfarKM4FlicBCWnG2FM81W26Rl1Syw22b3vPiOVILjIfaDGVlyyWSmfB4jSZ14R5bZ9w8SRE0j8qSxq44uP4YmeWVi6IfJpFYujWJwQZ7DcifdU8%2BuJ0PXY%2By8EAm2RFu3eu4y%2BUSdp2boLm9vXIr4mY0ngEU1C6RBAd7M3lOyJkAsCeEdOZHq7z8Kbbp5l3PXVcDZxVr%2FvLrn1jNVO8bIonfok06NGWRuzMTYLH0YkEduiJBFAIjGTioDoU9JAsISQbcoKJFCrJ4NW%2BUQ8qcYz59klqHtTsmJEFMYiKm2tFwdWXYrsoE7tZr591h2xk9H7wHH1eTcdXIXI7AqyyBD0mMMer9nXkKSoPSM01AiGySSrPCXCbDmm3Lr%2ByMjcCKiLNpA7GpxBOSVhYENpLSxRm6B1Cg3jrLAlTrHqfG7eXp%2Fmo9Us0BAeoloPGMLiB1UrCR3hR640Jk25wJjVtX%2BEIXIzn5xF4BesfzY3nB8kKlbVG0KFqb9AOwM6nPLVmnDuiOm0Pjm2slgCnJyU8BnnvqzniXCkZ2FqpSRLBInVTgk%2FlLoeqE08kbf%2FKTDomh5a2yOr9znHvEPog0U1li9LslRyxJWNl0fwL%2FX9OuRrSaJ3NDhTwn1sDX2thMFygliPRgqoVXPCYDdD6RQH8mjoVLokuCO%2Fpb26af%2Foi3PknaxWFFIw1v3zwp2OTA6IOn3sgAeyo4lgGNlcf0nd0i%2Fledbra3otTD2u9VG1Bc%2BUnxcD%2BXQr75%2FYfgmtUUs4H4o0ZprjHMf005TwRX3iLlLdBW0J3hlghzdAXxWRHe9zO5DkEEyNeSfvAvI3LfDyyXYt%2BcGNrK4D%2FLsL4zTweceK7gxhMQMzcuYa6ILjHcwEuo9HgeQCr5tSEi1LqHbaCzs5l7ClClSQxVgJ0wlREZM67Wl%2Bxhdxd2ETwM39rGsvZztSlc%2BLSG0w387dPhRs3S9VdngzBTVnva08Hufq0u%2BtCxAh9pXj8k4ZqihXLoIypZZdYC8QMwscj6%2BzSUaxz%2FxssrLxZA0MpfYwzJQUvlvStA67MwAuA3EdbapgbOFFxDr%2FqEgROQNtq0eIdQLuTgLUKnbYgiRJClGIev5YbB38PgNyAaYrZ40kqZiAMevPaFF0DemgvZgh8dGW%2BdhK3hwpGVr2NKN15dnCCKspkJ3FGLrV1UPrV2W1iuQVl54K3mQH%2FSAVzvjWvAy4JLLiyjiKQGfec2nJkX2SSj6M3gXX08qipBY6NBlbjUm2Q5SRO7sa2247diQG3HbakAB2HHuElnofF%2F%2BU2GBd9yeCO9ETtVxfQlT%2FDpof7PUKYhcwSLJ4bss2B3hwFWgmMPX%2BKFAq5VtY7UD08fTYgGoh6RjgMgOQkCFgeZyG83152LStP9otZgKL56OLyeEoi%2FbmcmTF2g2wSZKovKm3eITbrjdWx8DuQxpb9toQcnw0iPICwn3PObDK86HKo6HiriQbw1cSwFKgBDSj0Pu0WMnxGHMOys%2Faxawn9%2BDuFgzTJHFL9sJka9MWjyM6r2%2BEIYoXSy4sKlSISuzGodxEqd%2BCAMHuV%2BWQKUq%2B%2F0kgyCHENn%2BvQtD4YacEtZG3BRJzzDjrd3tTOuWGfxfxDi%2FZY7H1m5RpTMx96ACU3tsgHsjEbkEKZhB%2B4LqOXFAaFib3OCuxyaR9fPd7M%2FZGkHXVnGIthCieDAGZf58OVufdraJ2c2SaUdG19IlzRaCEziXVQ%2F2BnVcuAe%2B9JFuYvj2po7lKjnipoXfJoY4Ma3eJatNXgK13cUKHrly7U9uAujkbRng6GPcAzDTmDlGCWprRzSDlOcZh9EGi%2BHQM7xJv531pgMRtGqSPILqwHyvmTjUEkBz3nQsXgP3dTEZtzDx4UUkI7NlEawicPpFWKPVW5BqQ5jQmQIbSpgEfA3sJrtnIYMwr9R2%2FS%2FHjlek2WzAlbFBN%2FYxmii13w%2Fdu19b5d9nQ11LnFvAYr8%2FoVblYNeuME0LGtk1%2FoazcKo7nLjcTfWxV10%2F2iAUbGt%2BtdM9m3duLjaOI72a0qe1rNn%2BGD%2FER6fC4mNkxADo%2FpZCX7718Ns%2B6HNbn4dX6UMazDSISLUFWA42rJsa56KuVrj7oqwqlmQdzPzBlS7mb95%2FnpSAEVXfZBQx4i%2BkhcHWSvJJ7Y233bdLWOlT80TWnLlnFIqaX4gtzFq%2BxdbH0kVoz%2F8gonRFRRJ11SA0eUf2Sgo0Y3Mf12VD4RBH7LhHLafCYbXLe1FDkYI9ZfNI9WI5tkMcd0F%2FF3JoaPhPgSUcDvRKqY%2Bq4W9ApKat42lX8%2FnFlAJT9t7PybxF1Lnxm1tGTgPWwTcjgzRkR6alI4ktzb2%2BQ%2B2Rp4jcYLESeEjPMf1RJAQqZ82KHoiiFLkCQH1NeUm06edss7uWpkZFBprz7MmTANni%2BNVaZy7GK7uuCDBxrxTAcbY5W1cxPCLOw6C58SPqhDNHdBKnL8MliRoCl%2BA6lJLrcTXqXjDUes0ZI9MGZ3P2mfH8uoOvf%2FUsxIG1yNcWXKGfEy%2FzhWCH%2BacH0Va6IwqNWNuyPanFFHZtqC8idEfC715483pzZ6TI1EhwVAt47gRWIgFkHJijm%2BdEhqn6kb3pKX8X2Li98sYatBFeGovV8rwitlwUkDMlgJ2zngWKfVuvtEJhUQHgEkFZLp5tfCK5pFpMzZtcOCfRRwvD10axKF6yNu%2BPpNb863Er1%2FGWZomw5ETEW8rLSC00eON8COlqwb3uw8qCqCgxQNnh4J97NJaE3xehpMdBgC8t05D80KYPNcF%2FIZVY4g%2BvQPC0KG4VIa9UZwkdy2W6laTo77LAP5RTGYdH6l7eZhS3XsLsb5OvZyQGCkEm%2BAp%2FKinB6bVytT1n0TgCKGoHOyT2eYEIUOLUC6NWzJPS4r4u4XvJTA7RnWq7bNKDvaqAa6JtFPKEjOHNkU5UlAMxl7gmJbRQMqK4ehJFXl0zda1kIRoH1l60YJVmZfjbyivV6PqeaU0HQxJEWB4LAUveGIAXvDUY0x0ZvrZW121%2FG2idVV7OTuL%2FPsbfVzxzGrySQ%2BUW0RFQAD02PvRXPuaPl83g3BdsujsE4xwD3X%2BJoR9juHfnLP7Bw51PabgVDJHN9DyFILEuglxvNUepujsScPS9vchSSYcv7PqD9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=G3Q%2BjzFaEwmal2YdOPC%2FnOr%2B60CpKL%2BgfE15Zqb9HPkaFGMGvJnJXTTJZnq%2Fk39%2BdxYr%2B%2BGxURMn%0AvQiCxIoQJALN06iIEMPVr6Ihvp%2BYBCmTxfJenbiJpr1eUUQL4fC7qmZ8xWWbuX4z882omXpcpwyJ%0A7KBZaimyq%2FRkTy4QazvrfldEuPj5x0DpDkKOVoxjZQIUn5155U%2FS1Wyb%2BUNnAoSx4vELycvxs8zj%0A1C4O189P9kDa3VkJd7CwF%2B7neTofd1L5jQBqB1JeaSgFyNhMLZ0FcUSymVM1wNbeLuvbfcSpFhCC%0AWbzr3rlL8O%2BSs1nMZcebHBrYOz7xiuhIWl8mcA%3D%3D"
849
network    2018.06.05 15:02:02.205   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "eid-prod.connect.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1omGhJc1NIlWCSRfv1R3j7bZe%2B%2FYtXzKIMIJ9%2BPhftyDP%2F357Luf9mJZX%2BPwy1f4Z%2BjrT8WQjflrqH756nviN%2Brrn3%2F905r0HTJ9d4p1Goe1%2BOleNKzffx%2F95et7Gb6Pyfpavw9JX6zft%2By7yxj6d%2BRn6Pu0jNuYjd3Xn%2Fhi3V5Dsv32onrbpvU7CBav%2FNs9Jf85G4ehyLaf760cSbd9S4ulew0%2F5wXIvoulKhZtHLYxLFLwh2inyIrXXrjFsnfF9ue1WH%2FsX8l%2FgcgUzlCa%2BpZlJPkNS2nkGw0hybciz8uUJoqUQMqvPyn8L1%2FzIi2T7H4EQWV2z0TxbymFlN8gEk1wNCuIMsPvmcNfdPbGX77%2Bd1qgJVKW6DcYSpBvGJXR31KUzL4RCEyTEAohJVTci9b1XSjDuiXD9stXBIKpbxDxDcI9GP0OId8h%2BGeCwuKvPwV%2FMfttqK9%2FGPn7b4uXv7fw%2F27gZF2L5YdRv%2F76V2P%2BixH%2FBP6G1R%2FC%2F4qnuyXbe%2F2nv9yYFz8FSfcu%2FvcX3%2Brdi7%2B77yy7zf8V%2FPWPl0zf%2F0Hsd2HIls%2B0FTnzl53%2BR8r96bz98m%2FC%2BGRL%2FpDz48HvHnU71HEcPx%2Foz%2BNSgQgEwSCEgbez3jP%2B68YlvyGEyiJJioxC7l9GJUVRkCRNwkWGUCmZoujXn7zPdKv%2Bf5QndEVfDNsN3N%2Fv7AbCKLZ6zH9iumpcXlvd%2F1%2FISooVRm6nTbMfdszX71rxUYZy%2FEPDfP03MiAQon%2Fol6%2Bv6r%2F%2BaSdFfgv5XWcMh1AExnIMhfGMxrPbZTMcT9AMxm9bpNT%2FFx2WNfkG%2Fzf%2Bjwr8pswTh%2BgfeP31D%2FfDY8tXlmzFr4ai8BfPccziVsyhsEylcIxtHLwdqdoYK%2FWePRhb0FmbOap4PLmLUdnqEbBM5DGtIxo29WMuH9i28kU4Yi5%2BqmsSYid%2FMY%2FfJ2Ye26pd1p9T2gi%2BwSoSA%2FsCVxu6GzhC%2BGL%2FtoZntN%2FXrN4XBgqkRyO8DI75bQFzHLEPiQ9PpLsktLdMVveYw5sUwd9x%2BICeUGDal1AbLCVx7iy5SorytqAyTuR%2BicOutaUOiuVxi%2Frgk0rdW%2B%2BdzmCxJ%2B8JqOEJx%2BMSYONSDkMc7zHln8f%2Bqv6Xf6f%2Ff6L%2Bl3%2Bn%2F3%2Bi%2Fpd%2Fp%2F%2B%2FVV9RWKX5AVQ71%2B1Log%2BIvdEWGcbkvjA2xdzuwXKVdruEwCDmx0qVZM8L2S1BnqEOzaSj0vE%2FCMYpeJ5g8Mt8VoMejGDC2ZV%2FbVhjKS54NswXWdWvSCAcUgkkLrMvzS6u5OR92jYbRx8NwV0JvoiCp5yYPSXSgf1g9vSTowXQuDH6LEz9kyKbhqr78OVdgWEaz5ZRBBvIiMqSJQWypmf7IeO9cos69hqv4SN3DFiFe5%2B%2B3UKPtxsNqes0yb7UnICPTJzjWDt%2BoVQLx72Qd89zJGepw0BEtUMkB5x0%2BchYdQxCoQ3kGJSQusjICyRmAWEr39CCxsLiPa3Yc4DDyjM%2B4hes0KYqj5ENwAVG3RbfEodYwKIkEEj5k%2BOF3%2BCpH7ErRfEYfLYYAyb9ofCMzbDjOR4S%2F%2Fvxkh1D%2BMI0DGMw6w%2Fvz%2FnjRuBQhJb%2FZ7TW39D6AdBiPULGBy4%2BGZ0l1eWpAedaGxJKFYIvTlOXM05SiwQSw4M%2BptLvS8iDWwFbOZGR38uspg6ZSaXglKkC1E%2BHiJyGqOCNad5ocFWj8Xgj43ukqy8YChB025fNUx7oih%2FaaSgJEGc23mZGIx9nqT5ltiiXgBx2HIja1%2FZOB971YhbQLF2jwUOm8g3pwaj4Qr%2FN6xC33IwNSIWRZ%2FkUNNWufSrJAT9m8762%2FO08AUI4ziwG6hOkiZxTqUr2JGmtxsONiEI3URZY3l%2BKbR5f4diR91b2%2FuV%2BAHV8FcZGo1nv6HRryBHGaBrUj6zhayWIWO%2BGUGEbsaDc0lJUx99qSW8X3onclywviYCMnO745Zc%2FgX%2BE0r%2BPnn8d%2FD2%2B%2FpjyR%2Br4Iy1xr6kult%2Bf%2Fpanfh%2F4Lb%2F%2Fqqgpl6z81hWV8uqiajqKdKy9AtAAypaf4TptjOlv6dB0AeRJRNLH8UauVSXOTt9Rz563yP5EOdG4%2BMP9FNT%2BbLNLemkRrc5NYCHj4Apy26CgKZmNLM4vYY%2FM1ZFhZXqKByoGJHsV2h4Rk7VD9ExXnvmQp8%2FTt0wIlIZBC8tYljfBGFOJ6Do6%2F2RPTV9YGvtMTLRICNu8wustpA8HcXqTmMMZMvoN3OJjer4Y1%2FrI6id0WehpQsCjRKrrqe7soqhGuYO96g0PgW0alEfMKwxPowttXK30Ku41BGW0ZHWbD%2FoYeVgmMWs7iUtlnu2QN1rSa2UlhE6nWLsQlSaTsyO9PrIEj2b7B1T%2FYup%2FGPoDrH9kNDdu%2F88APqaKHjP1iOGV7WV1CT6Fzeb5C0AVjUvx1hFkamNo3eS1BNarvpvuWJpERZPQXhfVE47EJr9reV%2FcoYa05ey9TEXdCngzIW3XuZdIVUhgNxGo0BidjPlUNEP%2B2F388%2BBoT7qNZTX1KZC47H6UQJM9%2FxAfE6mhsT7FnnJHFX4lF76nYsCaXD8tSJfZZkK7ameTL2oZHq3zvpwu4XWFXl5v29aYPG0e0PpcZ%2BQjlItsPcMm6Ci5hjpjvaatp65NKoB25qieuQGkaCCmNqPmTrHKia6h0Zez0ImNyysD61OAO4R%2B%2BUZFKlpUVesdDGN9k9n8gD%2B4pqN%2B%2BhAbrY%2B6g4TcApMlx4tnB1C3XW7PA%2BwjVim8Rk1JjVgT34e3lkQkccLGAH0oLUFP4pM2fYkUTsKTRxF%2B7RXpLXNT8PlmHOGD5%2BjPnknqqge7KuPN%2BjnKcnyHuvd4hYLD%2BMfEP%2Fi0aUxlnKfyzW1jh6jp3iiSYD6A%2Bn2NF7sB5fy0zkyeRm8x3irt%2Bwoz9tpsiVRp4XRb2D1jb6CPrA%2BQkL046N92Jk2PPisjiFr4zXm8lqbxYQUje2qi65TEx9eypfEAHow5l%2F6T18agSQGfpbo8ArIXQ34u1ICf49G2uypMJpcVG0KXx5Gw%2FqR7DZs3K1NYnsuXXkV76XR1ZqH0llcfHAUlu2ppuezOC9zUh4mPdManoJCvF1d1rE8VH2jgzx5JpxNYmw%2BdohrwLuPm0WLnY%2FAoyh%2BrzHyMXblg44hlAkbEiKcqKuCSDMFGYzLxAB1U2lCu3Xp81oLIkfJKz3Ij97r71Lyu3mCfd%2Fatn6WlWx9OUxaZDODAQBYmxJPepcUFK4WdFV3Xk7bxrA3b9R7Y5O%2Fqna1L9CMAdJKpioe%2FN2eKmc3zGWGIacHbrfequYLdawD3THMzQ6cNXO%2FgoJSYy2n69alsYZRln41lFvC1bN36wa4cE6cVZus2GmRVx3bSIIqCEK7AR0RL21p4JUJGInx9LqNqDbhtNDzj5b65QDDfgNUQ6isciEcsr1W%2FPDbUDd7Fi9Zo%2BjWBui2cITlIueA6L15VcijVLY8OP1NYFnQExvK8bGWPCPIrdMH4rUOZGIjK6Pj1MUfJZQGZK6rdmqDOjGxg%2FcmEqNsZsqRJnu4c9o0tchMfg%2FwSQacGkDcCX1DkDNo7sq3AmOvi6fYsMT%2BCjNLWfFIzJS6R5YWlSGm6iGLE4Z0w3NU5rcknujJsOWiTpYaU56dYEGrKilGhdJP7Nm82hmcdahoh7iYC2NcSDUu25ui1JcvDOsWfYCJS9dIVnFBeYVi1aDigT3zpGonQcH9GC%2BOEAZ3tWDQ0jXfxXKwM1io0dJuxwKUtc1g%2BuzMPAvlNIAIiU7erH064Fu8Uig9P3t605nY2XRRj72TQ9oPWBGmTOikxTXUl7ye10O3oY7JBo2COLTBHMCgVvgy39wFeJik4oCKdVkjlvCRDX9XkWAGJN1haWrGgFea1UwkMRuoKGHEeW3WRgfkKTxm32iwxiTfKfHQq2rUkzdaOQhFkG4OaCI83e5PZjTQvaO%2FX%2FcQep6MYSPVY%2BkIrurFFxL032QTQ2Lw8BCVzaucO885LWYPhIa%2FDefupJgRc5Yy5thX4VS%2BuhcT9IwOkT4DTpjJAdzn08UhOLY69lBV1HCDB6X1fsEHokkRvwcD0KZL%2BakM6985FqBgE6vOo8BvYE%2BEtu%2FNJz31MZZI8dzR%2Fogmtr3ceat4M6%2Bawvpl18FJkpVRopIR1dmw9iYcvwCum%2BVG1vh5bpMgdQQcM5hF5uEoasKqsNk%2BSHySpeSZ%2F8WOTUqi59YAKB4zlpu6rLMuluGO7GG0T%2FYkg63gO8eqnb9C69GybnsBxwmJTeEmP7zWAhviaWJiNtLX%2BKFyOsciFWAoZQ0jrcgUpIdDXDIQSPw5CqlWqQufwMkcRlbjSxQpBks73cZ6eIbRMDESpu4H1N6fAX3U8SXxaJTkpNp95pAkIq12aDtqwBZo7%2FP2IcymvCdLMvVXAGPEMuJ5YYXvLZRIfGkZOjTsyBjfpaQA1qq0GqN%2BAQ%2FTdUvMkl8ZbleY%2BvlI2A4qpudVp0rIDKYNZlKLYU9QSzV7ndymJluFdlN4xQ1Le5qcEw1FjVrhIZsApniz0GtibgnKF5%2BvN8py5FeNn1cx01vc11ABMD2It4ROX7vvdkhWN6qgUPcsYlXptVe86ZvnEGntiDmxfkk3Ne6i9vPHNDTEUOsFYBd4j0tlCeJmGpFsZnZl%2Br7YqhGuiiDJvQE%2BYR7PV73BDkV1dWVM9nzLRTuiBgjiJ05NVYQsKd490Z4M4Cww8Jug64WCCE20VGSCG9UFo%2FjTIMeK%2B%2BiQMHC1FUN622LqZJOmXz3BE%2BNeWdKPHQAoz9zwXEIUlZPGOOV0ZoHo6T2j3ICBiLq5tMgJLn5%2FpYT2x%2FHKZhH551jQr6va%2BFu1lNzQ%2FcNzZBe%2B9skHTyAqMSQt7N8oPHW%2FgM7E0bKFxhH2Yj1UZinIbpXKNpYW58IH2zBct1pWJpXyTK1YDlfXwNO8eJ00PLXBnynf8CgAni4SyDcyAbTFRPh93hblCgb5wx1s%2FdXdHmzpdGJibJjJnzqOUFt4GYfolczF3RsSR509T56f6tNjVPIscUo8zEmprXZ448RCDNiL0M6zJp03me8YvpnlNuRQeT9KjsSoKk9Xo54VJu903cF9ZALlFdISoZsq%2F6CTS1vZmA0HmTNpjm%2FQPHTm49%2By09kls6mHgK%2Fnm8iWDNjASGck4nQx87JQsj9yQBnNzUyiSMQ6Y8i07P2eJm2%2Bwqrt674qDRVbMZ7L6nBwqswuABGQAaEbVl4AomqcKvugo8vTzuek3tS1YFNgsOsa02YN2blX9RD%2BYLMikx4iubMAZcvfarKM4FlicBCWnG2FM81W26Rl1Syw22b3vPiOVILjIfaDGVlyyWSmfB4jSZ14R5bZ9w8SRE0j8qSxq44uP4YmeWVi6IfJpFYujWJwQZ7DcifdU8%2BuJ0PXY%2By8EAm2RFu3eu4y%2BUSdp2boLm9vXIr4mY0ngEU1C6RBAd7M3lOyJkAsCeEdOZHq7z8Kbbp5l3PXVcDZxVr%2FvLrn1jNVO8bIonfok06NGWRuzMTYLH0YkEduiJBFAIjGTioDoU9JAsISQbcoKJFCrJ4NW%2BUQ8qcYz59klqHtTsmJEFMYiKm2tFwdWXYrsoE7tZr591h2xk9H7wHH1eTcdXIXI7AqyyBD0mMMer9nXkKSoPSM01AiGySSrPCXCbDmm3Lr%2ByMjcCKiLNpA7GpxBOSVhYENpLSxRm6B1Cg3jrLAlTrHqfG7eXp%2Fmo9Us0BAeoloPGMLiB1UrCR3hR640Jk25wJjVtX%2BEIXIzn5xF4BesfzY3nB8kKlbVG0KFqb9AOwM6nPLVmnDuiOm0Pjm2slgCnJyU8BnnvqzniXCkZ2FqpSRLBInVTgk%2FlLoeqE08kbf%2FKTDomh5a2yOr9znHvEPog0U1li9LslRyxJWNl0fwL%2FX9OuRrSaJ3NDhTwn1sDX2thMFygliPRgqoVXPCYDdD6RQH8mjoVLokuCO%2Fpb26af%2Foi3PknaxWFFIw1v3zwp2OTA6IOn3sgAeyo4lgGNlcf0nd0i%2Fledbra3otTD2u9VG1Bc%2BUnxcD%2BXQr75%2FYfgmtUUs4H4o0ZprjHMf005TwRX3iLlLdBW0J3hlghzdAXxWRHe9zO5DkEEyNeSfvAvI3LfDyyXYt%2BcGNrK4D%2FLsL4zTweceK7gxhMQMzcuYa6ILjHcwEuo9HgeQCr5tSEi1LqHbaCzs5l7ClClSQxVgJ0wlREZM67Wl%2Bxhdxd2ETwM39rGsvZztSlc%2BLSG0w387dPhRs3S9VdngzBTVnva08Hufq0u%2BtCxAh9pXj8k4ZqihXLoIypZZdYC8QMwscj6%2BzSUaxz%2FxssrLxZA0MpfYwzJQUvlvStA67MwAuA3EdbapgbOFFxDr%2FqEgROQNtq0eIdQLuTgLUKnbYgiRJClGIev5YbB38PgNyAaYrZ40kqZiAMevPaFF0DemgvZgh8dGW%2BdhK3hwpGVr2NKN15dnCCKspkJ3FGLrV1UPrV2W1iuQVl54K3mQH%2FSAVzvjWvAy4JLLiyjiKQGfec2nJkX2SSj6M3gXX08qipBY6NBlbjUm2Q5SRO7sa2247diQG3HbakAB2HHuElnofF%2F%2BU2GBd9yeCO9ETtVxfQlT%2FDpof7PUKYhcwSLJ4bss2B3hwFWgmMPX%2BKFAq5VtY7UD08fTYgGoh6RjgMgOQkCFgeZyG83152LStP9otZgKL56OLyeEoi%2FbmcmTF2g2wSZKovKm3eITbrjdWx8DuQxpb9toQcnw0iPICwn3PObDK86HKo6HiriQbw1cSwFKgBDSj0Pu0WMnxGHMOys%2Faxawn9%2BDuFgzTJHFL9sJka9MWjyM6r2%2BEIYoXSy4sKlSISuzGodxEqd%2BCAMHuV%2BWQKUq%2B%2F0kgyCHENn%2BvQtD4YacEtZG3BRJzzDjrd3tTOuWGfxfxDi%2FZY7H1m5RpTMx96ACU3tsgHsjEbkEKZhB%2B4LqOXFAaFib3OCuxyaR9fPd7M%2FZGkHXVnGIthCieDAGZf58OVufdraJ2c2SaUdG19IlzRaCEziXVQ%2F2BnVcuAe%2B9JFuYvj2po7lKjnipoXfJoY4Ma3eJatNXgK13cUKHrly7U9uAujkbRng6GPcAzDTmDlGCWprRzSDlOcZh9EGi%2BHQM7xJv531pgMRtGqSPILqwHyvmTjUEkBz3nQsXgP3dTEZtzDx4UUkI7NlEawicPpFWKPVW5BqQ5jQmQIbSpgEfA3sJrtnIYMwr9R2%2FS%2FHjlek2WzAlbFBN%2FYxmii13w%2Fdu19b5d9nQ11LnFvAYr8%2FoVblYNeuME0LGtk1%2FoazcKo7nLjcTfWxV10%2F2iAUbGt%2BtdM9m3duLjaOI72a0qe1rNn%2BGD%2FER6fC4mNkxADo%2FpZCX7718Ns%2B6HNbn4dX6UMazDSISLUFWA42rJsa56KuVrj7oqwqlmQdzPzBlS7mb95%2FnpSAEVXfZBQx4i%2BkhcHWSvJJ7Y233bdLWOlT80TWnLlnFIqaX4gtzFq%2BxdbH0kVoz%2F8gonRFRRJ11SA0eUf2Sgo0Y3Mf12VD4RBH7LhHLafCYbXLe1FDkYI9ZfNI9WI5tkMcd0F%2FF3JoaPhPgSUcDvRKqY%2Bq4W9ApKat42lX8%2FnFlAJT9t7PybxF1Lnxm1tGTgPWwTcjgzRkR6alI4ktzb2%2BQ%2B2Rp4jcYLESeEjPMf1RJAQqZ82KHoiiFLkCQH1NeUm06edss7uWpkZFBprz7MmTANni%2BNVaZy7GK7uuCDBxrxTAcbY5W1cxPCLOw6C58SPqhDNHdBKnL8MliRoCl%2BA6lJLrcTXqXjDUes0ZI9MGZ3P2mfH8uoOvf%2FUsxIG1yNcWXKGfEy%2FzhWCH%2BacH0Va6IwqNWNuyPanFFHZtqC8idEfC715483pzZ6TI1EhwVAt47gRWIgFkHJijm%2BdEhqn6kb3pKX8X2Li98sYatBFeGovV8rwitlwUkDMlgJ2zngWKfVuvtEJhUQHgEkFZLp5tfCK5pFpMzZtcOCfRRwvD10axKF6yNu%2BPpNb863Er1%2FGWZomw5ETEW8rLSC00eON8COlqwb3uw8qCqCgxQNnh4J97NJaE3xehpMdBgC8t05D80KYPNcF%2FIZVY4g%2BvQPC0KG4VIa9UZwkdy2W6laTo77LAP5RTGYdH6l7eZhS3XsLsb5OvZyQGCkEm%2BAp%2FKinB6bVytT1n0TgCKGoHOyT2eYEIUOLUC6NWzJPS4r4u4XvJTA7RnWq7bNKDvaqAa6JtFPKEjOHNkU5UlAMxl7gmJbRQMqK4ehJFXl0zda1kIRoH1l60YJVmZfjbyivV6PqeaU0HQxJEWB4LAUveGIAXvDUY0x0ZvrZW121%2FG2idVV7OTuL%2FPsbfVzxzGrySQ%2BUW0RFQAD02PvRXPuaPl83g3BdsujsE4xwD3X%2BJoR9juHfnLP7Bw51PabgVDJHN9DyFILEuglxvNUepujsScPS9vchSSYcv7PqD9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=G3Q%2BjzFaEwmal2YdOPC%2FnOr%2B60CpKL%2BgfE15Zqb9HPkaFGMGvJnJXTTJZnq%2Fk39%2BdxYr%2B%2BGxURMn%0AvQiCxIoQJALN06iIEMPVr6Ihvp%2BYBCmTxfJenbiJpr1eUUQL4fC7qmZ8xWWbuX4z882omXpcpwyJ%0A7KBZaimyq%2FRkTy4QazvrfldEuPj5x0DpDkKOVoxjZQIUn5155U%2FS1Wyb%2BUNnAoSx4vELycvxs8zj%0A1C4O189P9kDa3VkJd7CwF%2B7neTofd1L5jQBqB1JeaSgFyNhMLZ0FcUSymVM1wNbeLuvbfcSpFhCC%0AWbzr3rlL8O%2BSs1nMZcebHBrYOz7xiuhIWl8mcA%3D%3D"))
850
network    2018.06.05 15:02:02.205   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
851
network    2018.06.05 15:02:02.324   TlsChecker::getFatalErrors(network/TlsChecker.cpp:205)                     : (ignored)  "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
852
network    2018.06.05 15:02:02.324   TlsChecker::containsFatalError(network/TlsChecker.cpp:218)                 : Ignore SSL errors
853
network    2018.06.05 15:02:02.324 I (:0)                                                                       : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-GCM-SHA384, bits=256, proto=TLSv1.2)
854
network    2018.06.05 15:02:02.324 I (:0)                                                                       : Used session protocol: "TlsV1_2"
855
network    2018.06.05 15:02:02.324 I (:0)                                                                       : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
856
network    2018.06.05 15:02:02.324 I (:0)                                                                       : Used peer certificate: QSslCertificate("3", "e7:08:a6:d2:a3:00:be:42", "7d4jrw+Ie/197bX/lQTapw==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.connect.verwalt-berlin.de")), QDateTime(2016-07-20 04:59:12.000 UTC Qt::TimeSpec(UTC)), QDateTime(2019-07-25 23:59:59.000 UTC Qt::TimeSpec(UTC)))
857
network    2018.06.05 15:02:02.324 I ...dress::onSslHandshakeDone(core/states/StateCheckRefreshAddress.cpp:162) : Handshake of tls connection done!
858
default    2018.06.05 15:02:02.324   TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49)        : Check certificate key of type "Rsa" and key size 2048
859
default    2018.06.05 15:02:02.325   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 2000
860
default    2018.06.05 15:02:02.325   TlsChecker::checkCertificate(network/TlsChecker.cpp:29)                    : Check certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42"
861
default    2018.06.05 15:02:02.325   TlsChecker::checkCertificate(network/TlsChecker.cpp:31)                    : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "774af1694f2280b09d0d640948b22a77ea638f1157f517923c255bd2aae56b94"
862
default    2018.06.05 15:02:02.325   TlsChecker::checkCertificate(network/TlsChecker.cpp:32)                    : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
863
default    2018.06.05 15:02:02.325   AuthContext::addCertificateData(core/context/AuthContext.h:143)            : Adding certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" for URL origin QUrl("https://eid-prod.connect.verwalt-berlin.de:443")
864
default    2018.06.05 15:02:02.325   TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84)          : Check ephemeral key of type "Ec" and key size 384
865
default    2018.06.05 15:02:02.325   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 224
866
default    2018.06.05 15:02:02.421   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:212) : Status Code:  303  | redirect URL:  QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f")
867
network    2018.06.05 15:02:02.422   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Location": "https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f"
868
network    2018.06.05 15:02:02.422   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Cache-Control": "no-cache, no-store"
869
network    2018.06.05 15:02:02.422   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Pragma": "no-cache"
870
network    2018.06.05 15:02:02.422   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Content-Length": "0"
871
network    2018.06.05 15:02:02.422   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Date": "Tue, 05 Jun 2018 13:02:02 GMT"
872
network    2018.06.05 15:02:02.422   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Set-Cookie": "TS015f2d62=01d33437f96092ea00ce1bf9d1a67ceedbea601dcce261a9ef510cb657ac22bddf92e81c9ab4b7a5a7c393d2a6ab8a1b11950e9724; Path=/"
873
network    2018.06.05 15:02:02.422   UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46)                : SOP-Check( "https://eid-prod.connect.verwalt-berlin.de:443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= true
874
default    2018.06.05 15:02:02.422   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:285) : SOP-Check succeeded, abort process
875
default    2018.06.05 15:02:02.422   ...s::fetchServerCertificate(core/states/StateCheckRefreshAddress.cpp:321) : Fetch TLS certificate for URL QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f")
876
network    2018.06.05 15:02:02.423   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "eid-prod.connect.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f"))
877
network    2018.06.05 15:02:02.424   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
878
network    2018.06.05 15:02:02.541   TlsChecker::getFatalErrors(network/TlsChecker.cpp:205)                     : (ignored)  "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
879
network    2018.06.05 15:02:02.541   TlsChecker::containsFatalError(network/TlsChecker.cpp:218)                 : Ignore SSL errors
880
network    2018.06.05 15:02:02.541 I (:0)                                                                       : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-GCM-SHA384, bits=256, proto=TLSv1.2)
881
network    2018.06.05 15:02:02.541 I (:0)                                                                       : Used session protocol: "TlsV1_2"
882
network    2018.06.05 15:02:02.541 I (:0)                                                                       : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
883
network    2018.06.05 15:02:02.541 I (:0)                                                                       : Used peer certificate: QSslCertificate("3", "e7:08:a6:d2:a3:00:be:42", "7d4jrw+Ie/197bX/lQTapw==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.connect.verwalt-berlin.de")), QDateTime(2016-07-20 04:59:12.000 UTC Qt::TimeSpec(UTC)), QDateTime(2019-07-25 23:59:59.000 UTC Qt::TimeSpec(UTC)))
884
network    2018.06.05 15:02:02.541 I ...FetchingServerCertificate(core/states/StateCheckRefreshAddress.cpp:340) : Handshake of tls connection done!
885
default    2018.06.05 15:02:02.541   TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49)        : Check certificate key of type "Rsa" and key size 2048
886
default    2018.06.05 15:02:02.542   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 2000
887
default    2018.06.05 15:02:02.542   TlsChecker::checkCertificate(network/TlsChecker.cpp:29)                    : Check certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42"
888
default    2018.06.05 15:02:02.542   TlsChecker::checkCertificate(network/TlsChecker.cpp:31)                    : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "774af1694f2280b09d0d640948b22a77ea638f1157f517923c255bd2aae56b94"
889
default    2018.06.05 15:02:02.542   TlsChecker::checkCertificate(network/TlsChecker.cpp:32)                    : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
890
default    2018.06.05 15:02:02.542   AuthContext::addCertificateData(core/context/AuthContext.h:143)            : Adding certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" for URL origin QUrl("https://eid-prod.connect.verwalt-berlin.de:443")
891
default    2018.06.05 15:02:02.542   TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84)          : Check ephemeral key of type "Ec" and key size 384
892
default    2018.06.05 15:02:02.542   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 224
893
default    2018.06.05 15:02:02.542   ...freshAddress::doneSuccess(core/states/StateCheckRefreshAddress.cpp:359) : Determined RefreshUrl:  QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f")
894
statema... 2018.06.05 15:02:02.542   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateCheckRefreshAddress" with status: No_Error | "Es ist kein Fehler aufgetreten."
895
statema... 2018.06.05 15:02:02.542   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateWriteHistory"
896
statema... 2018.06.05 15:02:02.543   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateWriteHistory"
897
statema... 2018.06.05 15:02:02.628   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateWriteHistory" with status: No_Error | "Es ist kein Fehler aufgetreten."
898
statema... 2018.06.05 15:02:02.628   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateRedirectBrowser"
899
statema... 2018.06.05 15:02:02.628   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateRedirectBrowser"
900
activation 2018.06.05 15:02:02.628   ...sendRedirect(activation/webservice/WebserviceActivationContext.cpp:126) : Redirect URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f&ResultMajor=ok")
901
activation 2018.06.05 15:02:02.628   ...sendRedirect(activation/webservice/WebserviceActivationContext.cpp:135) : Redirecting now to URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f&ResultMajor=ok")
902
statema... 2018.06.05 15:02:02.628   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateRedirectBrowser" with status: No_Error | "Es ist kein Fehler aufgetreten."
903
statema... 2018.06.05 15:02:02.628   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "FinalState"
904
card_dr... 2018.06.05 15:02:02.631   const(card/drivers/ReaderDetector.cpp:59)                                  : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
905
statema... 2018.06.05 15:02:04.587   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "FinalState"
906
statema... 2018.06.05 15:02:04.587   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "FinalState" with status: No_Error | "Es ist kein Fehler aufgetreten."
907
default    2018.06.05 15:02:04.610   AppController::onWorkflowFinished(core/controller/AppController.cpp:144)   : governikus::AuthController done
908
support    2018.06.05 15:02:04.612 I AppController::onWorkflowFinished(core/controller/AppController.cpp:150)   : Finished workflow AUTH
909
card_pcsc  2018.06.05 15:02:12.112   PcscReader::updateCard(card/pcsc/PcscReader.cpp:194)                       : old state: "(0x20022) CHANGED PRESENT" | new state: "(0x20422) CHANGED PRESENT UNPOWERED"
910
network    2018.06.05 17:03:02.250   HttpRequest::insertHeader(network/HttpRequest.cpp:196)                     : Header | "Host": "127.0.0.1:24727"
911
network    2018.06.05 17:03:02.250   HttpRequest::insertHeader(network/HttpRequest.cpp:196)                     : Header | "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0"
912
network    2018.06.05 17:03:02.251   HttpRequest::insertHeader(network/HttpRequest.cpp:196)                     : Header | "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8"
913
network    2018.06.05 17:03:02.251   HttpRequest::insertHeader(network/HttpRequest.cpp:196)                     : Header | "Accept-Language": "de,en-US;q=0.7,en;q=0.3"
914
network    2018.06.05 17:03:02.251   HttpRequest::insertHeader(network/HttpRequest.cpp:196)                     : Header | "Accept-Encoding": "gzip, deflate"
915
network    2018.06.05 17:03:02.251   HttpRequest::insertHeader(network/HttpRequest.cpp:196)                     : Header | "Connection": "keep-alive"
916
network    2018.06.05 17:03:02.251   HttpRequest::insertHeader(network/HttpRequest.cpp:196)                     : Header | "Upgrade-Insecure-Requests": "1"
917
network    2018.06.05 17:03:02.251   HttpRequest::onHeadersComplete(network/HttpRequest.cpp:153)                : "GET"  | QUrl("/eID-Client?tcTokenURL=https%3A%2F%2Feid-prod.connect.verwalt-berlin.de%2FBuergerKontoWeb%2FSAMLRequestServlet%3FsessionId%3D516d12bb-0894-4d35-b041-ca094178cf3e")
918
network    2018.06.05 17:03:02.251   HttpRequest::onHeadersComplete(network/HttpRequest.cpp:154)                : Header completed
919
network    2018.06.05 17:03:02.251   HttpRequest::onMessageComplete(network/HttpRequest.cpp:144)                : Message completed
920
activation 2018.06.05 17:03:02.251   ...onNewRequest(activation/webservice/WebserviceActivationHandler.cpp:101) : Request type: authentication
921
default    2018.06.05 17:03:02.251   ...troller::onAuthenticationRequest(core/controller/AppController.cpp:258) : authentication requested
922
card       2018.06.05 17:03:02.251 W ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:42) : No valid chains could be built
923
card       2018.06.05 17:03:02.251 W ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:42) : No valid chains could be built
924
support    2018.06.05 17:03:02.251 I EnumAction::Action](core/controller/AppController.cpp:399)                 : Starting new workflow AUTH
925
default    2018.06.05 17:03:02.252   EnumAction::Action](core/controller/AppController.cpp:405)                 : Start governikus::AuthController
926
statema... 2018.06.05 17:03:02.281   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateProcessing"
927
statema... 2018.06.05 17:03:02.281   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateProcessing"
928
statema... 2018.06.05 17:03:02.282   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateProcessing" with status: No_Error | "Es ist kein Fehler aufgetreten."
929
statema... 2018.06.05 17:03:02.282   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateParseTcTokenUrl"
930
statema... 2018.06.05 17:03:02.282   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateParseTcTokenUrl"
931
statema... 2018.06.05 17:03:02.282   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateParseTcTokenUrl" with status: No_Error | "Es ist kein Fehler aufgetreten."
932
statema... 2018.06.05 17:03:02.282   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateGetTcToken"
933
statema... 2018.06.05 17:03:02.282   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateGetTcToken"
934
default    2018.06.05 17:03:02.282   StateGetTcToken::run(core/states/StateGetTcToken.cpp:42)                   : Got TC Token URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLRequestServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e")
935
network    2018.06.05 17:03:02.283   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "eid-prod.connect.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLRequestServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e"))
936
network    2018.06.05 17:03:02.283   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
937
network    2018.06.05 17:03:02.494   TlsChecker::getFatalErrors(network/TlsChecker.cpp:205)                     : (ignored)  "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
938
network    2018.06.05 17:03:02.494   TlsChecker::containsFatalError(network/TlsChecker.cpp:218)                 : Ignore SSL errors
939
network    2018.06.05 17:03:02.495 I (:0)                                                                       : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-GCM-SHA384, bits=256, proto=TLSv1.2)
940
network    2018.06.05 17:03:02.495 I (:0)                                                                       : Used session protocol: "TlsV1_2"
941
network    2018.06.05 17:03:02.495 I (:0)                                                                       : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
942
network    2018.06.05 17:03:02.495 I (:0)                                                                       : Used peer certificate: QSslCertificate("3", "e7:08:a6:d2:a3:00:be:42", "7d4jrw+Ie/197bX/lQTapw==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.connect.verwalt-berlin.de")), QDateTime(2016-07-20 04:59:12.000 UTC Qt::TimeSpec(UTC)), QDateTime(2019-07-25 23:59:59.000 UTC Qt::TimeSpec(UTC)))
943
network    2018.06.05 17:03:02.495 I StateGetTcToken::onSslHandshakeDone(core/states/StateGetTcToken.cpp:110)   : Handshake of tls connection done!
944
default    2018.06.05 17:03:02.495   TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49)        : Check certificate key of type "Rsa" and key size 2048
945
default    2018.06.05 17:03:02.495   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 2000
946
default    2018.06.05 17:03:02.495   TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84)          : Check ephemeral key of type "Ec" and key size 384
947
default    2018.06.05 17:03:02.495   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 224
948
default    2018.06.05 17:03:02.495   AuthContext::addCertificateData(core/context/AuthContext.h:143)            : Adding certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" for URL origin QUrl("https://eid-prod.connect.verwalt-berlin.de:443")
949
default    2018.06.05 17:03:02.553   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:139)       : Status Code:  303  | RedirectUrl:  QUrl("https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?SAMLRequest=nZLRbtsgFIZfxeIeG2wcOyhOlM6bZK2bpqTtpN1YGJ%2BklpxDBtjb3r6kS6VNq3ox7hAc%2Fu%2FwndXm52mMZrBuMFgRHjMSAWrTD3isyP3dB1qSzXrl1GlMz3I7%2BUfcwfcJnI9CITr5%2B6Qik0VplBucRHUCJ72W%2B%2B2nW5nGTJ6t8UabkURb58D6EPXOoJtOYPdg50HD%2Fe62Io%2Fen51MEhh6Gkr6WBtE0D4OeD%2FU6GkHdhww7iG5mcAewX406M1X6JJL1A40DDNcXhzBbxy4S09NX%2BV80fO06ygrl4KKPstpxwSnWrGl4EWpDxmQqA49DagucK%2Bg%2FIMgSyGy5GjmVk0e0CfK%2FUJNoqauSFsUiwwAUqqhZ1SEXNot%2BZKmqswLdlimWRESG%2BcmaNB5hb4iKeMlZQvK8jueS5ZJlsacsW8k%2BmLNPPRgP4ePrUj9noUlyqLdAzaI9b5V4wi1ChQHGMO99uFwQ1lQyeOQuRBlSkWWCkGihxfPwQq5WpXPGPZPnW%2FbVC8Oyfr%2FWVbJ8%2BBcw9fX7d8Ttn4C&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=CnE9h9OqiiS41tdzbTAu6cIEUSRe3OZLQUUp341OS%2FAwW9ejKR3fM35EjqtxORgwz9ZFUqHa6RU4n2Fie64pJghHKV7287a3Lm%2F7QP6tk%2FhAn507LmQvIQpX5EAA3W7vlxKvaiYRXKW4YTqIJuXi17Esir5K9UynSKr273ULn1P2xvjCxhAAVoYaeO420tIYSxpA5LXqnu7kYf79ltajj2%2FaS47uWFeLyb9o%2FXkAMILwVhHROMapEp7z8cx%2B9jH5ItuYy3YOZn2bBBVjXMW3peWbEKqB7q5eNv%2BxV4wyAJCZxX4SwnX4rQ6gIQPDexWQMEBRfDKcEwQmljgjJ61qow%3D%3D")
950
network    2018.06.05 17:03:02.553   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Cache-Control": "no-cache, no-store"
951
network    2018.06.05 17:03:02.553   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Pragma": "no-cache"
952
network    2018.06.05 17:03:02.553   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Location": "https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?SAMLRequest=nZLRbtsgFIZfxeIeG2wcOyhOlM6bZK2bpqTtpN1YGJ%2BklpxDBtjb3r6kS6VNq3ox7hAc%2Fu%2FwndXm52mMZrBuMFgRHjMSAWrTD3isyP3dB1qSzXrl1GlMz3I7%2BUfcwfcJnI9CITr5%2B6Qik0VplBucRHUCJ72W%2B%2B2nW5nGTJ6t8UabkURb58D6EPXOoJtOYPdg50HD%2Fe62Io%2Fen51MEhh6Gkr6WBtE0D4OeD%2FU6GkHdhww7iG5mcAewX406M1X6JJL1A40DDNcXhzBbxy4S09NX%2BV80fO06ygrl4KKPstpxwSnWrGl4EWpDxmQqA49DagucK%2Bg%2FIMgSyGy5GjmVk0e0CfK%2FUJNoqauSFsUiwwAUqqhZ1SEXNot%2BZKmqswLdlimWRESG%2BcmaNB5hb4iKeMlZQvK8jueS5ZJlsacsW8k%2BmLNPPRgP4ePrUj9noUlyqLdAzaI9b5V4wi1ChQHGMO99uFwQ1lQyeOQuRBlSkWWCkGihxfPwQq5WpXPGPZPnW%2FbVC8Oyfr%2FWVbJ8%2BBcw9fX7d8Ttn4C&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=CnE9h9OqiiS41tdzbTAu6cIEUSRe3OZLQUUp341OS%2FAwW9ejKR3fM35EjqtxORgwz9ZFUqHa6RU4n2Fie64pJghHKV7287a3Lm%2F7QP6tk%2FhAn507LmQvIQpX5EAA3W7vlxKvaiYRXKW4YTqIJuXi17Esir5K9UynSKr273ULn1P2xvjCxhAAVoYaeO420tIYSxpA5LXqnu7kYf79ltajj2%2FaS47uWFeLyb9o%2FXkAMILwVhHROMapEp7z8cx%2B9jH5ItuYy3YOZn2bBBVjXMW3peWbEKqB7q5eNv%2BxV4wyAJCZxX4SwnX4rQ6gIQPDexWQMEBRfDKcEwQmljgjJ61qow%3D%3D"
953
network    2018.06.05 17:03:02.553   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Content-Type": "text/html"
954
network    2018.06.05 17:03:02.553   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Content-Length": "0"
955
network    2018.06.05 17:03:02.553   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Date": "Tue, 05 Jun 2018 15:03:01 GMT"
956
network    2018.06.05 17:03:02.553   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Set-Cookie": "TS015f2d62=01d33437f99f830f21e1cdc71a11b77fe6b9aeedcd7b0848b7009167cacf04fac5c3cce811437943cfe8a82a6647be80f47766aece; Path=/"
957
network    2018.06.05 17:03:02.553   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8443, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?SAMLRequest=nZLRbtsgFIZfxeIeG2wcOyhOlM6bZK2bpqTtpN1YGJ%2BklpxDBtjb3r6kS6VNq3ox7hAc%2Fu%2FwndXm52mMZrBuMFgRHjMSAWrTD3isyP3dB1qSzXrl1GlMz3I7%2BUfcwfcJnI9CITr5%2B6Qik0VplBucRHUCJ72W%2B%2B2nW5nGTJ6t8UabkURb58D6EPXOoJtOYPdg50HD%2Fe62Io%2Fen51MEhh6Gkr6WBtE0D4OeD%2FU6GkHdhww7iG5mcAewX406M1X6JJL1A40DDNcXhzBbxy4S09NX%2BV80fO06ygrl4KKPstpxwSnWrGl4EWpDxmQqA49DagucK%2Bg%2FIMgSyGy5GjmVk0e0CfK%2FUJNoqauSFsUiwwAUqqhZ1SEXNot%2BZKmqswLdlimWRESG%2BcmaNB5hb4iKeMlZQvK8jueS5ZJlsacsW8k%2BmLNPPRgP4ePrUj9noUlyqLdAzaI9b5V4wi1ChQHGMO99uFwQ1lQyeOQuRBlSkWWCkGihxfPwQq5WpXPGPZPnW%2FbVC8Oyfr%2FWVbJ8%2BBcw9fX7d8Ttn4C&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=CnE9h9OqiiS41tdzbTAu6cIEUSRe3OZLQUUp341OS%2FAwW9ejKR3fM35EjqtxORgwz9ZFUqHa6RU4n2Fie64pJghHKV7287a3Lm%2F7QP6tk%2FhAn507LmQvIQpX5EAA3W7vlxKvaiYRXKW4YTqIJuXi17Esir5K9UynSKr273ULn1P2xvjCxhAAVoYaeO420tIYSxpA5LXqnu7kYf79ltajj2%2FaS47uWFeLyb9o%2FXkAMILwVhHROMapEp7z8cx%2B9jH5ItuYy3YOZn2bBBVjXMW3peWbEKqB7q5eNv%2BxV4wyAJCZxX4SwnX4rQ6gIQPDexWQMEBRfDKcEwQmljgjJ61qow%3D%3D"))
958
network    2018.06.05 17:03:02.554   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
959
network    2018.06.05 17:03:02.810   TlsChecker::getFatalErrors(network/TlsChecker.cpp:205)                     : (ignored)  "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
960
network    2018.06.05 17:03:02.810   TlsChecker::containsFatalError(network/TlsChecker.cpp:218)                 : Ignore SSL errors
961
network    2018.06.05 17:03:02.810 I (:0)                                                                       : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-SHA384, bits=256, proto=TLSv1.2)
962
network    2018.06.05 17:03:02.810 I (:0)                                                                       : Used session protocol: "TlsV1_2"
963
network    2018.06.05 17:03:02.810 I (:0)                                                                       : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
964
network    2018.06.05 17:03:02.810 I (:0)                                                                       : Used peer certificate: QSslCertificate("3", "3c:3f:e6:1c:7c:28:28:d9", "Kfl3PTkdwoi1P7sQWG1dvQ==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.verwalt-berlin.de")), QDateTime(2017-10-16 13:01:51.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-10-21 23:59:59.000 UTC Qt::TimeSpec(UTC)))
965
network    2018.06.05 17:03:02.810 I StateGetTcToken::onSslHandshakeDone(core/states/StateGetTcToken.cpp:110)   : Handshake of tls connection done!
966
default    2018.06.05 17:03:02.810   TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49)        : Check certificate key of type "Rsa" and key size 2048
967
default    2018.06.05 17:03:02.810   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 2000
968
default    2018.06.05 17:03:02.811   TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84)          : Check ephemeral key of type "Ec" and key size 384
969
default    2018.06.05 17:03:02.811   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 224
970
default    2018.06.05 17:03:02.811   AuthContext::addCertificateData(core/context/AuthContext.h:143)            : Adding certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" for URL origin QUrl("https://eid-prod.verwalt-berlin.de:8443")
971
default    2018.06.05 17:03:02.987   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:139)       : Status Code:  303  | RedirectUrl:  QUrl("https://eid-prod.verwalt-berlin.de:8443/ecardpaos/startauthentication?RestrictedId=true&idProviderUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8443%2Fgov_autent%2Fasync&IssuingState=true&FamilyNames=true&ArtisticName=true&PlaceOfBirth=true&AcademicTitle=true&PlaceOfResidence=true&Signature=Zeb2W0YvAHdKS2VViQ4a1jZkG%2FGjSpcgAnH7fwYvWr0OyRwdxLArXR%2BsInIsPECtwSyOdf9QBw3f%0AOyFWKXHrVacDZ6vIccWeWAFcFzWSljEANLlKT71vtWfBC02iYq3hMc2bxOk2tA3MY39EDQTi19Kb%0Ay4J4GC19dk79%2BzvsjPPnxPR0%2FseJN7GINJQxIW3H5jcknAarLJVJCmn0PTkRa%2B%2BmWdPOJDtTbbUR%0AWc0DE84EpODCacXyQk72l3FuDL239zcgusF3NtrskB7jdjhmkNVYN0lI1SPwyHYCg7UbXV7EQ5bM%0AjP5LMH2Ljf4I6lyQcurylODDYbO09IXppCmfzw%3D%3D&Nationality=true&DateOfBirth=true&GivenNames=true&requestID=1ae20737a5f5e3dad602d47ee10111f5610d1845&receiverUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8445%2Fecardpaos%2Fpaosreceiver&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%2Frsa-sha256&DocumentType=true&ResidencePermitI=true")
972
network    2018.06.05 17:03:02.988   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Server": "Apache-Coyote/1.1"
973
network    2018.06.05 17:03:02.988   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Location": "https://eid-prod.verwalt-berlin.de:8443/ecardpaos/startauthentication?RestrictedId=true&idProviderUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8443%2Fgov_autent%2Fasync&IssuingState=true&FamilyNames=true&ArtisticName=true&PlaceOfBirth=true&AcademicTitle=true&PlaceOfResidence=true&Signature=Zeb2W0YvAHdKS2VViQ4a1jZkG%2FGjSpcgAnH7fwYvWr0OyRwdxLArXR%2BsInIsPECtwSyOdf9QBw3f%0AOyFWKXHrVacDZ6vIccWeWAFcFzWSljEANLlKT71vtWfBC02iYq3hMc2bxOk2tA3MY39EDQTi19Kb%0Ay4J4GC19dk79%2BzvsjPPnxPR0%2FseJN7GINJQxIW3H5jcknAarLJVJCmn0PTkRa%2B%2BmWdPOJDtTbbUR%0AWc0DE84EpODCacXyQk72l3FuDL239zcgusF3NtrskB7jdjhmkNVYN0lI1SPwyHYCg7UbXV7EQ5bM%0AjP5LMH2Ljf4I6lyQcurylODDYbO09IXppCmfzw%3D%3D&Nationality=true&DateOfBirth=true&GivenNames=true&requestID=1ae20737a5f5e3dad602d47ee10111f5610d1845&receiverUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8445%2Fecardpaos%2Fpaosreceiver&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%2Frsa-sha256&DocumentType=true&ResidencePermitI=true"
974
network    2018.06.05 17:03:02.988   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Cache-Control": "no-cache, no-store"
975
network    2018.06.05 17:03:02.988   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Pragma": "no-cache"
976
network    2018.06.05 17:03:02.988   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Content-Length": "0"
977
network    2018.06.05 17:03:02.988   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Date": "Tue, 05 Jun 2018 15:03:02 GMT"
978
network    2018.06.05 17:03:02.988   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8443, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8443/ecardpaos/startauthentication?RestrictedId=true&idProviderUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8443%2Fgov_autent%2Fasync&IssuingState=true&FamilyNames=true&ArtisticName=true&PlaceOfBirth=true&AcademicTitle=true&PlaceOfResidence=true&Signature=Zeb2W0YvAHdKS2VViQ4a1jZkG%2FGjSpcgAnH7fwYvWr0OyRwdxLArXR%2BsInIsPECtwSyOdf9QBw3f%0AOyFWKXHrVacDZ6vIccWeWAFcFzWSljEANLlKT71vtWfBC02iYq3hMc2bxOk2tA3MY39EDQTi19Kb%0Ay4J4GC19dk79%2BzvsjPPnxPR0%2FseJN7GINJQxIW3H5jcknAarLJVJCmn0PTkRa%2B%2BmWdPOJDtTbbUR%0AWc0DE84EpODCacXyQk72l3FuDL239zcgusF3NtrskB7jdjhmkNVYN0lI1SPwyHYCg7UbXV7EQ5bM%0AjP5LMH2Ljf4I6lyQcurylODDYbO09IXppCmfzw%3D%3D&Nationality=true&DateOfBirth=true&GivenNames=true&requestID=1ae20737a5f5e3dad602d47ee10111f5610d1845&receiverUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8445%2Fecardpaos%2Fpaosreceiver&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%2Frsa-sha256&DocumentType=true&ResidencePermitI=true"))
979
network    2018.06.05 17:03:02.988   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
980
default    2018.06.05 17:03:03.033   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:139)       : Status Code:  200  | RedirectUrl:  QUrl("")
981
network    2018.06.05 17:03:03.033   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Server": "Apache-Coyote/1.1"
982
network    2018.06.05 17:03:03.033   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Content-Length": "640"
983
network    2018.06.05 17:03:03.033   StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142)       : Header | "Date": "Tue, 05 Jun 2018 15:03:02 GMT"
984
default    2018.06.05 17:03:03.033   TcToken::parse(core/TcToken.cpp:39)                                        : Parsing TcToken:
985
default    2018.06.05 17:03:03.033   TcToken::parse(core/TcToken.cpp:40)                                        : "<TCTokenType>\n<ServerAddress>https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver</ServerAddress>\n<SessionIdentifier>1ae20737a5f5e3dad602d47ee10111f5610d1845</SessionIdentifier>\n<RefreshAddress>https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=1ae20737a5f5e3dad602d47ee10111f5610d1845</RefreshAddress>\n<Binding>urn:liberty:paos:2006-08</Binding>\n<PathSecurity-Protocol>urn:ietf:rfc:4279</PathSecurity-Protocol>\n<PathSecurity-Parameter>\n<PSK>3C0DA83E8AC57AD17B225E06D57494B2A80EA78CCA1B0D16028F95842DE23DC28F2DB96D154AF240935C86B51D2BE863EFF5E81B7BBFB5FF62A2F85C41CF56C6</PSK>\n</PathSecurity-Parameter>\n</TCTokenType>\n"
986
statema... 2018.06.05 17:03:03.034   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateGetTcToken" with status: No_Error | "Es ist kein Fehler aufgetreten."
987
statema... 2018.06.05 17:03:03.034   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateStartPaos"
988
statema... 2018.06.05 17:03:03.034   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateStartPaos"
989
statema... 2018.06.05 17:03:03.034   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateStartPaos" with status: No_Error | "Es ist kein Fehler aufgetreten."
990
statema... 2018.06.05 17:03:03.034   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateSendStartPaos"
991
statema... 2018.06.05 17:03:03.035   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateSendStartPaos"
992
network    2018.06.05 17:03:03.035   StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213)  : Try to send raw data:
993
 "<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n  <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n   <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n   <paos:EndpointReference>\n    <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n    <paos:MetaData>\n     <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n    </paos:MetaData>\n   </paos:EndpointReference>\n  </paos:PAOS>\n  <wsa:ReplyTo>\n   <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n  </wsa:ReplyTo>\n  <wsa:MessageID>urn:uuid:ac05ad57-94e8-4ac0-ab3e-c5a3696a759a</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n  <StartPAOS xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n   <SessionIdentifier>1ae20737a5f5e3dad602d47ee10111f5610d1845</SessionIdentifier>\n   <ConnectionHandle xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"ConnectionHandleType\">\n    <CardApplication>e80704007f00070302</CardApplication>\n    <SlotHandle>00</SlotHandle>\n   </ConnectionHandle>\n   <UserAgent>\n    <Name>AusweisApp2</Name>\n    <VersionMajor>1</VersionMajor>\n    <VersionMinor>14</VersionMinor>\n    <VersionSubminor>0</VersionSubminor>\n   </UserAgent>\n   <SupportedAPIVersions>\n    <Major>1</Major>\n    <Minor>1</Minor>\n    <Subminor>5</Subminor>\n   </SupportedAPIVersions>\n  </StartPAOS>\n </soap:Body>\n</soap:Envelope>\n"
994
network    2018.06.05 17:03:03.035   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
995
network    2018.06.05 17:03:03.035   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
996
network    2018.06.05 17:03:03.144   ...dKeyAuthenticationRequired(core/states/StateGenericSendReceive.cpp:141) : pre-shared key authentication requested: "Hint"
997
network    2018.06.05 17:03:03.200   TlsChecker::getFatalErrors(network/TlsChecker.cpp:205)                     : (ignored)  "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
998
network    2018.06.05 17:03:03.200   TlsChecker::containsFatalError(network/TlsChecker.cpp:218)                 : Ignore SSL errors
999
network    2018.06.05 17:03:03.200 I (:0)                                                                       : Used session cipher QSslCipher(name=RSA-PSK-AES256-CBC-SHA, bits=256, proto=SSLv3)
1000
network    2018.06.05 17:03:03.200 I (:0)                                                                       : Used session protocol: "TlsV1_2"
1001
network    2018.06.05 17:03:03.200 I (:0)                                                                       : Used ephemeral server key:
1002
network    2018.06.05 17:03:03.200 I (:0)                                                                       : Used peer certificate: QSslCertificate("3", "3c:3f:e6:1c:7c:28:28:d9", "Kfl3PTkdwoi1P7sQWG1dvQ==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.verwalt-berlin.de")), QDateTime(2017-10-16 13:01:51.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-10-21 23:59:59.000 UTC Qt::TimeSpec(UTC)))
1003
network    2018.06.05 17:03:03.200 I ...eceive::onSslHandshakeDone(core/states/StateGenericSendReceive.cpp:115) : Handshake of tls connection done!
1004
default    2018.06.05 17:03:03.200   TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49)        : Check certificate key of type "Rsa" and key size 2048
1005
default    2018.06.05 17:03:03.200   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 2000
1006
default    2018.06.05 17:03:03.201   AuthContext::addCertificateData(core/context/AuthContext.h:143)            : Adding certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" for URL origin QUrl("https://eid-prod.verwalt-berlin.de:8445")
1007
network    2018.06.05 17:03:03.242   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
1008
network    2018.06.05 17:03:03.242   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
1009
network    2018.06.05 17:03:03.242   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
1010
network    2018.06.05 17:03:03.242   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
1011
network    2018.06.05 17:03:03.242   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:02 GMT"
1012
network    2018.06.05 17:03:03.242   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
1013
 "<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n   <soap:Header>\n      <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id984\" refToMessageID=\"1ae20737a5f5e3dad602d47ee10111f5610d1845\"/>\n   </soap:Header>\n   <soap:Body>\n   <InitializeFramework xmlns=\"http://www.bsi.bund.de/ecard/api/1.1\"/>\n</soap:Body>\n</soap:Envelope>\n"
1014
network    2018.06.05 17:03:03.242   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: INITIALIZE_FRAMEWORK
1015
statema... 2018.06.05 17:03:03.242   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateSendStartPaos" with status: No_Error | "Es ist kein Fehler aufgetreten."
1016
statema... 2018.06.05 17:03:03.242   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateInitializeFramework"
1017
statema... 2018.06.05 17:03:03.242   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateInitializeFramework"
1018
statema... 2018.06.05 17:03:03.242   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateInitializeFramework" with status: No_Error | "Es ist kein Fehler aufgetreten."
1019
statema... 2018.06.05 17:03:03.242   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateSendInitializeFrameworkResponse"
1020
statema... 2018.06.05 17:03:03.243   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateSendInitializeFrameworkResponse"
1021
network    2018.06.05 17:03:03.243   StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213)  : Try to send raw data:
1022
 "<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n  <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n   <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n   <paos:EndpointReference>\n    <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n    <paos:MetaData>\n     <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n    </paos:MetaData>\n   </paos:EndpointReference>\n  </paos:PAOS>\n  <wsa:ReplyTo>\n   <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n  </wsa:ReplyTo>\n  <wsa:MessageID>urn:uuid:276ae287-3cce-4cfb-9b08-98197a79f49c</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n  <InitializeFrameworkResponse xmlns=\"http://www.bsi.bund.de/ecard/api/1.1\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n   <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n    <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n   </Result>\n   <Version>\n    <Major>1</Major>\n    <Minor>1</Minor>\n    <SubMinor>5</SubMinor>\n   </Version>\n  </InitializeFrameworkResponse>\n </soap:Body>\n</soap:Envelope>\n"
1023
network    2018.06.05 17:03:03.243   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
1024
network    2018.06.05 17:03:03.243   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
1025
network    2018.06.05 17:03:03.284   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
1026
network    2018.06.05 17:03:03.284   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
1027
network    2018.06.05 17:03:03.284   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
1028
network    2018.06.05 17:03:03.284   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
1029
network    2018.06.05 17:03:03.285   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:02 GMT"
1030
network    2018.06.05 17:03:03.285   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
1031
 "<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n   <soap:Header>\n      <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id985\" refToMessageID=\"1ae20737a5f5e3dad602d47ee10111f5610d1845\"/>\n   </soap:Header>\n   <soap:Body>\n   <DIDList xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<ConnectionHandle xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"ConnectionHandle\">\n<CardApplication>E80704007F00070302</CardApplication>\n<SlotHandle>00</SlotHandle>\n</ConnectionHandle>\n</DIDList>\n</soap:Body>\n</soap:Envelope>\n"
1032
network    2018.06.05 17:03:03.285   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DID_LIST
1033
statema... 2018.06.05 17:03:03.285   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateSendInitializeFrameworkResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
1034
statema... 2018.06.05 17:03:03.285   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateDidList"
1035
statema... 2018.06.05 17:03:03.285   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateDidList"
1036
statema... 2018.06.05 17:03:03.285   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateDidList" with status: No_Error | "Es ist kein Fehler aufgetreten."
1037
statema... 2018.06.05 17:03:03.285   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateSendDIDListResponse"
1038
statema... 2018.06.05 17:03:03.285   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateSendDIDListResponse"
1039
network    2018.06.05 17:03:03.286   StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213)  : Try to send raw data:
1040
 "<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n  <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n   <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n   <paos:EndpointReference>\n    <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n    <paos:MetaData>\n     <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n    </paos:MetaData>\n   </paos:EndpointReference>\n  </paos:PAOS>\n  <wsa:ReplyTo>\n   <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n  </wsa:ReplyTo>\n  <wsa:MessageID>urn:uuid:f2994bbc-3012-4c23-9676-7f34d1b50623</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n  <DIDListResponse xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n   <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n    <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n   </Result>\n   <DIDNameList>\n    <DIDName>PIN</DIDName>\n   </DIDNameList>\n  </DIDListResponse>\n </soap:Body>\n</soap:Envelope>\n"
1041
network    2018.06.05 17:03:03.286   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
1042
network    2018.06.05 17:03:03.286   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
1043
network    2018.06.05 17:03:03.368   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
1044
network    2018.06.05 17:03:03.368   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
1045
network    2018.06.05 17:03:03.368   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
1046
network    2018.06.05 17:03:03.368   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
1047
network    2018.06.05 17:03:03.368   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:02 GMT"
1048
network    2018.06.05 17:03:03.368   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
1049
 "<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n   <soap:Header>\n      <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id986\" refToMessageID=\"1ae20737a5f5e3dad602d47ee10111f5610d1845\"/>\n   </soap:Header>\n   <soap:Body>\n   <DIDAuthenticate xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<ConnectionHandle xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"ConnectionHandle\">\n<CardApplication>E80704007F00070302</CardApplication>\n<SlotHandle>00</SlotHandle>\n</ConnectionHandle>\n<DIDName>PIN</DIDName>\n<AuthenticationProtocolData Protocol=\"urn:oid:1.3.162.15480.3.0.14.2\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"EAC1InputType\">\n<Certificate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ertificate>\n<Certificate>7F2181E77F4E81A05F290100420E44454356434165494430303130347F494F060A04007F00070202020203864104623D7CEBFF7918590B4D5C53D507DCF1EE3AE9E20A5E62AFEB8DBFC958F7EFFB4CCF7952FDA2B3F6254E9DC34FE5ECD1E084D4C23658319EC5BBE5A009D1E0EC5F2010444544566549444454523130313433337F4C12060904007F0007030102025305400513FF975F25060108000501075F24060108000801055F374054483CEF8791A094D40343B753FA83689C2B56256BB8428C56DDCDAB94709CAE8107DE8649DC37F7D130D75E36936CD85DAC818D1297C348BA408DA179A20CE4</Certificate>\n<Certificate>7F218201B67F4E82016E5F290100420E44454356434165494430303130337F4982011D060A04007F000702020202038120A9FB57DBA1EEA9BC3E660A909D838D726E3BF623D52620282013481D1F6E537782207D5A0975FC2C3057EEF67530417AFFE7FB8055C126DC5C6CE94A4B44F330B5D9832026DC5C6CE94A4B44F330B5D9BBD77CBF958416295CF7E1CE6BCCDC18FF8C07B68441048BD2AEB9CB7E57CB2C4B482FFC81B7AFB9DE27E1E3BD23C23A4453BD9ACE3262547EF835C3DAC4FD97F8461A14611DC9C27745132DED8E545C1D54C72F0469978520A9FB57DBA1EEA9BC3E660A909D838D718C397AA3B561A6F7901E0E82974856A7864104241D8627338B64F20077FFD558909A096C635DDB222852038EAAE642E869A40173D588F817D95DB2A6A0F077EA5EE63596A20F85BC3CB176D2F98D88D90219AA8701015F200E44454356434165494430303130347F4C12060904007F0007030102025305FC0F13FFFF5F25060105000901045F24060108000901045F3740313A81ED8734E7A8C45F16B55FB603E63027B7F44C2DE3A8E782552D35949DB221CA33BD41A01DA6A1288C7885714FC3A03FA45683B75D3884930EC6738AF8A0</Certificate>\n<Certificate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ertificate>\n<CertificateDescription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ertificateDescription>\n<RequiredCHAT>7F4C12060904007F0007030102025305000503FB04</RequiredCHAT>\n<OptionalCHAT>7F4C12060904007F00070301020253050000000000</OptionalCHAT>\n<AuthenticatedAuxiliaryData>67177315060904007F00070301040253083230313830363035</AuthenticatedAuxiliaryData>\n</AuthenticationProtocolData>\n</DIDAuthenticate>\n</soap:Body>\n</soap:Envelope>\n"
1050
paos       2018.06.05 17:03:03.369   ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:36) : "ConnectionHandle"
1051
paos       2018.06.05 17:03:03.369   ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "CardApplication"
1052
paos       2018.06.05 17:03:03.369   ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "SlotHandle"
1053
paos       2018.06.05 17:03:03.369   ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:36) : "DIDName"
1054
paos       2018.06.05 17:03:03.369   ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:36) : "AuthenticationProtocolData"
1055
paos       2018.06.05 17:03:03.369   ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate"
1056
paos       2018.06.05 17:03:03.369   ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate"
1057
paos       2018.06.05 17:03:03.369   ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate"
1058
paos       2018.06.05 17:03:03.369   ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate"
1059
paos       2018.06.05 17:03:03.370   ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "CertificateDescription"
1060
paos       2018.06.05 17:03:03.370   ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "RequiredCHAT"
1061
paos       2018.06.05 17:03:03.370   ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "OptionalCHAT"
1062
paos       2018.06.05 17:03:03.370   ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "AuthenticatedAuxiliaryData"
1063
network    2018.06.05 17:03:03.370   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DID_AUTHENTICATE_EAC1
1064
statema... 2018.06.05 17:03:03.370   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateSendDIDListResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
1065
statema... 2018.06.05 17:03:03.370   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateExtractCvcsFromEac1InputType"
1066
statema... 2018.06.05 17:03:03.370   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateExtractCvcsFromEac1InputType"
1067
card       2018.06.05 17:03:03.370   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])
1068
card       2018.06.05 17:03:03.371   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"])
1069
card       2018.06.05 17:03:03.371   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"])
1070
card       2018.06.05 17:03:03.371   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"])
1071
card       2018.06.05 17:03:03.371   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"])
1072
card       2018.06.05 17:03:03.371   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"])
1073
card       2018.06.05 17:03:03.371   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"])
1074
card       2018.06.05 17:03:03.371   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
1075
card       2018.06.05 17:03:03.371   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
1076
card       2018.06.05 17:03:03.371   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
1077
card       2018.06.05 17:03:03.371   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
1078
card       2018.06.05 17:03:03.372   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])
1079
card       2018.06.05 17:03:03.372   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"])
1080
card       2018.06.05 17:03:03.372   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"])
1081
card       2018.06.05 17:03:03.372   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"])
1082
card       2018.06.05 17:03:03.372   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00001", chr="DETESTeID00001", valid=["2010-08-13","2013-08-13"])
1083
card       2018.06.05 17:03:03.372   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00001", chr="DETESTeID00002", valid=["2010-09-21","2013-09-21"])
1084
card       2018.06.05 17:03:03.372   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00002", chr="DETESTeID00004", valid=["2012-05-11","2015-05-11"])
1085
card       2018.06.05 17:03:03.372   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00004", chr="DETESTeID00005", valid=["2015-05-04","2018-05-04"])
1086
card       2018.06.05 17:03:03.372   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeIDCTL0401", chr="DECVCAeIDCTL0402", valid=["2016-03-01","2019-03-01"])
1087
card       2018.06.05 17:03:03.372   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeIDCT00001", chr="DECVCAeIDCTL0401", valid=["2016-03-01","2019-03-01"])
1088
card       2018.06.05 17:03:03.372   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeIDCT00001", chr="DECVCAeIDCT00001", valid=["2016-03-01","2019-03-01"])
1089
card       2018.06.05 17:03:03.373   ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
1090
statema... 2018.06.05 17:03:03.373   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateExtractCvcsFromEac1InputType" with status: No_Error | "Es ist kein Fehler aufgetreten."
1091
statema... 2018.06.05 17:03:03.373   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StatePreVerification"
1092
statema... 2018.06.05 17:03:03.373   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StatePreVerification"
1093
default    2018.06.05 17:03:03.373   StatePreVerification::run(core/states/StatePreVerification.cpp:33)         : Try to build a cvc chain for one of the known trust points
1094
card       2018.06.05 17:03:03.373   const(card/base/asn1/CVCertificateChainBuilder.cpp:109)                    : Get chain for root CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"])
1095
card       2018.06.05 17:03:03.373   const(card/base/asn1/CVCertificateChainBuilder.cpp:119)                    : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
1096
default    2018.06.05 17:03:03.379   StatePreVerification::isValid(core/states/StatePreVerification.cpp:97)     : Check certificate chain validity on "2018-06-05T17:03:02"
1097
default    2018.06.05 17:03:03.379   StatePreVerification::isValid(core/states/StatePreVerification.cpp:108)    : CVC "DE000048700233" AT | valid from/to [ "2018-06-05" , "2018-06-06" ]
1098
default    2018.06.05 17:03:03.379   StatePreVerification::isValid(core/states/StatePreVerification.cpp:108)    : CVC "DEDVeIDDTR101433" DV_no_f | valid from/to [ "2018-05-17" , "2018-08-15" ]
1099
default    2018.06.05 17:03:03.379   StatePreVerification::isValid(core/states/StatePreVerification.cpp:108)    : CVC "DECVCAeID00104" CVCA | valid from/to [ "2015-09-14" , "2018-09-14" ]
1100
statema... 2018.06.05 17:03:03.387   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StatePreVerification" with status: No_Error | "Es ist kein Fehler aufgetreten."
1101
statema... 2018.06.05 17:03:03.387   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateCertificateDescriptionCheck"
1102
statema... 2018.06.05 17:03:03.387   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateCertificateDescriptionCheck"
1103
network    2018.06.05 17:03:03.387   UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46)                : SOP-Check( "https://eid-prod.connect.verwalt-berlin.de:443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= true
1104
statema... 2018.06.05 17:03:03.387   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateCertificateDescriptionCheck" with status: No_Error | "Es ist kein Fehler aufgetreten."
1105
statema... 2018.06.05 17:03:03.387   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateCheckCertificates"
1106
statema... 2018.06.05 17:03:03.387   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateCheckCertificates"
1107
default    2018.06.05 17:03:03.388   TlsChecker::checkCertificate(network/TlsChecker.cpp:29)                    : Check certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42"
1108
default    2018.06.05 17:03:03.388   TlsChecker::checkCertificate(network/TlsChecker.cpp:31)                    : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "774af1694f2280b09d0d640948b22a77ea638f1157f517923c255bd2aae56b94"
1109
default    2018.06.05 17:03:03.388   TlsChecker::checkCertificate(network/TlsChecker.cpp:32)                    : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
1110
default    2018.06.05 17:03:03.388   TlsChecker::checkCertificate(network/TlsChecker.cpp:29)                    : Check certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9"
1111
default    2018.06.05 17:03:03.388   TlsChecker::checkCertificate(network/TlsChecker.cpp:31)                    : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "0546c2b01048cb77669003ab0743255f94582f010baa85308133f514e218ff3c"
1112
default    2018.06.05 17:03:03.388   TlsChecker::checkCertificate(network/TlsChecker.cpp:32)                    : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
1113
default    2018.06.05 17:03:03.388   TlsChecker::checkCertificate(network/TlsChecker.cpp:29)                    : Check certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9"
1114
default    2018.06.05 17:03:03.388   TlsChecker::checkCertificate(network/TlsChecker.cpp:31)                    : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "0546c2b01048cb77669003ab0743255f94582f010baa85308133f514e218ff3c"
1115
default    2018.06.05 17:03:03.388   TlsChecker::checkCertificate(network/TlsChecker.cpp:32)                    : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
1116
statema... 2018.06.05 17:03:03.388   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateCheckCertificates" with status: No_Error | "Es ist kein Fehler aufgetreten."
1117
statema... 2018.06.05 17:03:03.388   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateEditAccessRights"
1118
statema... 2018.06.05 17:03:06.025   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateEditAccessRights"
1119
statema... 2018.06.05 17:03:06.025   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateEditAccessRights" with status: No_Error | "Es ist kein Fehler aufgetreten."
1120
statema... 2018.06.05 17:03:06.025   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateSelectReader"
1121
statema... 2018.06.05 17:03:06.026   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateSelectReader"
1122
statema... 2018.06.05 17:03:06.026   ...SelectReader::onReaderInfoChanged(core/states/StateSelectReader.cpp:71) : Select first found reader "REINER SCT cyberJack RFID basis 0" of type PCSC
1123
card       2018.06.05 17:03:06.026   ReaderManagerWorker::startScan(card/base/ReaderManagerWorker.cpp:114)      : Start scan on plugin: governikus::PcscReaderManagerPlugIn
1124
card       2018.06.05 17:03:06.026   ReaderManagerWorker::startScan(card/base/ReaderManagerWorker.cpp:114)      : Start scan on plugin: governikus::RemoteReaderManagerPlugIn
1125
statema... 2018.06.05 17:03:06.026   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateSelectReader" with status: No_Error | "Es ist kein Fehler aufgetreten."
1126
statema... 2018.06.05 17:03:06.026   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateConnectCard"
1127
statema... 2018.06.05 17:03:06.027   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateConnectCard"
1128
statema... 2018.06.05 17:03:06.027   StateConnectCard::run(core/states/StateConnectCard.cpp:24)                 : StateConnectCard::run()
1129
card_dr... 2018.06.05 17:03:06.030   const(card/drivers/ReaderDetector.cpp:59)                                  : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
1130
statema... 2018.06.05 17:03:06.030   StateConnectCard::onCardInserted(core/states/StateConnectCard.cpp:40)      : Card has been inserted, trying to connect
1131
network    2018.06.05 17:03:06.031   ...ramHandlerImpl::DatagramHandlerImpl(network/DatagramHandlerImpl.cpp:57) : Bound on port: 24727
1132
card_pcsc  2018.06.05 17:03:06.035   PcscCard::connect(card/pcsc/PcscCard.cpp:111)                              : SCardConnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" | cardHandle: 3926196224 | protocol: "SCARD_PROTOCOL_T1"
1133
card_pcsc  2018.06.05 17:03:06.035   PcscCard::connect(card/pcsc/PcscCard.cpp:118)                              : SCardBeginTransaction for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1134
card_pcsc  2018.06.05 17:03:06.036   PcscReader::updateCard(card/pcsc/PcscReader.cpp:194)                       : old state: "(0x20422) CHANGED PRESENT UNPOWERED" | new state: "(0x20122) CHANGED PRESENT INUSE"
1135
card_dr... 2018.06.05 17:03:06.042   const(card/drivers/ReaderDetector.cpp:59)                                  : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
1136
statema... 2018.06.05 17:03:06.042   StateConnectCard::onCommandDone(core/states/StateConnectCard.cpp:49)       : Card connection command completed
1137
statema... 2018.06.05 17:03:06.042   StateConnectCard::onCommandDone(core/states/StateConnectCard.cpp:57)       : Card connection was successful
1138
statema... 2018.06.05 17:03:06.042   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateConnectCard" with status: No_Error | "Es ist kein Fehler aufgetreten."
1139
statema... 2018.06.05 17:03:06.042   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateUpdateRetryCounter"
1140
statema... 2018.06.05 17:03:06.042   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateUpdateRetryCounter"
1141
default    2018.06.05 17:03:06.042   StateUpdateRetryCounter::run(core/states/StateUpdateRetryCounter.cpp:22)   : StateUpdateRetryCounter::run()
1142
card_pcsc  2018.06.05 17:03:06.042   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "00a4020c02011c"
1143
card_pcsc  2018.06.05 17:03:06.077   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1144
card_pcsc  2018.06.05 17:03:06.077   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "9000"
1145
card_pcsc  2018.06.05 17:03:06.077   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0022c1a412800a04007f0007020204020283010384010d"
1146
card_pcsc  2018.06.05 17:03:06.104   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1147
card_pcsc  2018.06.05 17:03:06.104   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "9000"
1148
card       2018.06.05 17:03:06.104   Reader::getRetryCounter(card/base/Reader.cpp:151)                          : StatusCode:  SUCCESS
1149
support    2018.06.05 17:03:06.104 I Reader::updateRetryCounter(card/base/Reader.cpp:103)                       : retrieved retry counter: 3 , was: 3 , PIN deactivated: false
1150
card       2018.06.05 17:03:06.104   BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42)         : ReturnCode of internal execute: OK
1151
default    2018.06.05 17:03:06.104   ...r::onUpdateRetryCounterDone(core/states/StateUpdateRetryCounter.cpp:39) : StateUpdateRetryCounter::onUpdateRetryCounterDone()
1152
statema... 2018.06.05 17:03:06.105   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateUpdateRetryCounter" with status: No_Error | "Es ist kein Fehler aufgetreten."
1153
statema... 2018.06.05 17:03:06.105   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateHandleRetryCounter"
1154
statema... 2018.06.05 17:03:06.105   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateHandleRetryCounter"
1155
default    2018.06.05 17:03:06.105   StateHandleRetryCounter::run(core/states/StateHandleRetryCounter.cpp:37)   : PIN allowed
1156
statema... 2018.06.05 17:03:06.105   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateHandleRetryCounter" with status: No_Error | "Es ist kein Fehler aufgetreten."
1157
statema... 2018.06.05 17:03:06.105   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateEstablishPacePin"
1158
statema... 2018.06.05 17:03:13.050   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateEstablishPacePin"
1159
default    2018.06.05 17:03:13.050   AuthContext::encodeEffectiveChat(core/context/AuthContext.cpp:223)         : Using effective chat: "7f4c12060904007f0007030102025305000503fb04"
1160
default    2018.06.05 17:03:13.050   StateEstablishPacePin::run(core/states/StateEstablishPacePin.cpp:38)       : Establish connection using PIN
1161
support    2018.06.05 17:03:13.051 I ...ionWorker::establishPaceChannel(card/base/CardConnectionWorker.cpp:179) : Starting PACE for PACE_PIN
1162
card       2018.06.05 17:03:13.052   const(card/base/pace/PaceHandler.cpp:141)                                  : Use ECDH with standardized domain parameters:  "0.4.0.127.0.7.2.2.4.2.2"
1163
card       2018.06.05 17:03:13.052   ...urveFactory::createCurve(card/base/pace/ec/EllipticCurveFactory.cpp:41) : Create elliptic curve  brainpoolP256r1
1164
card_pcsc  2018.06.05 17:03:13.052   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "00a4020c02011c"
1165
card_pcsc  2018.06.05 17:03:13.065   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1166
card_pcsc  2018.06.05 17:03:13.066   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "9000"
1167
card_pcsc  2018.06.05 17:03:13.066   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0022c1a427800a04007f0007020204020283010384010d7f4c12060904007f0007030102025305000503fb04"
1168
card_pcsc  2018.06.05 17:03:13.106   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1169
card_pcsc  2018.06.05 17:03:13.106   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "9000"
1170
card_pcsc  2018.06.05 17:03:13.106   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "10860000027c0000"
1171
card_pcsc  2018.06.05 17:03:13.161   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1172
card_pcsc  2018.06.05 17:03:13.161   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "7c1280106fa32b995effb8fe649eed001ac073669000"
1173
card_pcsc  2018.06.05 17:03:13.162   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "10860000457c43814104a9871b2ca0aa8c2879151ac0ca3f546a04bb1237f7ec1fff270ec47f5e4e71f2673d078021916f92b318dd23645c28795492f6af8aaab45d7db255b1224f562700"
1174
card_pcsc  2018.06.05 17:03:13.389   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1175
card_pcsc  2018.06.05 17:03:13.389   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "7c43824104a7753fdb4a2698defd648861846bc8d1f2f21739d51441cfd2361f37fd58c40e2fde2f2069bc6ecd9b4dcac4f1c26fbf5e4b8e2f38ef1aa90a5348136603b8079000"
1176
card_pcsc  2018.06.05 17:03:13.393   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "10860000457c4383410455909a0db3cb3ec0199f31ed9ef424904f65102fcf5ef7484adf3a6aea6ff69e7f06c424924665c932e858e3c3cd9237014d70c3e81430ff64d3ea99bdc8a59d00"
1177
card_pcsc  2018.06.05 17:03:13.555   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1178
card_pcsc  2018.06.05 17:03:13.555   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "7c4384410409bc8a9fdcb2fd2edb90ba03f658c27432639cec6cd680fbb33a6653b154a87c2ee33f7badb3fba76ca15551e6c96627fc9a75a5ddcae267e831d40cac072afc9000"
1179
card_pcsc  2018.06.05 17:03:13.556   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "008600000c7c0a8508a60c47cd46e4dc6a00"
1180
card_pcsc  2018.06.05 17:03:13.668   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1181
card_pcsc  2018.06.05 17:03:13.668   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "7c2a8608d1c2352491837192870e4445435643416549443030313034880e44454356434165494430303130339000"
1182
default    2018.06.05 17:03:13.668   ...ynamicAuthenticationData(card/base/GeneralAuthenticateResponse.cpp:219) : mCarCurr "DECVCAeID00104"
1183
default    2018.06.05 17:03:13.668   ...ynamicAuthenticationData(card/base/GeneralAuthenticateResponse.cpp:220) : mCarPrev "DECVCAeID00103"
1184
card       2018.06.05 17:03:13.668   ...reement::performMutualAuthenticate(card/base/pace/KeyAgreement.cpp:170) : Successfully authenticated
1185
card       2018.06.05 17:03:13.668   PaceHandler::establishPaceChannel(card/base/pace/PaceHandler.cpp:93)       : Pace channel established
1186
support    2018.06.05 17:03:13.669 I ...ionWorker::establishPaceChannel(card/base/CardConnectionWorker.cpp:206) : Finished PACE for PACE_PIN with result OK
1187
card       2018.06.05 17:03:13.669   BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42)         : ReturnCode of internal execute: OK
1188
statema... 2018.06.05 17:03:13.669   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateEstablishPacePin" with status: No_Error | "Es ist kein Fehler aufgetreten."
1189
statema... 2018.06.05 17:03:13.669   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateDidAuthenticateEac1"
1190
statema... 2018.06.05 17:03:13.677   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateDidAuthenticateEac1"
1191
card_pcsc  2018.06.05 17:03:13.677   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c8400000d9701088e08e08470af1753b96600"
1192
card_pcsc  2018.06.05 17:03:13.712   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1193
card_pcsc  2018.06.05 17:03:13.712   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "871101e6df2f9dd83121a7644cc0f3f08f7f58990290008e0879c4a1563e7a732a9000"
1194
card       2018.06.05 17:03:13.712   BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42)         : ReturnCode of internal execute: OK
1195
default    2018.06.05 17:03:13.712   AuthContext::encodeEffectiveChat(core/context/AuthContext.cpp:223)         : Using effective chat: "7f4c12060904007f0007030102025305000503fb04"
1196
card       2018.06.05 17:03:13.712   const(card/base/asn1/CVCertificateChainBuilder.cpp:85)                     : Get chain for authority "DECVCAeID00104"
1197
card       2018.06.05 17:03:13.712   const(card/base/asn1/CVCertificateChainBuilder.cpp:96)                     : Found valid chain QVector(CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
1198
statema... 2018.06.05 17:03:13.712   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateDidAuthenticateEac1" with status: No_Error | "Es ist kein Fehler aufgetreten."
1199
statema... 2018.06.05 17:03:13.712   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateSendDIDAuthenticateResponseEAC1"
1200
statema... 2018.06.05 17:03:13.713   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateSendDIDAuthenticateResponseEAC1"
1201
network    2018.06.05 17:03:13.713   StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213)  : Try to send raw data:
1202
 "<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n  <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n   <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n   <paos:EndpointReference>\n    <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n    <paos:MetaData>\n     <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n    </paos:MetaData>\n   </paos:EndpointReference>\n  </paos:PAOS>\n  <wsa:ReplyTo>\n   <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n  </wsa:ReplyTo>\n  <wsa:MessageID>urn:uuid:406a62fe-3535-45d1-b926-ffa165f60c5b</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n  <DIDAuthenticateResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n   <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n    <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n   </Result>\n   <AuthenticationProtocolData Protocol=\"urn:oid:1.3.162.15480.3.0.14.2\" xsi:type=\"iso:EAC1OutputType\">\n    <CertificateHolderAuthorizationTemplate>7f4c12060904007f0007030102025305000503fb04</CertificateHolderAuthorizationTemplate>\n    <EFCardAccess>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</EFCardAccess>\n    <IDPICC>09bc8a9fdcb2fd2edb90ba03f658c27432639cec6cd680fbb33a6653b154a87c</IDPICC>\n    <Challenge>627c6731116d7f92</Challenge>\n   </AuthenticationProtocolData>\n  </DIDAuthenticateResponse>\n </soap:Body>\n</soap:Envelope>\n"
1203
network    2018.06.05 17:03:13.713   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
1204
network    2018.06.05 17:03:13.713   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
1205
network    2018.06.05 17:03:13.790   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
1206
network    2018.06.05 17:03:13.791   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
1207
network    2018.06.05 17:03:13.791   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
1208
network    2018.06.05 17:03:13.791   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
1209
network    2018.06.05 17:03:13.791   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:13 GMT"
1210
network    2018.06.05 17:03:13.791   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
1211
 "<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n   <soap:Header>\n      <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id987\" refToMessageID=\"1ae20737a5f5e3dad602d47ee10111f5610d1845\"/>\n   </soap:Header>\n   <soap:Body>\n   <DIDAuthenticate xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<ConnectionHandle xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"ConnectionHandle\">\n<CardApplication>E80704007F00070302</CardApplication>\n<SlotHandle>00</SlotHandle>\n</ConnectionHandle>\n<DIDName>PIN</DIDName>\n<AuthenticationProtocolData Protocol=\"urn:oid:1.3.162.15480.3.0.14.2\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"EAC2InputType\">\n<Certificates xmlns=\"unknownNamespace\"/>\n<EphemeralPublicKey>045C767AC50E188148FED5B2BED14F6236C33EF439E79942FC7FA534649E0B75925F4C6970B7E43F36A1F5268355809E0E5FCD894BAEBB35C3D6A765A99BAF5D7F</EphemeralPublicKey>\n<Signature>5979B5237863F0452478B9DC6A2570C2C0E65299B1201BC016D14AD35FCC32E943EB31265E31AD171543A59992A24D87C3737EE87A4D9352DDFCBE741B6D6BA0</Signature>\n</AuthenticationProtocolData>\n</DIDAuthenticate>\n</soap:Body>\n</soap:Envelope>\n"
1212
paos       2018.06.05 17:03:13.791   ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:37) : "ConnectionHandle"
1213
paos       2018.06.05 17:03:13.791   ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "CardApplication"
1214
paos       2018.06.05 17:03:13.791   ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "SlotHandle"
1215
paos       2018.06.05 17:03:13.791   ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:37) : "DIDName"
1216
paos       2018.06.05 17:03:13.791   ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:37) : "AuthenticationProtocolData"
1217
paos       2018.06.05 17:03:13.792   ...parseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:80) : "Certificates"
1218
paos       2018.06.05 17:03:13.792 W ...arseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:111) : Unknown element: "Certificates"
1219
paos       2018.06.05 17:03:13.792   ...parseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:80) : "EphemeralPublicKey"
1220
paos       2018.06.05 17:03:13.792   ...parseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:80) : "Signature"
1221
network    2018.06.05 17:03:13.792   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DID_AUTHENTICATE_EAC2
1222
statema... 2018.06.05 17:03:13.792   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateSendDIDAuthenticateResponseEAC1" with status: No_Error | "Es ist kein Fehler aufgetreten."
1223
statema... 2018.06.05 17:03:13.792   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateEACAdditionalInputType"
1224
statema... 2018.06.05 17:03:13.792   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateEACAdditionalInputType"
1225
statema... 2018.06.05 17:03:13.792   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateEACAdditionalInputType" with status: No_Error | "Es ist kein Fehler aufgetreten."
1226
statema... 2018.06.05 17:03:13.792   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateProcessCertificatesFromEac2"
1227
statema... 2018.06.05 17:03:13.792   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateProcessCertificatesFromEac2"
1228
card       2018.06.05 17:03:13.792   const(card/base/asn1/CVCertificateChainBuilder.cpp:85)                     : Get chain for authority "DECVCAeID00104"
1229
card       2018.06.05 17:03:13.793   const(card/base/asn1/CVCertificateChainBuilder.cpp:96)                     : Found valid chain QVector(CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
1230
default    2018.06.05 17:03:13.793   ...catesFromEac2::run(core/states/StateProcessCertificatesFromEac2.cpp:26) : CVC chain already determined, skip further processing
1231
statema... 2018.06.05 17:03:13.793   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateProcessCertificatesFromEac2" with status: No_Error | "Es ist kein Fehler aufgetreten."
1232
statema... 2018.06.05 17:03:13.793   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateDidAuthenticateEac2"
1233
statema... 2018.06.05 17:03:13.794   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateDidAuthenticateEac2"
1234
card       2018.06.05 17:03:13.794   const(card/base/asn1/CVCertificateChainBuilder.cpp:85)                     : Get chain for authority "DECVCAeID00104"
1235
card       2018.06.05 17:03:13.794   const(card/base/asn1/CVCertificateChainBuilder.cpp:96)                     : Found valid chain QVector(CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]))
1236
card       2018.06.05 17:03:13.794   ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:125) : Performing TA MSE:Set DST
1237
card       2018.06.05 17:03:13.794   ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:126) : Sending CAR "DECVCAeID00104"
1238
card_pcsc  2018.06.05 17:03:13.794   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c2281b62d87210193a49db8bb5aea7058eb175a3704095acfd07fafce271dd9caefcf2fab9a805a8e085fe915d1c657c97000"
1239
card_pcsc  2018.06.05 17:03:13.820   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1240
card_pcsc  2018.06.05 17:03:13.820   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08e73729b5d2de0da39000"
1241
card       2018.06.05 17:03:13.820   ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:144) : Performing TA PSO:Verify Certificate
1242
card       2018.06.05 17:03:13.820   ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:145) : Sending certificate CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"])
1243
card_pcsc  2018.06.05 17:03:13.821   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "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"
1244
card_pcsc  2018.06.05 17:03:14.032   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1245
card_pcsc  2018.06.05 17:03:14.033   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08fd36a8dd22be8af49000"
1246
card       2018.06.05 17:03:14.033   ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:125) : Performing TA MSE:Set DST
1247
card       2018.06.05 17:03:14.033   ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:126) : Sending CAR "DEDVeIDDTR101433"
1248
card_pcsc  2018.06.05 17:03:14.033   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c2281b62d8721010db9672575a39e5c943b898bd0ff1b15d39d0a6ad5f18c48f471c9a57d0c10a88e08279c2db9705cfe4c00"
1249
card_pcsc  2018.06.05 17:03:14.066   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1250
card_pcsc  2018.06.05 17:03:14.066   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08191183cdc37b32d59000"
1251
card       2018.06.05 17:03:14.066   ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:144) : Performing TA PSO:Verify Certificate
1252
card       2018.06.05 17:03:14.066   ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:145) : Sending certificate CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])
1253
card_pcsc  2018.06.05 17:03:14.066   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "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"
1254
card_pcsc  2018.06.05 17:03:14.263   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1255
card_pcsc  2018.06.05 17:03:14.263   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08e317b40d4812d20f9000"
1256
card       2018.06.05 17:03:14.263   ...nalAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:178) : Performing TA MSE:Set AT
1257
card_pcsc  2018.06.05 17:03:14.263   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c2281a46d8761017b07f193ba2cc8ffafbb4d415b008b89ba73743dbb6a16cc215b59aa0d523be7999e91afca5f4f06d1cf14432f0b2ab4e6e34d71c6c3ebfcae3487984c2bf37f4d1742e0a05d437d4c10555152393899942a5144cfcd3ba23a02cc9d5b8535ae8e087b285b236e2ee84a00"
1258
card_pcsc  2018.06.05 17:03:14.319   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1259
card_pcsc  2018.06.05 17:03:14.319   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e0874089d831a71bc1a9000"
1260
card       2018.06.05 17:03:14.319   ...nalAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:194) : Performing TA External Authenticate
1261
card_pcsc  2018.06.05 17:03:14.319   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c8200005d8751016145fcd27d65a1bb6c9b745c7a7d3ca34ef91a40cf47fc2c50348c7acd8431400a0b8ce4cb3dd710fc63442645320c31ca517d6644093bb69d437fae9887db71eb63daa52ac0644b1dbabfa54a4853ca8e0889e1dd5554ab001600"
1262
card_pcsc  2018.06.05 17:03:14.462   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1263
card_pcsc  2018.06.05 17:03:14.462   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e0851ec53484c9a2be59000"
1264
card       2018.06.05 17:03:14.462   ...d::internalExecute(card/base/command/DidAuthenticateEAC2Command.cpp:82) : Performing Read EF.CardSecurity
1265
card_pcsc  2018.06.05 17:03:14.462   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d871101b1b999744e47a6d0848be158a57a9cb18e08e1739f2764dfa84a00"
1266
card_pcsc  2018.06.05 17:03:14.489   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1267
card_pcsc  2018.06.05 17:03:14.489   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08352a5a6f782da0b39000"
1268
card_pcsc  2018.06.05 17:03:14.489   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb000000d9701ff8e084a0fbaaf40b669b700"
1269
card_pcsc  2018.06.05 17:03:14.518   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1270
card_pcsc  2018.06.05 17:03:14.518   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8781e101d3230a11b7b6104b32e5203d9716366ede9b8cd81cef7473b198d7ecd09c2cd28359eb18e1622faf991a833f527b9c4dc89211ed497852898d06d92f1b64e3f0be400400f8b62967cb0d31711ecd2b90d3c8bb71c67554a822bd4ab97f75d98603b034774928490fe9e269e48615924dd35312fa87b3e26969a6e538c8b0638acfcf25a0a1df7b1791ad336138b59e70c15888ca285d0e542686703c8b8bb2a941289afd16cece011c1b3a7844d97d76e2d255d57cdce7cc55122b487005fb2b1a88a0ab7c463a8698c26025513e334740fdae6c611e4c2001fa7d7d3e0e94f8990290008e08d0c992da79b8558b9000"
1271
card_pcsc  2018.06.05 17:03:14.518   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb000df0d9701ff8e08c25ece53df9c5b2e00"
1272
card_pcsc  2018.06.05 17:03:14.546   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1273
card_pcsc  2018.06.05 17:03:14.547   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8781e1011692ce01d6afcb7f84e8a99d4614ce21e4b8826636b97978c8b7ff034a3a649fa34e793307097444045ec73b8c39a0882e2cecf1a9ae60efd940f29f74a75e54ece000e3c5bf3ce96c220280db73d6d231741c2323648d39d9cdb40658a4109de9be41ae4efff4ebdf8f353638eddd5ecb3d5c75db701bf0cc966675d2af36a72af0a4390754e3695f5edffc45fb22951e64b51e9c71f246787eaa138d915775358d8bf23f12a5aeabc9e61b5e4c991cb04f6c65dde0543df350a4c3b523de8fb10efa2a229612bbed93f8e15311b5bbd3d6fa1cb9a4bcbdaa14d68dbece09d1990290008e08e0dff65098f8b1679000"
1274
card_pcsc  2018.06.05 17:03:14.547   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb001be0d9701ff8e0837d3f69b334156c000"
1275
card_pcsc  2018.06.05 17:03:14.575   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1276
card_pcsc  2018.06.05 17:03:14.575   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8781e10122d39b83106bcb710c1ed8fcce2c8485b6578f83ce44cb9886473d2a0b3affe3e4bd856f7027a0216a658dec1024771bbbed13854ec1e8a20e8887485784b56a5896cbb00eafe1950058514e06eb3b0166fdbc889ebdc3ad5437d10b26f2e661add4a0c30cb9a298d88f3274721859babbc773723cb30d94112a5468769da49a2045b6aa715e074557d1acdcae9715955998844ddb42b195799c0783aa34766d207db8b01b339525fe936e56e3b5486bf5ccce6c26f5917bd394398fb83eaa652c4e24398e012bffbc2be4886aca0150f813342b56f212d5c5a15e5b252a2a61990290008e086059c64c0c12bf899000"
1277
card_pcsc  2018.06.05 17:03:14.575   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0029d0d9701ff8e085dc89176a7cb1a2f00"
1278
card_pcsc  2018.06.05 17:03:14.604   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1279
card_pcsc  2018.06.05 17:03:14.604   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8781e10118f5d49d1507fea7a7190e767433a6ab8a787c06314d3956d0df3edc09c178a482b19662b8828676f64637a05126ec5dedbf19142a3842c71dcd5df063ad156f95b1edabd74c0bfc275989d61c09b9a8a7f4f5596e83d346cfff58d97d0e011b76a7b8bad4e3d55e0491c06e13603b86d1d09e49896e5ee098ca3143c457cbf363fce3d18e4e4b39bc16a53cb7b28b78d81fc95f0a31ee84f5a031aef76ff5ded73ac9e04d98d9ad27efe24a18372f513ece1726022390d3951c1dc9c7763da1d4301d0db23c0d84401878c169429fcb9bdbfe82b6b6c854bef4dd2204c25fa8990290008e0839f4d58ab28d1be39000"
1280
card_pcsc  2018.06.05 17:03:14.604   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0037c0d9701ff8e0826a828870f81fed900"
1281
card_pcsc  2018.06.05 17:03:14.633   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1282
card_pcsc  2018.06.05 17:03:14.633   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8781e1019b166593af3f13d9fd3b42e8b6bcc02d273ab227d95e38d8445e665dd452508d7de7c4af598d669f381014d43705f36fa2ef841167faf2fdf76e8ade386d5e2c5fc86d3428b1cc2191340e08f87428aae876cb6f1b6eaedfd727740ae38afac30bc7b998805cba16e8e2f209ac7a7fb22157054955ffd98d9b274adacbc62b14a2f428993413b2a1571aafac1f51e8998131614f6e5a4e67d818b198d9c58f0cc4aabb446109878619c1750f4dde310fefb73b4f52b4db42d1cf56a37aa947e58949185562d62891ab75245aa5e623417506ab4340f5f374be630d8b0911beac990290008e083f58eaec5fb3241b9000"
1283
card_pcsc  2018.06.05 17:03:14.633   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0045b0d9701ff8e08eb77b31952d6bc8e00"
1284
card_pcsc  2018.06.05 17:03:14.661   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1285
card_pcsc  2018.06.05 17:03:14.661   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8781e1014df5d9e0e5cea4f7ae1417500f7fc3a89670b1d1f9e2cd1aa6997476ba5fe7c051a6b5417fffd2e71d05ecd88536857739ca7ff28bd7dfe45032621122063dccb7efb310e53485cd3a1f8e65b0833d09d7d15290fedb1b0ea569fcbed49b9ac1198124fdee3de38ab9838e0846d375c3056f8d0bdaf84b152940f5b71e29fbf3d49462f3e107eb5eae7fc69002a228945f12880095adf905471088cda96e280debf5769295231ef3495f87b7bdc848e774eb846e4766a959d8d4283f0d165465835342b4258547dcbd442fa6b9cd0b98292ed35eae7100074a1bb66debd585fb990290008e081c02f03744352f729000"
1286
card_pcsc  2018.06.05 17:03:14.661   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0053a0d9701ff8e088ef313f395c99f8f00"
1287
card_pcsc  2018.06.05 17:03:14.690   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1288
card_pcsc  2018.06.05 17:03:14.690   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8781e10163d7023a973a25de36edca57e1f1adaf7da59e172b5968d6d76c73b588a26c542a1ee96e698d93414da9d49d80c2ad53768a1e3bb7c298d39338afe9535d30b6020ccab688b929ec6b6069c281ea3c725d09aa827ba421cef647d632840c22996bcba92b6c2a143e5365a8ea6ac1d4be9a5024807992bee59b83e9ab82822d434fbf6cc7c1867c9e5f6a3370a0abcb6f17ff8e3095aac7af88780ff02edb837598e361faf5dc16fdbb69bff4132fc1dd98d197404dfa86d5e0c8a7cb62272f711a72f8fb04e4aff3a5fa5b74899d545c4320f4e7ff1d07917c5af41d01369751990290008e08d91de53d9b294f799000"
1289
card_pcsc  2018.06.05 17:03:14.690   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb006190d9701ff8e086baa3c533a2cb01b00"
1290
card_pcsc  2018.06.05 17:03:14.715   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1291
card_pcsc  2018.06.05 17:03:14.715   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "878181018c06f310b1d97ad53403af720a5446c428ad38281a44aca3449cdbea94e3f4414c743760fa148096485a8f91e15a3118f0e2130b5cc9ec29a00bd53886b072eeefd9fe3d101b6cf4da1515ce12b221167127fbf33a7686e2bd525e6a3fde11a2c60c1f56c78d2d98c35bc8d7f4c9d4f3d0a6af69602e1bb7dcdf7f1e758664b1990262828e08aeab8aa50b71ad6e6282"
1292
card       2018.06.05 17:03:14.716   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73)                 : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.2"
1293
card       2018.06.05 17:03:14.716   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:67)                 : Parsed ChipAuthenticationInfo
1294
card       2018.06.05 17:03:14.716   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:61)                 : Parsed PACEInfo
1295
card       2018.06.05 17:03:14.716   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73)                 : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.5.2.3"
1296
card       2018.06.05 17:03:14.716   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73)                 : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.5.2.3"
1297
card       2018.06.05 17:03:14.716   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73)                 : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.5.2"
1298
card       2018.06.05 17:03:14.716   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73)                 : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.3.2"
1299
card       2018.06.05 17:03:14.716   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73)                 : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.6"
1300
card       2018.06.05 17:03:14.716   SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73)                 : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.1.2"
1301
card       2018.06.05 17:03:14.717   ...::internalExecute(card/base/command/DidAuthenticateEAC2Command.cpp:106) : Chose ChipAuthenticationInfo(0): protocol "0.4.0.127.0.7.2.2.3.2.2" , keyId "48"
1302
card       2018.06.05 17:03:14.717   ...hipAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:221) : Performing CA MSE:Set AT
1303
card_pcsc  2018.06.05 17:03:14.717   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c2241a41d871101ccf704d26c8074370fdde8d0a5c122c78e085a021429e6e696dd00"
1304
card_pcsc  2018.06.05 17:03:14.750   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1305
card_pcsc  2018.06.05 17:03:14.750   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08949515b2e9bd3b839000"
1306
card       2018.06.05 17:03:14.750   ...hipAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:237) : Performing CA General Authenticate
1307
card_pcsc  2018.06.05 17:03:14.750   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c860000608751012a6a4d1f01e3be6a7280b136feb3eb5a6f1ca92bb5fb9e301bbc7e8fdeec134f9c5cb2a026123130956fa56facc740e54d01285fe721c80eed0c48559fe7127b1f334b426707c86ca4a063741248dffd9701008e088cc3baac2095d3e100"
1308
card_pcsc  2018.06.05 17:03:14.885   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1309
card_pcsc  2018.06.05 17:03:14.885   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8721010ebed2d293e76e9cacaa87c50103de030ce4712d627b288d1789edc3c57c4387990290008e089e3c54ce6cbf86769000"
1310
card       2018.06.05 17:03:14.885   BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42)         : ReturnCode of internal execute: OK
1311
statema... 2018.06.05 17:03:14.885   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateDidAuthenticateEac2" with status: No_Error | "Es ist kein Fehler aufgetreten."
1312
statema... 2018.06.05 17:03:14.886   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateSendDIDAuthenticateResponseEAC2"
1313
statema... 2018.06.05 17:03:14.886   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateSendDIDAuthenticateResponseEAC2"
1314
network    2018.06.05 17:03:14.886   StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213)  : Try to send raw data:
1315
 "<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n  <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n   <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n   <paos:EndpointReference>\n    <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n    <paos:MetaData>\n     <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n    </paos:MetaData>\n   </paos:EndpointReference>\n  </paos:PAOS>\n  <wsa:ReplyTo>\n   <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n  </wsa:ReplyTo>\n  <wsa:MessageID>urn:uuid:363ae23e-d201-4aea-b5b2-c75a30bcf375</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n  <DIDAuthenticateResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n   <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n    <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n   </Result>\n   <AuthenticationProtocolData Protocol=\"urn:oid:1.3.162.15480.3.0.14.2\" xsi:type=\"iso:EAC2OutputType\">\n    <EFCardSecurity>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</EFCardSecurity>\n    <AuthenticationToken>7a4636428e26853d</AuthenticationToken>\n    <Nonce>72b85c1b90884976</Nonce>\n   </AuthenticationProtocolData>\n  </DIDAuthenticateResponse>\n </soap:Body>\n</soap:Envelope>\n"
1316
network    2018.06.05 17:03:14.887   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
1317
network    2018.06.05 17:03:14.887   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
1318
network    2018.06.05 17:03:15.052   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
1319
network    2018.06.05 17:03:15.053   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
1320
network    2018.06.05 17:03:15.053   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
1321
network    2018.06.05 17:03:15.053   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
1322
network    2018.06.05 17:03:15.053   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:14 GMT"
1323
network    2018.06.05 17:03:15.053   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
1324
 "<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n   <soap:Header>\n      <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id988\" refToMessageID=\"1ae20737a5f5e3dad602d47ee10111f5610d1845\"/>\n   </soap:Header>\n   <soap:Body>\n   <Transmit xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<SlotHandle>00</SlotHandle>\n<InputAPDUInfo>\n<InputAPDU>0CA4040C1D87110105C2C9FE7D03CA395864995204E80D4B8E08B9671BCE4A8DBEC800</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>8C2080001D8711019B276E66F9206FE7362D2431918F7AE58E0824D7196D7C5B815600</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0C2241A41D871101C703EF9268BCCF87464BA3AE6B2D302E8E08CDE9A75FC65DB69300</InputAPDU>\n<AcceptableStatusCode>9000</AcceptableStatusCode>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<Input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nputAPDU>\n<AcceptableStatusCode>9000</AcceptableStatusCode>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0C2241A41D87110141256CBB8D37B069575ABFD81C8A6C4C8E089ADFF63F7133B83100</InputAPDU>\n<AcceptableStatusCode>9000</AcceptableStatusCode>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<Input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nputAPDU>\n<AcceptableStatusCode>9000</AcceptableStatusCode>\n</InputAPDUInfo>\n</Transmit>\n</soap:Body>\n</soap:Envelope>\n"
1325
paos       2018.06.05 17:03:15.053   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "SlotHandle"
1326
paos       2018.06.05 17:03:15.053   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1327
paos       2018.06.05 17:03:15.053   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1328
paos       2018.06.05 17:03:15.053   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1329
paos       2018.06.05 17:03:15.053   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1330
paos       2018.06.05 17:03:15.053   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1331
paos       2018.06.05 17:03:15.053   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1332
paos       2018.06.05 17:03:15.054   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode"
1333
paos       2018.06.05 17:03:15.054   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1334
paos       2018.06.05 17:03:15.054   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1335
paos       2018.06.05 17:03:15.054   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode"
1336
paos       2018.06.05 17:03:15.054   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1337
paos       2018.06.05 17:03:15.054   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1338
paos       2018.06.05 17:03:15.054   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode"
1339
paos       2018.06.05 17:03:15.054   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1340
paos       2018.06.05 17:03:15.054   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1341
paos       2018.06.05 17:03:15.054   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode"
1342
network    2018.06.05 17:03:15.054   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: TRANSMIT
1343
statema... 2018.06.05 17:03:15.054   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateSendDIDAuthenticateResponseEAC2" with status: No_Error | "Es ist kein Fehler aufgetreten."
1344
statema... 2018.06.05 17:03:15.054   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateTransmit"
1345
statema... 2018.06.05 17:03:15.055   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateTransmit"
1346
card_pcsc  2018.06.05 17:03:15.055   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4040c1d87110105c2c9fe7d03ca395864995204e80d4b8e08b9671bce4a8dbec800"
1347
card_pcsc  2018.06.05 17:03:15.081   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1348
card_pcsc  2018.06.05 17:03:15.081   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08fb644ff4e0f6138f9000"
1349
card_pcsc  2018.06.05 17:03:15.081   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "8c2080001d8711019b276e66f9206fe7362d2431918f7ae58e0824d7196d7c5b815600"
1350
card_pcsc  2018.06.05 17:03:15.105   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1351
card_pcsc  2018.06.05 17:03:15.105   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08e685095d83ad2a429000"
1352
card_pcsc  2018.06.05 17:03:15.105   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c2241a41d871101c703ef9268bccf87464ba3ae6b2d302e8e08cde9a75fc65db69300"
1353
card_pcsc  2018.06.05 17:03:15.157   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1354
card_pcsc  2018.06.05 17:03:15.157   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e089568edfa8e91e83b9000"
1355
card_pcsc  2018.06.05 17:03:15.157   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "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"
1356
card_pcsc  2018.06.05 17:03:15.301   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1357
card_pcsc  2018.06.05 17:03:15.301   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "873101d10c4b2efc4970c434a90779bc6fd622a753c762f0a038faf0d2951c2d3c9a1c3c498b2f57c4ee85fa92e71480fe2f4e990290008e08a3f5d521ea0cd2539000"
1358
card_pcsc  2018.06.05 17:03:15.301   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0c2241a41d87110141256cbb8d37b069575abfd81c8a6c4c8e089adff63f7133b83100"
1359
card_pcsc  2018.06.05 17:03:15.354   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1360
card_pcsc  2018.06.05 17:03:15.354   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08a499289edd46bba19000"
1361
card_pcsc  2018.06.05 17:03:15.354   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "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"
1362
card_pcsc  2018.06.05 17:03:15.496   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1363
card_pcsc  2018.06.05 17:03:15.496   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8731011286468e47ca34252f41571042b3cc451ad50e0516c8aac382642f98aeca85c67639eb15ff0ea28c34dca6dce545c58e990290008e08d7ab59d0fe961a1b9000"
1364
card       2018.06.05 17:03:15.496   TransmitCommand::internalExecute(card/base/command/TransmitCommand.cpp:74) : transmit end
1365
card       2018.06.05 17:03:15.496   BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42)         : ReturnCode of internal execute: OK
1366
statema... 2018.06.05 17:03:15.496   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateTransmit" with status: No_Error | "Es ist kein Fehler aufgetreten."
1367
statema... 2018.06.05 17:03:15.496   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateSendTransmitResponse"
1368
statema... 2018.06.05 17:03:15.496   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateSendTransmitResponse"
1369
network    2018.06.05 17:03:15.497   StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213)  : Try to send raw data:
1370
 "<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n  <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n   <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n   <paos:EndpointReference>\n    <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n    <paos:MetaData>\n     <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n    </paos:MetaData>\n   </paos:EndpointReference>\n  </paos:PAOS>\n  <wsa:ReplyTo>\n   <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n  </wsa:ReplyTo>\n  <wsa:MessageID>urn:uuid:fed7631f-51b6-4cb9-b86a-37fc90adb611</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n  <TransmitResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n   <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n    <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n   </Result>\n   <OutputAPDU>990290008e08fb644ff4e0f6138f9000</OutputAPDU>\n   <OutputAPDU>990290008e08e685095d83ad2a429000</OutputAPDU>\n   <OutputAPDU>990290008e089568edfa8e91e83b9000</OutputAPDU>\n   <OutputAPDU>873101d10c4b2efc4970c434a90779bc6fd622a753c762f0a038faf0d2951c2d3c9a1c3c498b2f57c4ee85fa92e71480fe2f4e990290008e08a3f5d521ea0cd2539000</OutputAPDU>\n   <OutputAPDU>990290008e08a499289edd46bba19000</OutputAPDU>\n   <OutputAPDU>8731011286468e47ca34252f41571042b3cc451ad50e0516c8aac382642f98aeca85c67639eb15ff0ea28c34dca6dce545c58e990290008e08d7ab59d0fe961a1b9000</OutputAPDU>\n  </TransmitResponse>\n </soap:Body>\n</soap:Envelope>\n"
1371
network    2018.06.05 17:03:15.497   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
1372
network    2018.06.05 17:03:15.497   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
1373
network    2018.06.05 17:03:15.602   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
1374
network    2018.06.05 17:03:15.602   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
1375
network    2018.06.05 17:03:15.603   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
1376
network    2018.06.05 17:03:15.603   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
1377
network    2018.06.05 17:03:15.603   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:14 GMT"
1378
network    2018.06.05 17:03:15.603   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
1379
 "<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n   <soap:Header>\n      <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id989\" refToMessageID=\"1ae20737a5f5e3dad602d47ee10111f5610d1845\"/>\n   </soap:Header>\n   <soap:Body>\n   <Transmit xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<SlotHandle>00</SlotHandle>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D8711019593B01D701BE8101C171C7C67D2548E8E08AF5E3BC2524528B900</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08B914A5F75E39DB500000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101A6A3B38AFE28F078568293E5DDD04B5C8E0807C14C3EBAC1F63D00</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E0886C460276A3E25C80000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D8711013D7F273C5ECCF360EACE633DF61DE5B18E082192AAECC2DFD2E700</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E083EC8BE7BB7768C690000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D8711012518211B9E57FBC4EB261E1848CD8CA48E0888152E5EC6C90AE800</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08E93BC9DA4D5C3ADF0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D87110130CED76AB1962EA1087750B3C817A9298E08CF028E8AC1448DDB00</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08ABC8E01BEDDAE10E0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D87110126CCF9D96AE522CBC9A1610D9A828E878E08E7E0678028E9D3C200</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E082C027679D2AF8F2E0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D87110118B4D21246B2AA395CDB93AB6C94E7938E08A544D4A28602396200</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E088264F9B59EB9DA200000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101D9F69C4CE1968DEF293726739A3259508E0862B1586A4E7E73B900</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08B0FA651E89A8F99A0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101389CA1906176BD57C8165BCAA9513D558E08A608E9319219E5B100</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E0833471036F62EF8FE0000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101434DB6309DF4C9B0A3A44E173344D2BE8E08AC8A4BBA53F1B91E00</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08D00483DCF88E77530000</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CA4020C1D871101249DB13FAF31319394CF9C6322FEFE598E083927F2F6074925E400</InputAPDU>\n</InputAPDUInfo>\n<InputAPDUInfo>\n<InputAPDU>0CB0000000000E970200008E08F70714CD8CD826720000</InputAPDU>\n</InputAPDUInfo>\n</Transmit>\n</soap:Body>\n</soap:Envelope>\n"
1380
paos       2018.06.05 17:03:15.603   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "SlotHandle"
1381
paos       2018.06.05 17:03:15.603   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1382
paos       2018.06.05 17:03:15.603   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1383
paos       2018.06.05 17:03:15.603   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1384
paos       2018.06.05 17:03:15.603   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1385
paos       2018.06.05 17:03:15.603   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1386
paos       2018.06.05 17:03:15.603   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1387
paos       2018.06.05 17:03:15.603   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1388
paos       2018.06.05 17:03:15.603   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1389
paos       2018.06.05 17:03:15.603   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1390
paos       2018.06.05 17:03:15.604   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1391
paos       2018.06.05 17:03:15.604   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1392
paos       2018.06.05 17:03:15.604   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1393
paos       2018.06.05 17:03:15.604   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1394
paos       2018.06.05 17:03:15.604   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1395
paos       2018.06.05 17:03:15.604   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1396
paos       2018.06.05 17:03:15.604   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1397
paos       2018.06.05 17:03:15.604   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1398
paos       2018.06.05 17:03:15.604   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1399
paos       2018.06.05 17:03:15.604   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1400
paos       2018.06.05 17:03:15.604   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1401
paos       2018.06.05 17:03:15.604   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1402
paos       2018.06.05 17:03:15.604   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1403
paos       2018.06.05 17:03:15.604   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1404
paos       2018.06.05 17:03:15.604   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1405
paos       2018.06.05 17:03:15.604   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1406
paos       2018.06.05 17:03:15.605   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1407
paos       2018.06.05 17:03:15.605   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1408
paos       2018.06.05 17:03:15.605   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1409
paos       2018.06.05 17:03:15.605   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1410
paos       2018.06.05 17:03:15.605   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1411
paos       2018.06.05 17:03:15.605   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1412
paos       2018.06.05 17:03:15.605   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1413
paos       2018.06.05 17:03:15.605   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1414
paos       2018.06.05 17:03:15.605   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1415
paos       2018.06.05 17:03:15.605   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1416
paos       2018.06.05 17:03:15.605   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1417
paos       2018.06.05 17:03:15.605   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1418
paos       2018.06.05 17:03:15.605   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1419
paos       2018.06.05 17:03:15.605   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1420
paos       2018.06.05 17:03:15.605   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1421
paos       2018.06.05 17:03:15.605   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1422
paos       2018.06.05 17:03:15.605   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1423
paos       2018.06.05 17:03:15.606   TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30)     : "InputAPDUInfo"
1424
paos       2018.06.05 17:03:15.606   ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU"
1425
network    2018.06.05 17:03:15.606   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: TRANSMIT
1426
statema... 2018.06.05 17:03:15.606   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateSendTransmitResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
1427
statema... 2018.06.05 17:03:15.606   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateTransmit"
1428
statema... 2018.06.05 17:03:15.606   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateTransmit"
1429
card_pcsc  2018.06.05 17:03:15.607   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d8711019593b01d701be8101c171c7c67d2548e8e08af5e3bc2524528b900"
1430
card_pcsc  2018.06.05 17:03:15.636   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1431
card_pcsc  2018.06.05 17:03:15.636   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08c90b0bb89951795b9000"
1432
card_pcsc  2018.06.05 17:03:15.636   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08b914a5f75e39db500000"
1433
card_pcsc  2018.06.05 17:03:15.660   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1434
card_pcsc  2018.06.05 17:03:15.660   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "871101c3ea04af1c25f27cfa93fcbcb6a0c5e9990290008e085b65a4d635a9bdcb9000"
1435
card_pcsc  2018.06.05 17:03:15.660   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d871101a6a3b38afe28f078568293e5ddd04b5c8e0807c14c3ebac1f63d00"
1436
card_pcsc  2018.06.05 17:03:15.684   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1437
card_pcsc  2018.06.05 17:03:15.684   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08b16ffc961669d1439000"
1438
card_pcsc  2018.06.05 17:03:15.684   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e0886c460276a3e25c80000"
1439
card_pcsc  2018.06.05 17:03:15.708   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1440
card_pcsc  2018.06.05 17:03:15.708   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8711017735b40677757b27e10e07006bc7a51e990290008e08c6c3fa1ffbcf85f99000"
1441
card_pcsc  2018.06.05 17:03:15.708   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d8711013d7f273c5eccf360eace633df61de5b18e082192aaecc2dfd2e700"
1442
card_pcsc  2018.06.05 17:03:15.738   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1443
card_pcsc  2018.06.05 17:03:15.738   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e0895f9b6734e04c2839000"
1444
card_pcsc  2018.06.05 17:03:15.738   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e083ec8be7bb7768c690000"
1445
card_pcsc  2018.06.05 17:03:15.762   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1446
card_pcsc  2018.06.05 17:03:15.763   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "87210187c5a367aadb8bed3b3f9d91afdad53654b6c5d0aa4f72d15de4ba94caee0f97990290008e082e7ec124d93b568f9000"
1447
card_pcsc  2018.06.05 17:03:15.763   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d8711012518211b9e57fbc4eb261e1848cd8ca48e0888152e5ec6c90ae800"
1448
card_pcsc  2018.06.05 17:03:15.787   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1449
card_pcsc  2018.06.05 17:03:15.787   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08432d5f8b0fc76de09000"
1450
card_pcsc  2018.06.05 17:03:15.787   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08e93bc9da4d5c3adf0000"
1451
card_pcsc  2018.06.05 17:03:15.811   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1452
card_pcsc  2018.06.05 17:03:15.812   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "871101ce082982b2e4359cea4a6765e239b5a6990290008e087e3600374c0ed8fe9000"
1453
card_pcsc  2018.06.05 17:03:15.812   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d87110130ced76ab1962ea1087750b3c817a9298e08cf028e8ac1448ddb00"
1454
card_pcsc  2018.06.05 17:03:15.840   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1455
card_pcsc  2018.06.05 17:03:15.840   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08151b1f982bc280e39000"
1456
card_pcsc  2018.06.05 17:03:15.840   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08abc8e01beddae10e0000"
1457
card_pcsc  2018.06.05 17:03:15.865   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1458
card_pcsc  2018.06.05 17:03:15.865   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "871101ae036772348cd7b85581ea1b9176cc2d990290008e083cce0d111bde233f9000"
1459
card_pcsc  2018.06.05 17:03:15.865   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d87110126ccf9d96ae522cbc9a1610d9a828e878e08e7e0678028e9d3c200"
1460
card_pcsc  2018.06.05 17:03:15.889   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1461
card_pcsc  2018.06.05 17:03:15.889   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e086d5b07869605a7f99000"
1462
card_pcsc  2018.06.05 17:03:15.890   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e082c027679d2af8f2e0000"
1463
card_pcsc  2018.06.05 17:03:15.914   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1464
card_pcsc  2018.06.05 17:03:15.914   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8711017968e4bc3fe6cb693283f49c380909de990290008e0876764c629045ab419000"
1465
card_pcsc  2018.06.05 17:03:15.915   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d87110118b4d21246b2aa395cdb93ab6c94e7938e08a544d4a28602396200"
1466
card_pcsc  2018.06.05 17:03:15.943   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1467
card_pcsc  2018.06.05 17:03:15.943   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08b169f33b66f18e909000"
1468
card_pcsc  2018.06.05 17:03:15.943   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e088264f9b59eb9da200000"
1469
card_pcsc  2018.06.05 17:03:15.968   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1470
card_pcsc  2018.06.05 17:03:15.968   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "8711011c597ef969ad0795b47027e959b68bb3990290008e089ce10ba4f3555d709000"
1471
card_pcsc  2018.06.05 17:03:15.968   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d871101d9f69c4ce1968def293726739a3259508e0862b1586a4e7e73b900"
1472
card_pcsc  2018.06.05 17:03:15.993   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1473
card_pcsc  2018.06.05 17:03:15.993   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e083dfe8b1873f2a1dd9000"
1474
card_pcsc  2018.06.05 17:03:15.993   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08b0fa651e89a8f99a0000"
1475
card_pcsc  2018.06.05 17:03:16.019   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1476
card_pcsc  2018.06.05 17:03:16.019   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "872101db06d0888659db3391b61be774283d68122fec2b272da7ec8f5a385274b5eac8990290008e0841b756fe47e1322f9000"
1477
card_pcsc  2018.06.05 17:03:16.019   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d871101389ca1906176bd57c8165bcaa9513d558e08a608e9319219e5b100"
1478
card_pcsc  2018.06.05 17:03:16.037   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1479
card_pcsc  2018.06.05 17:03:16.037   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "99026a828e08337493822f09e4276a82"
1480
card_pcsc  2018.06.05 17:03:16.037   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e0833471036f62ef8fe0000"
1481
card_pcsc  2018.06.05 17:03:16.062   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1482
card_pcsc  2018.06.05 17:03:16.062   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "872101dd05690c315a584c90ab4ecbdefe7f21a776fb170e8f193cc03cace461660e6a990290008e08b39a905b12f409409000"
1483
card_pcsc  2018.06.05 17:03:16.062   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d871101434db6309df4c9b0a3a44e173344d2be8e08ac8a4bba53f1b91e00"
1484
card_pcsc  2018.06.05 17:03:16.094   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1485
card_pcsc  2018.06.05 17:03:16.094   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "990290008e08e3bbe31346cbeb049000"
1486
card_pcsc  2018.06.05 17:03:16.094   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08d00483dcf88e77530000"
1487
card_pcsc  2018.06.05 17:03:16.122   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1488
card_pcsc  2018.06.05 17:03:16.122   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "874101182e633026e2865d86e0e90e2ae323ca68ee56a1425a473495dac65db32d18bfbfaeabbb3c33996f62e85ec9aae06b8e6485ad2d827d1add9df44e57b83e717d990290008e08271e0d4aac9814c39000"
1489
card_pcsc  2018.06.05 17:03:16.122   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0ca4020c1d871101249db13faf31319394cf9c6322fefe598e083927f2f6074925e400"
1490
card_pcsc  2018.06.05 17:03:16.140   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1491
card_pcsc  2018.06.05 17:03:16.140   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "99026a828e0830ee77d9b3bf0b096a82"
1492
card_pcsc  2018.06.05 17:03:16.140   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08f70714cd8cd826720000"
1493
card_pcsc  2018.06.05 17:03:16.167   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1494
card_pcsc  2018.06.05 17:03:16.167   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "874101cca8e4c08e9b238d0b319cc0e1d9f9fcee4825eb1d0060785bdc8a887825958fd4d884abb6eef3129fcc5755f555105eb8762a0791d7c597ecf2fde684328181990290008e08c3a7e036af59fb169000"
1495
card       2018.06.05 17:03:16.167   TransmitCommand::internalExecute(card/base/command/TransmitCommand.cpp:74) : transmit end
1496
card       2018.06.05 17:03:16.168   BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42)         : ReturnCode of internal execute: OK
1497
statema... 2018.06.05 17:03:16.168   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateTransmit" with status: No_Error | "Es ist kein Fehler aufgetreten."
1498
statema... 2018.06.05 17:03:16.168   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateSendTransmitResponse"
1499
statema... 2018.06.05 17:03:16.168   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateSendTransmitResponse"
1500
network    2018.06.05 17:03:16.169   StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213)  : Try to send raw data:
1501
 "<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n  <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n   <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n   <paos:EndpointReference>\n    <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n    <paos:MetaData>\n     <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n    </paos:MetaData>\n   </paos:EndpointReference>\n  </paos:PAOS>\n  <wsa:ReplyTo>\n   <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n  </wsa:ReplyTo>\n  <wsa:MessageID>urn:uuid:6a72c135-f254-470d-b031-720c178f2f33</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n  <TransmitResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n   <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n    <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n   </Result>\n   <OutputAPDU>990290008e08c90b0bb89951795b9000</OutputAPDU>\n   <OutputAPDU>871101c3ea04af1c25f27cfa93fcbcb6a0c5e9990290008e085b65a4d635a9bdcb9000</OutputAPDU>\n   <OutputAPDU>990290008e08b16ffc961669d1439000</OutputAPDU>\n   <OutputAPDU>8711017735b40677757b27e10e07006bc7a51e990290008e08c6c3fa1ffbcf85f99000</OutputAPDU>\n   <OutputAPDU>990290008e0895f9b6734e04c2839000</OutputAPDU>\n   <OutputAPDU>87210187c5a367aadb8bed3b3f9d91afdad53654b6c5d0aa4f72d15de4ba94caee0f97990290008e082e7ec124d93b568f9000</OutputAPDU>\n   <OutputAPDU>990290008e08432d5f8b0fc76de09000</OutputAPDU>\n   <OutputAPDU>871101ce082982b2e4359cea4a6765e239b5a6990290008e087e3600374c0ed8fe9000</OutputAPDU>\n   <OutputAPDU>990290008e08151b1f982bc280e39000</OutputAPDU>\n   <OutputAPDU>871101ae036772348cd7b85581ea1b9176cc2d990290008e083cce0d111bde233f9000</OutputAPDU>\n   <OutputAPDU>990290008e086d5b07869605a7f99000</OutputAPDU>\n   <OutputAPDU>8711017968e4bc3fe6cb693283f49c380909de990290008e0876764c629045ab419000</OutputAPDU>\n   <OutputAPDU>990290008e08b169f33b66f18e909000</OutputAPDU>\n   <OutputAPDU>8711011c597ef969ad0795b47027e959b68bb3990290008e089ce10ba4f3555d709000</OutputAPDU>\n   <OutputAPDU>990290008e083dfe8b1873f2a1dd9000</OutputAPDU>\n   <OutputAPDU>872101db06d0888659db3391b61be774283d68122fec2b272da7ec8f5a385274b5eac8990290008e0841b756fe47e1322f9000</OutputAPDU>\n   <OutputAPDU>99026a828e08337493822f09e4276a82</OutputAPDU>\n   <OutputAPDU>872101dd05690c315a584c90ab4ecbdefe7f21a776fb170e8f193cc03cace461660e6a990290008e08b39a905b12f409409000</OutputAPDU>\n   <OutputAPDU>990290008e08e3bbe31346cbeb049000</OutputAPDU>\n   <OutputAPDU>874101182e633026e2865d86e0e90e2ae323ca68ee56a1425a473495dac65db32d18bfbfaeabbb3c33996f62e85ec9aae06b8e6485ad2d827d1add9df44e57b83e717d990290008e08271e0d4aac9814c39000</OutputAPDU>\n   <OutputAPDU>99026a828e0830ee77d9b3bf0b096a82</OutputAPDU>\n   <OutputAPDU>874101cca8e4c08e9b238d0b319cc0e1d9f9fcee4825eb1d0060785bdc8a887825958fd4d884abb6eef3129fcc5755f555105eb8762a0791d7c597ecf2fde684328181990290008e08c3a7e036af59fb169000</OutputAPDU>\n  </TransmitResponse>\n </soap:Body>\n</soap:Envelope>\n"
1502
network    2018.06.05 17:03:16.169   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
1503
network    2018.06.05 17:03:16.169   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
1504
network    2018.06.05 17:03:16.221   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
1505
network    2018.06.05 17:03:16.221   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
1506
network    2018.06.05 17:03:16.221   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
1507
network    2018.06.05 17:03:16.221   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
1508
network    2018.06.05 17:03:16.221   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:15 GMT"
1509
network    2018.06.05 17:03:16.221   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
1510
 "<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n   <soap:Header>\n      <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id990\" refToMessageID=\"1ae20737a5f5e3dad602d47ee10111f5610d1845\"/>\n   </soap:Header>\n   <soap:Body>\n   <Disconnect xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<SlotHandle>00</SlotHandle>\n</Disconnect>\n</soap:Body>\n</soap:Envelope>\n"
1511
network    2018.06.05 17:03:16.221   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DISCONNECT
1512
statema... 2018.06.05 17:03:16.221   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateSendTransmitResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
1513
statema... 2018.06.05 17:03:16.221   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateSendDisconnectResponse"
1514
statema... 2018.06.05 17:03:16.222   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateSendDisconnectResponse"
1515
network    2018.06.05 17:03:16.222   StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213)  : Try to send raw data:
1516
 "<soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:paos=\"urn:liberty:paos:2006-08\" xmlns:iso=\"urn:iso:std:iso-iec:24727:tech:schema\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:dss=\"urn:oasis:names:tc:dss:1.0:core:schema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:wsa=\"http://www.w3.org/2005/03/addressing\" xmlns:ecard=\"http://www.bsi.bund.de/ecard/api/1.1\">\n <soap:Header>\n  <paos:PAOS soap:mustUnderstand=\"1\" soap:actor=\"http://schemas.xmlsoap.org/soap/actor/next\">\n   <paos:Version>urn:liberty:paos:2006-08</paos:Version>\n   <paos:EndpointReference>\n    <paos:Address>http://www.projectliberty.org/2006/01/role/paos</paos:Address>\n    <paos:MetaData>\n     <paos:ServiceType>http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand</paos:ServiceType>\n    </paos:MetaData>\n   </paos:EndpointReference>\n  </paos:PAOS>\n  <wsa:ReplyTo>\n   <wsa:Address>http://www.projectliberty.org/2006/02/role/paos</wsa:Address>\n  </wsa:ReplyTo>\n  <wsa:MessageID>urn:uuid:cc6fa9c1-74f4-4924-92b7-2463b6fcf71c</wsa:MessageID>\n </soap:Header>\n <soap:Body>\n  <DisconnectResponse xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\" Profile=\"http://www.bsi.bund.de/ecard/api/1.1\">\n   <Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n    <ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n   </Result>\n  </DisconnectResponse>\n </soap:Body>\n</soap:Envelope>\n"
1517
network    2018.06.05 17:03:16.222   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver"))
1518
network    2018.06.05 17:03:16.222   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
1519
network    2018.06.05 17:03:16.262   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server
1520
network    2018.06.05 17:03:16.263   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1"
1521
network    2018.06.05 17:03:16.263   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1"
1522
network    2018.06.05 17:03:16.263   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked"
1523
network    2018.06.05 17:03:16.263   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:15 GMT"
1524
network    2018.06.05 17:03:16.263   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data:
1525
 "<?xml version=\"1.0\" encoding=\"UTF-8\"?><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\">\n   <soap:Header>\n      <sb:Correlation xmlns:sb=\"http://urn:liberty:sb:2003-08\" messageID=\"Id991\" refToMessageID=\"1ae20737a5f5e3dad602d47ee10111f5610d1845\"/>\n   </soap:Header>\n   <soap:Body>\n   <StartPAOSResponse Profile=\"http://www.bsi.bund.de/ecard/api/1.1\" xmlns=\"urn:iso:std:iso-iec:24727:tech:schema\">\n<Result xmlns=\"urn:oasis:names:tc:dss:1.0:core:schema\">\n<ResultMajor>http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok</ResultMajor>\n</Result>\n</StartPAOSResponse>\n</soap:Body>\n</soap:Envelope>\n"
1526
network    2018.06.05 17:03:16.263   ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: STARTPAOS_RESPONSE
1527
statema... 2018.06.05 17:03:16.263   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateSendDisconnectResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
1528
statema... 2018.06.05 17:03:16.263   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateStartPaosResponse"
1529
statema... 2018.06.05 17:03:16.263   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateStartPaosResponse"
1530
statema... 2018.06.05 17:03:16.263   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateStartPaosResponse" with status: No_Error | "Es ist kein Fehler aufgetreten."
1531
statema... 2018.06.05 17:03:16.264   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateUpdateRetryCounter"
1532
statema... 2018.06.05 17:03:16.264   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateUpdateRetryCounter"
1533
default    2018.06.05 17:03:16.264   StateUpdateRetryCounter::run(core/states/StateUpdateRetryCounter.cpp:22)   : StateUpdateRetryCounter::run()
1534
card_pcsc  2018.06.05 17:03:16.264   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "00a4020c02011c"
1535
card_pcsc  2018.06.05 17:03:16.271   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1536
card_pcsc  2018.06.05 17:03:16.271   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "6a82"
1537
card_pcsc  2018.06.05 17:03:16.271   PcscCard::transmit(card/pcsc/PcscCard.cpp:289)                             : SCardTransmit cmdBuffer: "0022c1a412800a04007f0007020204020283010384010d"
1538
card_pcsc  2018.06.05 17:03:16.297   PcscCard::transmit(card/pcsc/PcscCard.cpp:291)                             : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1539
card_pcsc  2018.06.05 17:03:16.297   PcscCard::transmit(card/pcsc/PcscCard.cpp:273)                             : SCardTransmit resBuffer: "9000"
1540
card       2018.06.05 17:03:16.297   Reader::getRetryCounter(card/base/Reader.cpp:151)                          : StatusCode:  SUCCESS
1541
support    2018.06.05 17:03:16.297 I Reader::updateRetryCounter(card/base/Reader.cpp:103)                       : retrieved retry counter: 3 , was: 3 , PIN deactivated: false
1542
card       2018.06.05 17:03:16.297   BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42)         : ReturnCode of internal execute: OK
1543
default    2018.06.05 17:03:16.298   ...r::onUpdateRetryCounterDone(core/states/StateUpdateRetryCounter.cpp:39) : StateUpdateRetryCounter::onUpdateRetryCounterDone()
1544
statema... 2018.06.05 17:03:16.298   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateUpdateRetryCounter" with status: No_Error | "Es ist kein Fehler aufgetreten."
1545
statema... 2018.06.05 17:03:16.298   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateCleanUpReaderManager"
1546
statema... 2018.06.05 17:03:16.298   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateCleanUpReaderManager"
1547
default    2018.06.05 17:03:16.298   ...CleanUpReaderManager::run(core/states/StateCleanUpReaderManager.cpp:24) : Going to disconnect card connection
1548
card       2018.06.05 17:03:16.298   ReaderManagerWorker::stopScan(card/base/ReaderManagerWorker.cpp:130)       : Stop scan on plugin: governikus::PcscReaderManagerPlugIn
1549
default    2018.06.05 17:03:16.298   ...CleanUpReaderManager::run(core/states/StateCleanUpReaderManager.cpp:28) : Going to disconnect readers
1550
card       2018.06.05 17:03:16.298   ReaderManagerWorker::stopScan(card/base/ReaderManagerWorker.cpp:130)       : Stop scan on plugin: governikus::RemoteReaderManagerPlugIn
1551
statema... 2018.06.05 17:03:16.298   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateCleanUpReaderManager" with status: No_Error | "Es ist kein Fehler aufgetreten."
1552
statema... 2018.06.05 17:03:16.299   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateCheckRefreshAddress"
1553
statema... 2018.06.05 17:03:16.299   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateCheckRefreshAddress"
1554
default    2018.06.05 17:03:16.300   StateCheckRefreshAddress::run(core/states/StateCheckRefreshAddress.cpp:80) : Current URL:  "https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=1ae20737a5f5e3dad602d47ee10111f5610d1845"
1555
default    2018.06.05 17:03:16.300   StateCheckRefreshAddress::run(core/states/StateCheckRefreshAddress.cpp:82) : SubjectUrl:  "https://eid-prod.connect.verwalt-berlin.de"
1556
network    2018.06.05 17:03:16.300   UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46)                : SOP-Check( "https://eid-prod.verwalt-berlin.de:8443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= false
1557
default    2018.06.05 17:03:16.301   StateCheckRefreshAddress::run(core/states/StateCheckRefreshAddress.cpp:91) : SOP-Check failed, start process
1558
default    2018.06.05 17:03:16.301   ...shAddress::sendGetRequest(core/states/StateCheckRefreshAddress.cpp:133) : Send GET request to URL:  "https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=1ae20737a5f5e3dad602d47ee10111f5610d1845"
1559
network    2018.06.05 17:03:16.301   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8443, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=1ae20737a5f5e3dad602d47ee10111f5610d1845"))
1560
network    2018.06.05 17:03:16.301   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
1561
network    2018.06.05 17:03:16.302   ...amHandlerImpl::~DatagramHandlerImpl(network/DatagramHandlerImpl.cpp:70) : Shutdown socket
1562
card_pcsc  2018.06.05 17:03:16.303   PcscCard::disconnect(card/pcsc/PcscCard.cpp:143)                           : SCardEndTransaction for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1563
card_pcsc  2018.06.05 17:03:16.367   PcscCard::disconnect(card/pcsc/PcscCard.cpp:148)                           : SCardDisconnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success"
1564
network    2018.06.05 17:03:16.480   TlsChecker::getFatalErrors(network/TlsChecker.cpp:205)                     : (ignored)  "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
1565
network    2018.06.05 17:03:16.480   TlsChecker::containsFatalError(network/TlsChecker.cpp:218)                 : Ignore SSL errors
1566
network    2018.06.05 17:03:16.481 I (:0)                                                                       : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-SHA384, bits=256, proto=TLSv1.2)
1567
network    2018.06.05 17:03:16.481 I (:0)                                                                       : Used session protocol: "TlsV1_2"
1568
network    2018.06.05 17:03:16.481 I (:0)                                                                       : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
1569
network    2018.06.05 17:03:16.481 I (:0)                                                                       : Used peer certificate: QSslCertificate("3", "3c:3f:e6:1c:7c:28:28:d9", "Kfl3PTkdwoi1P7sQWG1dvQ==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.verwalt-berlin.de")), QDateTime(2017-10-16 13:01:51.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-10-21 23:59:59.000 UTC Qt::TimeSpec(UTC)))
1570
network    2018.06.05 17:03:16.481 I ...dress::onSslHandshakeDone(core/states/StateCheckRefreshAddress.cpp:162) : Handshake of tls connection done!
1571
default    2018.06.05 17:03:16.481   TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49)        : Check certificate key of type "Rsa" and key size 2048
1572
default    2018.06.05 17:03:16.481   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 2000
1573
default    2018.06.05 17:03:16.481   TlsChecker::checkCertificate(network/TlsChecker.cpp:29)                    : Check certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9"
1574
default    2018.06.05 17:03:16.481   TlsChecker::checkCertificate(network/TlsChecker.cpp:31)                    : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "0546c2b01048cb77669003ab0743255f94582f010baa85308133f514e218ff3c"
1575
default    2018.06.05 17:03:16.481   TlsChecker::checkCertificate(network/TlsChecker.cpp:32)                    : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
1576
default    2018.06.05 17:03:16.481   AuthContext::addCertificateData(core/context/AuthContext.h:143)            : Adding certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" for URL origin QUrl("https://eid-prod.verwalt-berlin.de:8443")
1577
default    2018.06.05 17:03:16.481   TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84)          : Check ephemeral key of type "Ec" and key size 384
1578
default    2018.06.05 17:03:16.481   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 224
1579
card_pcsc  2018.06.05 17:03:16.534   PcscReader::updateCard(card/pcsc/PcscReader.cpp:194)                       : old state: "(0x20122) CHANGED PRESENT INUSE" | new state: "(0x20022) CHANGED PRESENT"
1580
default    2018.06.05 17:03:16.621   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:212) : Status Code:  303  | redirect URL:  QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1iQ6gZc1tMoEEg1fv1R3j7bZe%2B%2FYfczICI847h7uxz3405%2BP9%2BunrZjmZuh%2F%2BQr%2FDH39qeizIW%2F66pevvid%2Bo77%2B%2Bdc%2Fzcn7hYzfnWIeh34ufroX9fP330d%2F%2BbpO%2FfchmZv5e5%2B8i%2Fn7kn13GUP%2FjvwMfR%2BnYRmy4fX1J76Yl6ZPlt82qpdlnL%2BDYNHk3%2B4p%2Bc%2FZ0PdFtvx8H2VPXsu3tJheTf9zXoDsWkxVMWlDvwzPIgV%2FiHaKrGi2wi2m7VUsf56L%2Bcf5lfwXHCZyGEnTbxBFY9%2BwHMW%2FpRAGf8sSiMZgkspKtPj6k8L%2F8rVAsRJKS%2FwbjZfZNwzCoW80AmffoJSmUZzAaSRN7pn9XzB7wy9f%2F5skCbQoCuRbVuTQvYiiv6U0TH9DEgonoZJGUPKH%2BHleC6Wfl6RffvmKQDD1DSK%2BQbgH498h9DtM%2FAxRePz1p%2BAvar8V9fUPJX%2F%2FbfH09xr%2B3xWczHMx%2FVDq11%2F%2Fqsx%2FUeKfwN9s9Yfwv9rTXZJlnf%2FpJzfkxU9B8lqL%2F33jG969%2BLu7Ztmt%2Fq%2Fgr39sMn7%2FB7HfhT6bznEpcuYvJ%2F2PwP3puP3yb8L4ZEn%2BkPPjj9896naofd9%2F3tGfh6kCEQiCQQgDb2e9Z%2FzXbZf8NmGCZUlGljmKFWRGQzgMESQMo1iWJnCaE%2BnXn7xzvKH%2FH%2BUJr%2BJd9MttuL8%2F2W0Io1jqIf%2BJeVXD1Cz1%2B%2F9CVlLMMEJ9y9Lshx7z%2BbtWnEpfDn8gzOd%2FIwMCIfoHvnxuqv%2F6p5MU%2BS3kd8x0QmcYDhcFhZBUQmNlkZFFntA4klF5mcP%2FXzBMc%2FIN%2Fm%2F8HwH8BibEIfqHvf76g%2FvhsWWTJUvxq6Eo%2FMVzHDO5FbMrLFMpHGMbO29HqjbESr1lJmMLOmszexUPB3cxKluZActEHtM5omFTP%2BbygW0rX4Q95uJQnZMndvAXY%2F4%2BMfPYTn1l72NMW8E3WEViYF%2FgakN3A0d4Nuzf1vCM9vua2fvCQIFktkJjcMxvC5h9j31IND2RfiVPe8lkdYs5vE0RfI2fJhRCwcO%2BhNpgKYlzP5KrpChvCyrjRO6X%2BPnqbOkFxfKwRO%2FgTKXXqr%2Bdl8FiIe8JqOEJu3kJsHEpuyEO95jyz2N%2Fhf%2Fl3%2BH%2FT%2BB%2F%2BXf4%2FxP4X%2F4d%2Fn8LX1FYpf1hqO5Td41E7xB7W1tkmAf3hbEp5nYPlqu02yUEBnmcVqokW17IbgnyDLVrDzoqHf9EME7B8wSDm0dY9XowgAlnV%2F61YK2luODRMl9kVb8igXBIJZC4zL40u7iSg%2Fdp%2B9E6%2BmAI7kzwRRSEcvJ4UyId2CazpWeOFkDrxmhYPPQzRRYNVbf%2By1qBzzT%2BWEYRLCAjKlOWFMicHt1JxlvlFnXstV7LR%2B4QsAq3Hr7dQebqRn3qOm2yTTUn4AMT5zjWDV8o1cJx78m7xzGQH%2BmFgYhqP5EccNLplLFq74VC68khKCF1kpEGJD4Cwla%2BoQWthcVbWrFHDz8rzzjFL1ihjVUeIwuAC4y6TL4l9rGARUkgkPKZ44Xf4qkfsTNF8Rh8dBgDJu9d4RmbYYdj2CX%2B9%2BslO4bwhWkZxmDmH96f8%2FttgV0ROv6frTX%2FZq0fBpos88n4wMUngzOlujy24KfW%2BoRSheCL09blByepSQKJ3qT3sfTfJeTBnYDNnMjI6%2FRRU4fMpFJwylQB6tAhIqclKnhh2hUNrmowzBUZ1oGuvmAoQNDdu2xDuacrvu%2FGviRAnFl4mxmMfPhI9SGzRTkFZL%2FhQNQ1y5r2vOvFLKBZukaDu0zlC%2FIGo%2BILvT6uXVzyR2xAKoyEZShoql37VJIDfszm79ryl%2BMACGE%2FshioD5Amck6lKtmTpLkadjciCv2BssC0fimWz9A8hxd5H2V7N%2B4JqENTGAuNZm9HpztDjjBG06D3wBq%2BVoKItbaECtuIBeWWlqI6vqolvVz4S%2BS%2BZHlJBGTkvPZffvkT%2BEco%2Ffvo%2BdfB3%2BPrjyl%2FpI4%2F0hLXjHUx%2Ff7vb3nq94Hf8vuvBU4bR3vuuWADE9kWx%2BvKe2qiLL42MSoI02OwX72%2FweJ7nVRl1jG%2BddwF3cAAC0FTteAt6OHtOdosgGqyBmcIUFVS2MIGRn7E7Kj6OjD3GZifKaSfGfgUkA51MpQwIZZ%2FiGS00j5KgcQsos9s0jMXoysB8AqeztYqQ8bklaDwS73SeFohBbDlduqeWf8yBtvTrCaG8gaj3QJ3vBccbeEoJhr58iNOAwmHsDySUUdchk7Ng8Tg8c6exrnGgle2aQaCdVHnIfkyBZEd8FC%2BerSF822aiLmpPwnvFaWFzuUphZk%2Bhh4id6dPG3Wm0w87yGlEpJchVz78GQi0F7grdtqgr2hBwvww1b%2Bo%2Bh%2BG%2FjDWPzKa227%2FzwYkvJJ9SxsQQ88rn00aQIydKE1kThZVSw3M8IbwU0%2FmNA6DtH%2FkR%2Fxok3HtuE3FxSdj7zZxrY4Fqx0CcS3pKHAz4wnxVPZN7Qb9WS3b9kbuuAfFG5MdbGcQ%2FEFOHdy2cRsKYg1gb%2BLzgjcAYdt9FNxKEtC%2Bdg4KVC7oAHr0wekflimgYeum68ia2Xmnn%2FMozx3GdEzB%2BStbhEMOxvaAQVYJiFf7WJoa4WDuakZGSsj2ZHuMRV6oPeyKs0aVkMwXfmQB7zYkzMH8vGAHHYbhIastG8U6Aqi8L3eboMsdI%2B8mYkhH3fuXfAaU0dLM8yHGZhXGCwjsgcW2%2BW5Rp0EnqeP6tJarntuPjsjoUMmnzIS8IWD96GpOP2pLXpgICBvGXHK1q%2Fcn2JfxzrOVOuEu2VMZQMNAlpqaOr%2B9QoFU3T5mu9j9DjUbpEKnNw0zxfghLS0nc7cejFXI6gKoCj4ALed8lS2MBSx1tdGorP7rqeMImz%2BXuU54mZsSO2WFxxXdfCoUGaMDcqPngkMYZ%2Bs1sp2W8ECErxyf9msbTEEBJsJsghnXcuuTCo%2F9c3i0VBIPptdhJUhX0O6VrKXfC6GIRPqi1DpKHPB8Uz76ASxeJmAS2iGRI9N46eJkJWEtjAAve3QI%2BaTYQW1ssY0c%2FuRj1xbmW00wmkQOKbNGTtIesgmcvTOcvNNlBkhz2vWAZ2%2B6imnJHjlqCOYuuZOGz8Ag%2BMBorgMw1grzC2DuQ%2BLK20cXU3PKU4PLGdfEyqT1CHz3wydOYvgk%2BhMzYaMeus7DZoUNGbtY7%2Fwyp7toKUMapTNApFUl7O7p1%2BvehCi1ENOilZMszg6REMMEH7KHc3W9YmUU8pyJ31kMcfnPFZDuvBqVeBngXe%2Fqq%2FLQ527NNss%2FiDzYDfe94LgVFMW8LvvsddfauRkyTxHFedxTWD0%2Fb%2BBZJTJiBSquht4aUPFQhmcBXthyYj8jXHqr1l2QhkJQVyUN8eagCoRdv5Qt4wymFW%2B%2FOHsx7QITKqaaBecUlAKQfAPMxxLZLWzniuVfvrdKEd9Z2aczPh9P1ABVCFVDUXNjHs0aKOCPrtBMZi1bLj28A5pz2uyNBwp5xWihvlgm45uHI42IvMXs2UObN7%2B2qQidnYeGUAiMj91FrLMCXATphyNxfTLsAt5MWssgEgMm8BGcqnlf%2FSBRRKfjXV4FJjxBepANy6avuXj2FQU%2BpjxQw5sHCaahr9ykKMM%2BQNkdplxtxHb9w9ysJlgOBvE8DonCUCUiZlwXWJ5asQg5mmlcxTtf8%2FHQxdnU%2FHz3YMQDzk1rSXmHJwfRjHRVASy7w4rW2MqL4Qbwc3S59ziujGyeTWxXJmUbs7O1Ox8Q21Ut6uDSYkR5BEHjaQEjuRJ%2BynRvV2mi8zkJAbd%2FGDcfQ%2FsP9dbvHSwGXl43n6LLZ7hwFf5Ul4pUqWAwyDKI5Gcn0YvnkfFwHSpi6znAVEbwPF1W4v2XHsoCPb73jxSD9ooNvQn1TL%2BQAV%2FB7esJ%2BIEz%2BrWFoX3aYt3FSo8oK4ZgMcS1600XNABEsZtVeM2WDTFP18yJAqY9Ng8%2FhFFOs49Xj1hAIMYLYuYmEE8Nz%2B1tIntt96xwluCSlIMJeDJH4p1P30K9Nsmj15sVs4SCneYsUNtMnZjRjXJzXj4Sa2ZZh1K7wZzQg8rGn%2FpbWD%2BYTG0jsjGrCF61wSG8QOZpqJeP9oXxp72ZtqYOSQjOs%2Bw3tTh%2B8DWhqB2zKwbpyLKmm9FiVKLIGpfV%2FWuIzSZK39IYrAFwvN9wGY7g5S8Z3Erq%2BM5lSQgetTLJ1rBmmMlGj96y38KH1ejjI1jbYiGHUKAtraAQGcAHFuunmGAE%2FQ6xZKCA2SmZ%2BClPMGYaDR4Yc8Cld0hxwk9ig5otJnodyCvbT%2BJOJ8divUA3aHef6hnM7GUU9C0LRTgWSO%2Fsp6pPc6LSE%2F489pb1WJsqccJJDo9DCYWM8hx4acSIjktDlYgmAzstBxorvYhjXWx5fdqjT66fZUcqAlzV%2BtN5w4tXUr7f%2BsbZAsV0dvpk4U1EkWeaURJgEFlW2p1q7u%2FgTVQHIlNNV5O3aPIKyXxdJzmgairWdkITzRGthQsbR88loDxeE0NIYjuaT7zNeAG4eTJVehsubVXv2KHTG5ICreuCoeAWvpBPerBU04%2FK4%2B3hAXhfzChdGercsSRI0dSPS86rrpmNlYbBepVeOcFh0CeHlDAvazj7RJFldno67UyTjmxz4SOE1It3PFrk019zCbopCHSlGLzV7O4wQaJyaLXcXPMOC7HUz4ke6RzabvJ7ewYVDKpbO53p9rrEm6A8RcDOg1MBWhYdtw7s1ZBsV8vFAxtM3w9IPT97ByoPJFoIdWCV%2Fsxd5BQdzM83frV7TSdpYXYh3LqiMqb3MmHkA2CEFWlFfV1QM3wk2xZmSwnLbvrsIQZgH6T1iHf84xeay31qFnt05GQlTlXXbDDYp4E02fxoIMlH2yySyGipn9VhyGMhUzMI6bVJ4Nl5yMV5V5UlVDJXU9YsAOT%2B2wAnHZbGR%2BTHrx2%2Br59vLZoCCAW2ikxBzIxW63tG8keb29E1x5jAokbNXFXkRGRpwWBZJMsDcxhm%2Bjh9KUAJXWHFwbYZie0cyfcj0Qk2JGTO6Qq19Kb16n3lqyDZscGWXj9oJYEP0mTVgwJhhrzZ4wRrAmoRj2Ni5KpQwbcnvQAmDTPcKB5utRFLFovvV3jFHssNepHNmzPU0bvR7XN5s28SCdiS1hyQWMtGBxz97WE5UNUpsfGXddNFldMmUSJdRjmCeJAx%2BrW2a4Dvm6U7b3qYOooQZG%2BsKAwO9WerBFMUI7dTFp0cUtUsbWOyaJidA6XBXA8KzkgqnSMDMHh8ZOsuoPJciT5UkvQGscTLGzhKqtlYyEYeMFih3ImA7mdE80icveOIP7X6ts41MC%2BzCRfqvJKTIRgZnWpZOEaPcHbl46Y5fvJiqH7sD7aghO1BjP1hLeRhrit%2FOmQd7mp0X3H1GZDknZnCrnqqqyI1ncSVXuyjOkEPpllZrLSxVcQsRzqSNwmqhVJcHyCRqUMG8CKOx1RpEK2t43kQOQFT6cc1KaN7fLZmZLUuqrS7mA%2BesPgcRQ5HzPqIHfgTkbsaPOXHghEvWuOkhhtkwbW3vY1UMQsaWFCRq0wS2DMvBKahYjwa%2BXi02%2Fbk3AVOmRRJxvPJq6tsDmxIp42oZBMITYf%2BeqlV%2Fnw77eWVYaUyucJU2uSL%2BxnnzKfXFqZJi9bDLr8OGP9qER6ez7a5W1tmshhtHUMEuyzrtenIZRcWWnplium4MznORSwNXGtZo8srA%2B6Su5aQeYm%2BVXsXi8bFBajbQw5iM0nljmXTLCWZtAtN3NeKa2PFa1jpaiCzRSKQwyk0xFHoz%2B0sF61AuZ2trT7Y1gsdzWO%2FuJuadkYxS9bNl5%2FC%2FcxguVqTrdEiAZfOY%2BMB2MIqmSjwAhp74NiQe93HKYoWHwuy8LNnEY7FGoVJB5sdyfDY%2FCEPkIggkCXDu0Y9iBcRze0z7%2F0Ohoo8LjuanSoq%2BUA6%2BAhrDHwHyGzmVhyRHy%2FoXuo7pAkTXKCr%2FwRraCzPpxE0fP2RjdCMb%2BIQfeZsgnpWSx00YjlWM8iBhs%2Fh9oDS5QxidAmYnTBNF4IJ1ZhPYL0fL8P1HUHfD4iPru5D2TndEdPF70FASoXAeuFJ3TvwjqrkMA8K2VnkvNmNb%2BggnaXO%2FXmutasEpHhy%2BEf5Cp23sBeyiZioZd3c53ItRlOXu89FZay06r6OsEQ%2BsnrelwugjAw6VJo4JwA%2FPC0tbsSiHHHSnySTsigwvvvMfZR62eBlr2nthjTNyMu0ONVoGrZ%2BKKJLQ7rIHqjdPAH%2BObVtQ7KGcPdlEKE1l0Y%2B20JanrHQusKQPB9ISXDuRbBPE3R%2F5MmxwaJSEV8OtlDc9HwK%2FjJHuHAYOX33Anyvn2yQxbPlyUvSkD1PzE4Od7DHPleMgl28aLbq606LU7WaOO0cVipYxCi%2Bi9f6co8nk0%2BA8gjSi4Ek6xpgvM%2F1CuFfuGFLetzTMePLJs4t96VzP1R%2FeZjWehA38R2QblX6yF9IEgd82STWJAbzE6NrAz3E27rNuQ53%2B%2B0Iq%2BvgGoWTdH34qCx54qLc2LVSYOJTK%2FWtD%2BUUb0PdsLUehIHqUojMheENjUH5nCTPIEHGrC0iUJEh3e5CVzIt3kXLVXH9Sa2DKrgoedGup0R8tLMjXzfBl40yk3btdv8yyXneXXFMAEp8OF%2BgqSPvNr%2FbXdb%2BGGaSELS92cURXwPK8eklzIFMToDDqri7thR6JFZbw04%2B6d4t9N2CRWn93Vr8TTSfKJ191n7zUsDcH6PwiGaADzF4%2FKAz53SaiKcK5KlXuXrmGJFnpI0qNfjN4oRi3g4GKP8IhXmIpzh8UUoU3XnEdTjAaDWzYejcMY2neAKeOvmfQ0%2Fwknkmo%2FVc6yreE8ZviVyIMQfOpycNuy7zMKDaA1GHVYicZwrbqArmdm5CBIahHHIzN%2FzPimybs5ZbJoeaBOKcfh6EEudcOyFsOoCd9KDUdDWa3u2K0HuszeIf01uckKaebLw%2B1RfNvIbnud9BiETp9uDIRyahEKa3FrOSUmair7FZFnaEN2FZg%2FBCMjNH3mqGwatHKz2XYOx1aYY88N2oank6m7p2N7jwIsYXxOfg5G3748ylJm7uw82iwyW%2BWq6pkDJoFm5Jp2DTuiKeeHjnYR0hK4f7bEvQZy6J7BHOmNLFJjgSpaRYYkdje1wnfIpGcOr3OzAJ9AWRUmm9kZfdocUCi4KBn5v4fng%2BWHzCQ1lUgk3gxBOjyBLaHS%2FCpN9GARUr3TYCeK8GhlHfG%2BXPku0ewl1PYzlOGQsr8%2ByJ%2BrPQ7WQi%2Bx1xgmTrzPJNwxLtjSoEnU4%2BjWrvmXWUKLufwIghdtRCctPXDtC1yRPSDh1K6Iky%2FU5CNzHWKiLal8lddy229ZK%2B2Q%2BmNrTpOfc%2BW3N2LlIRmb5x2ah2x7%2BLjsSqLRxmWIvqLG8TjIO8bqHsCZNTdQegy06u%2BcmiiOa%2F6TThUfVicVav1xO8%2B%2FYOe%2BfM96SnWqg2BmqDQH7c9Vjh7ZLOW%2Fjd4vUGeaMrnWnCZ4%2FMPkMCDRoTskxKwYdj2bDSH%2B7VKJDIOgaq1XgW8c6K0J8H2JCu5tBFKrjHfkrd1dt464grsQ6GSnfpAJ82y%2FAQvwUpMB77PN3vU8hcFXehwWmFAVhYieROPYLJTeLzkvHA7tpfSfTu7LiSHieU%2BxPSR4FIbcoY8bLcXNJwlxeuKHov2R6GZNtPr8tm6clVnVILJoiaUDVTS2ArsEl6cVTuBIxfWcHkid4kIvQpqhQ2Og95T6xF7GIYMtlGiY0kHCL4Ou5XcJkbFHZ1%2BRN2%2FTXGqH1vX69lQ4PA1xX9bgjEQTztke2un91xN9NvuUFtBc5BVrtr%2BI%2BUgbMVLctO79LnWeHw%2B5m4DFWvHZS5jy3Fp508ilF6jB3d4ASayLsA3l31x%2F641MiHI6CTajefBX7JWtPZBGmkPS4LtnkxOdZJUpYrQebpgDSu3WXk6%2FMy%2BQbN2DR2MlGDPRTdY%2BHcd1s9RCKSnc1pOWxkEnQE%2FSKDhxs2FeujBYHDKcDvJXGim2ZWIxQPb%2Bu%2B1t34UaGeKgiqLVWRx5a7eqTFQSRMFic6%2B%2FQGYC2koJXtkeE0SCQnStk5wg%2Fk%2Bc2oGZtntWJTvW6osExT3Hw%2FirkcphDzXmJ%2BFWw4ZkBovG4VN2w11oYOa2GUeZqRUDnEB6%2FS4vNk6jC73Ax18ESGM4xV4cFciE82wUMlEv2VmVCuTMOTEd8Rg54PKoBdcvFYjcRxrHlgHxZYzdd9A%2FOZk91CfCeIWmQrIjMA1b80TFqjBvYxQD0cYE9DJvIp5O4rGSj3gvMrQLDORKUAz%2F0uyxrFQM5lhRl47JQkCJoH9DjwLSiws%2B1PMeKiNIn2hRFKIoHZJRj3ZxZiEnlf7tXkqdBFl7SFTJDThOKCTRNQnFY%2FHowNkH4sqaBnjSo3F63mhcY7P5uW6d7W3Uz9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=FDzSMRR1XVn1du%2FNsXPdw58hpu%2BA7Ga85YK4kEW%2BWPm23ZqyNrqr6suJCI6wRHsovkGZe%2BBLtXU0%0ArIG94WFIyMDJBNqeawO%2F%2BABwCmACF0j32LI56itq4vssdYdipQrEvLDDmi89RF%2ByIBXAE0T04ho1%0ALA1j1Ey%2FurxulloMTOjz12KBGgzpCUNWZnbZvzM0BoUOGVYNgjeN0DFrZKapLJc%2FGTt3KpGPVyrb%0AI0MrrySMW1Di%2BQXlJ4UrfZhAAoHILxqrDh7TN21%2FUsrtke7iZLt1dv3%2Bfai%2BukC%2FWzNZcxtw3vQS%0Am3HTzVxDWjHbbFXQS2jCPT%2FMhmeOVI3NV75PlQ%3D%3D")
1581
network    2018.06.05 17:03:16.621   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Server": "Apache-Coyote/1.1"
1582
network    2018.06.05 17:03:16.621   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Location": "https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1iQ6gZc1tMoEEg1fv1R3j7bZe%2B%2FYfczICI847h7uxz3405%2BP9%2BunrZjmZuh%2F%2BQr%2FDH39qeizIW%2F66pevvid%2Bo77%2B%2Bdc%2Fzcn7hYzfnWIeh34ufroX9fP330d%2F%2BbpO%2FfchmZv5e5%2B8i%2Fn7kn13GUP%2FjvwMfR%2BnYRmy4fX1J76Yl6ZPlt82qpdlnL%2BDYNHk3%2B4p%2Bc%2FZ0PdFtvx8H2VPXsu3tJheTf9zXoDsWkxVMWlDvwzPIgV%2FiHaKrGi2wi2m7VUsf56L%2Bcf5lfwXHCZyGEnTbxBFY9%2BwHMW%2FpRAGf8sSiMZgkspKtPj6k8L%2F8rVAsRJKS%2FwbjZfZNwzCoW80AmffoJSmUZzAaSRN7pn9XzB7wy9f%2F5skCbQoCuRbVuTQvYiiv6U0TH9DEgonoZJGUPKH%2BHleC6Wfl6RffvmKQDD1DSK%2BQbgH498h9DtM%2FAxRePz1p%2BAvar8V9fUPJX%2F%2FbfH09xr%2B3xWczHMx%2FVDq11%2F%2Fqsx%2FUeKfwN9s9Yfwv9rTXZJlnf%2FpJzfkxU9B8lqL%2F33jG969%2BLu7Ztmt%2Fq%2Fgr39sMn7%2FB7HfhT6bznEpcuYvJ%2F2PwP3puP3yb8L4ZEn%2BkPPjj9896naofd9%2F3tGfh6kCEQiCQQgDb2e9Z%2FzXbZf8NmGCZUlGljmKFWRGQzgMESQMo1iWJnCaE%2BnXn7xzvKH%2FH%2BUJr%2BJd9MttuL8%2F2W0Io1jqIf%2BJeVXD1Cz1%2B%2F9CVlLMMEJ9y9Lshx7z%2BbtWnEpfDn8gzOd%2FIwMCIfoHvnxuqv%2F6p5MU%2BS3kd8x0QmcYDhcFhZBUQmNlkZFFntA4klF5mcP%2FXzBMc%2FIN%2Fm%2F8HwH8BibEIfqHvf76g%2FvhsWWTJUvxq6Eo%2FMVzHDO5FbMrLFMpHGMbO29HqjbESr1lJmMLOmszexUPB3cxKluZActEHtM5omFTP%2BbygW0rX4Q95uJQnZMndvAXY%2F4%2BMfPYTn1l72NMW8E3WEViYF%2FgakN3A0d4Nuzf1vCM9vua2fvCQIFktkJjcMxvC5h9j31IND2RfiVPe8lkdYs5vE0RfI2fJhRCwcO%2BhNpgKYlzP5KrpChvCyrjRO6X%2BPnqbOkFxfKwRO%2FgTKXXqr%2Bdl8FiIe8JqOEJu3kJsHEpuyEO95jyz2N%2Fhf%2Fl3%2BH%2FT%2BB%2F%2BXf4%2FxP4X%2F4d%2Fn8LX1FYpf1hqO5Td41E7xB7W1tkmAf3hbEp5nYPlqu02yUEBnmcVqokW17IbgnyDLVrDzoqHf9EME7B8wSDm0dY9XowgAlnV%2F61YK2luODRMl9kVb8igXBIJZC4zL40u7iSg%2Fdp%2B9E6%2BmAI7kzwRRSEcvJ4UyId2CazpWeOFkDrxmhYPPQzRRYNVbf%2By1qBzzT%2BWEYRLCAjKlOWFMicHt1JxlvlFnXstV7LR%2B4QsAq3Hr7dQebqRn3qOm2yTTUn4AMT5zjWDV8o1cJx78m7xzGQH%2BmFgYhqP5EccNLplLFq74VC68khKCF1kpEGJD4Cwla%2BoQWthcVbWrFHDz8rzzjFL1ihjVUeIwuAC4y6TL4l9rGARUkgkPKZ44Xf4qkfsTNF8Rh8dBgDJu9d4RmbYYdj2CX%2B9%2BslO4bwhWkZxmDmH96f8%2FttgV0ROv6frTX%2FZq0fBpos88n4wMUngzOlujy24KfW%2BoRSheCL09blByepSQKJ3qT3sfTfJeTBnYDNnMjI6%2FRRU4fMpFJwylQB6tAhIqclKnhh2hUNrmowzBUZ1oGuvmAoQNDdu2xDuacrvu%2FGviRAnFl4mxmMfPhI9SGzRTkFZL%2FhQNQ1y5r2vOvFLKBZukaDu0zlC%2FIGo%2BILvT6uXVzyR2xAKoyEZShoql37VJIDfszm79ryl%2BMACGE%2FshioD5Amck6lKtmTpLkadjciCv2BssC0fimWz9A8hxd5H2V7N%2B4JqENTGAuNZm9HpztDjjBG06D3wBq%2BVoKItbaECtuIBeWWlqI6vqolvVz4S%2BS%2BZHlJBGTkvPZffvkT%2BEco%2Ffvo%2BdfB3%2BPrjyl%2FpI4%2F0hLXjHUx%2Ff7vb3nq94Hf8vuvBU4bR3vuuWADE9kWx%2BvKe2qiLL42MSoI02OwX72%2FweJ7nVRl1jG%2BddwF3cAAC0FTteAt6OHtOdosgGqyBmcIUFVS2MIGRn7E7Kj6OjD3GZifKaSfGfgUkA51MpQwIZZ%2FiGS00j5KgcQsos9s0jMXoysB8AqeztYqQ8bklaDwS73SeFohBbDlduqeWf8yBtvTrCaG8gaj3QJ3vBccbeEoJhr58iNOAwmHsDySUUdchk7Ng8Tg8c6exrnGgle2aQaCdVHnIfkyBZEd8FC%2BerSF822aiLmpPwnvFaWFzuUphZk%2Bhh4id6dPG3Wm0w87yGlEpJchVz78GQi0F7grdtqgr2hBwvww1b%2Bo%2Bh%2BG%2FjDWPzKa227%2FzwYkvJJ9SxsQQ88rn00aQIydKE1kThZVSw3M8IbwU0%2FmNA6DtH%2FkR%2Fxok3HtuE3FxSdj7zZxrY4Fqx0CcS3pKHAz4wnxVPZN7Qb9WS3b9kbuuAfFG5MdbGcQ%2FEFOHdy2cRsKYg1gb%2BLzgjcAYdt9FNxKEtC%2Bdg4KVC7oAHr0wekflimgYeum68ia2Xmnn%2FMozx3GdEzB%2BStbhEMOxvaAQVYJiFf7WJoa4WDuakZGSsj2ZHuMRV6oPeyKs0aVkMwXfmQB7zYkzMH8vGAHHYbhIastG8U6Aqi8L3eboMsdI%2B8mYkhH3fuXfAaU0dLM8yHGZhXGCwjsgcW2%2BW5Rp0EnqeP6tJarntuPjsjoUMmnzIS8IWD96GpOP2pLXpgICBvGXHK1q%2Fcn2JfxzrOVOuEu2VMZQMNAlpqaOr%2B9QoFU3T5mu9j9DjUbpEKnNw0zxfghLS0nc7cejFXI6gKoCj4ALed8lS2MBSx1tdGorP7rqeMImz%2BXuU54mZsSO2WFxxXdfCoUGaMDcqPngkMYZ%2Bs1sp2W8ECErxyf9msbTEEBJsJsghnXcuuTCo%2F9c3i0VBIPptdhJUhX0O6VrKXfC6GIRPqi1DpKHPB8Uz76ASxeJmAS2iGRI9N46eJkJWEtjAAve3QI%2BaTYQW1ssY0c%2FuRj1xbmW00wmkQOKbNGTtIesgmcvTOcvNNlBkhz2vWAZ2%2B6imnJHjlqCOYuuZOGz8Ag%2BMBorgMw1grzC2DuQ%2BLK20cXU3PKU4PLGdfEyqT1CHz3wydOYvgk%2BhMzYaMeus7DZoUNGbtY7%2Fwyp7toKUMapTNApFUl7O7p1%2BvehCi1ENOilZMszg6REMMEH7KHc3W9YmUU8pyJ31kMcfnPFZDuvBqVeBngXe%2Fqq%2FLQ527NNss%2FiDzYDfe94LgVFMW8LvvsddfauRkyTxHFedxTWD0%2Fb%2BBZJTJiBSquht4aUPFQhmcBXthyYj8jXHqr1l2QhkJQVyUN8eagCoRdv5Qt4wymFW%2B%2FOHsx7QITKqaaBecUlAKQfAPMxxLZLWzniuVfvrdKEd9Z2aczPh9P1ABVCFVDUXNjHs0aKOCPrtBMZi1bLj28A5pz2uyNBwp5xWihvlgm45uHI42IvMXs2UObN7%2B2qQidnYeGUAiMj91FrLMCXATphyNxfTLsAt5MWssgEgMm8BGcqnlf%2FSBRRKfjXV4FJjxBepANy6avuXj2FQU%2BpjxQw5sHCaahr9ykKMM%2BQNkdplxtxHb9w9ysJlgOBvE8DonCUCUiZlwXWJ5asQg5mmlcxTtf8%2FHQxdnU%2FHz3YMQDzk1rSXmHJwfRjHRVASy7w4rW2MqL4Qbwc3S59ziujGyeTWxXJmUbs7O1Ox8Q21Ut6uDSYkR5BEHjaQEjuRJ%2BynRvV2mi8zkJAbd%2FGDcfQ%2FsP9dbvHSwGXl43n6LLZ7hwFf5Ul4pUqWAwyDKI5Gcn0YvnkfFwHSpi6znAVEbwPF1W4v2XHsoCPb73jxSD9ooNvQn1TL%2BQAV%2FB7esJ%2BIEz%2BrWFoX3aYt3FSo8oK4ZgMcS1600XNABEsZtVeM2WDTFP18yJAqY9Ng8%2FhFFOs49Xj1hAIMYLYuYmEE8Nz%2B1tIntt96xwluCSlIMJeDJH4p1P30K9Nsmj15sVs4SCneYsUNtMnZjRjXJzXj4Sa2ZZh1K7wZzQg8rGn%2FpbWD%2BYTG0jsjGrCF61wSG8QOZpqJeP9oXxp72ZtqYOSQjOs%2Bw3tTh%2B8DWhqB2zKwbpyLKmm9FiVKLIGpfV%2FWuIzSZK39IYrAFwvN9wGY7g5S8Z3Erq%2BM5lSQgetTLJ1rBmmMlGj96y38KH1ejjI1jbYiGHUKAtraAQGcAHFuunmGAE%2FQ6xZKCA2SmZ%2BClPMGYaDR4Yc8Cld0hxwk9ig5otJnodyCvbT%2BJOJ8divUA3aHef6hnM7GUU9C0LRTgWSO%2Fsp6pPc6LSE%2F489pb1WJsqccJJDo9DCYWM8hx4acSIjktDlYgmAzstBxorvYhjXWx5fdqjT66fZUcqAlzV%2BtN5w4tXUr7f%2BsbZAsV0dvpk4U1EkWeaURJgEFlW2p1q7u%2FgTVQHIlNNV5O3aPIKyXxdJzmgairWdkITzRGthQsbR88loDxeE0NIYjuaT7zNeAG4eTJVehsubVXv2KHTG5ICreuCoeAWvpBPerBU04%2FK4%2B3hAXhfzChdGercsSRI0dSPS86rrpmNlYbBepVeOcFh0CeHlDAvazj7RJFldno67UyTjmxz4SOE1It3PFrk019zCbopCHSlGLzV7O4wQaJyaLXcXPMOC7HUz4ke6RzabvJ7ewYVDKpbO53p9rrEm6A8RcDOg1MBWhYdtw7s1ZBsV8vFAxtM3w9IPT97ByoPJFoIdWCV%2Fsxd5BQdzM83frV7TSdpYXYh3LqiMqb3MmHkA2CEFWlFfV1QM3wk2xZmSwnLbvrsIQZgH6T1iHf84xeay31qFnt05GQlTlXXbDDYp4E02fxoIMlH2yySyGipn9VhyGMhUzMI6bVJ4Nl5yMV5V5UlVDJXU9YsAOT%2B2wAnHZbGR%2BTHrx2%2Br59vLZoCCAW2ikxBzIxW63tG8keb29E1x5jAokbNXFXkRGRpwWBZJMsDcxhm%2Bjh9KUAJXWHFwbYZie0cyfcj0Qk2JGTO6Qq19Kb16n3lqyDZscGWXj9oJYEP0mTVgwJhhrzZ4wRrAmoRj2Ni5KpQwbcnvQAmDTPcKB5utRFLFovvV3jFHssNepHNmzPU0bvR7XN5s28SCdiS1hyQWMtGBxz97WE5UNUpsfGXddNFldMmUSJdRjmCeJAx%2BrW2a4Dvm6U7b3qYOooQZG%2BsKAwO9WerBFMUI7dTFp0cUtUsbWOyaJidA6XBXA8KzkgqnSMDMHh8ZOsuoPJciT5UkvQGscTLGzhKqtlYyEYeMFih3ImA7mdE80icveOIP7X6ts41MC%2BzCRfqvJKTIRgZnWpZOEaPcHbl46Y5fvJiqH7sD7aghO1BjP1hLeRhrit%2FOmQd7mp0X3H1GZDknZnCrnqqqyI1ncSVXuyjOkEPpllZrLSxVcQsRzqSNwmqhVJcHyCRqUMG8CKOx1RpEK2t43kQOQFT6cc1KaN7fLZmZLUuqrS7mA%2BesPgcRQ5HzPqIHfgTkbsaPOXHghEvWuOkhhtkwbW3vY1UMQsaWFCRq0wS2DMvBKahYjwa%2BXi02%2Fbk3AVOmRRJxvPJq6tsDmxIp42oZBMITYf%2BeqlV%2Fnw77eWVYaUyucJU2uSL%2BxnnzKfXFqZJi9bDLr8OGP9qER6ez7a5W1tmshhtHUMEuyzrtenIZRcWWnplium4MznORSwNXGtZo8srA%2B6Su5aQeYm%2BVXsXi8bFBajbQw5iM0nljmXTLCWZtAtN3NeKa2PFa1jpaiCzRSKQwyk0xFHoz%2B0sF61AuZ2trT7Y1gsdzWO%2FuJuadkYxS9bNl5%2FC%2FcxguVqTrdEiAZfOY%2BMB2MIqmSjwAhp74NiQe93HKYoWHwuy8LNnEY7FGoVJB5sdyfDY%2FCEPkIggkCXDu0Y9iBcRze0z7%2F0Ohoo8LjuanSoq%2BUA6%2BAhrDHwHyGzmVhyRHy%2FoXuo7pAkTXKCr%2FwRraCzPpxE0fP2RjdCMb%2BIQfeZsgnpWSx00YjlWM8iBhs%2Fh9oDS5QxidAmYnTBNF4IJ1ZhPYL0fL8P1HUHfD4iPru5D2TndEdPF70FASoXAeuFJ3TvwjqrkMA8K2VnkvNmNb%2BggnaXO%2FXmutasEpHhy%2BEf5Cp23sBeyiZioZd3c53ItRlOXu89FZay06r6OsEQ%2BsnrelwugjAw6VJo4JwA%2FPC0tbsSiHHHSnySTsigwvvvMfZR62eBlr2nthjTNyMu0ONVoGrZ%2BKKJLQ7rIHqjdPAH%2BObVtQ7KGcPdlEKE1l0Y%2B20JanrHQusKQPB9ISXDuRbBPE3R%2F5MmxwaJSEV8OtlDc9HwK%2FjJHuHAYOX33Anyvn2yQxbPlyUvSkD1PzE4Od7DHPleMgl28aLbq606LU7WaOO0cVipYxCi%2Bi9f6co8nk0%2BA8gjSi4Ek6xpgvM%2F1CuFfuGFLetzTMePLJs4t96VzP1R%2FeZjWehA38R2QblX6yF9IEgd82STWJAbzE6NrAz3E27rNuQ53%2B%2B0Iq%2BvgGoWTdH34qCx54qLc2LVSYOJTK%2FWtD%2BUUb0PdsLUehIHqUojMheENjUH5nCTPIEHGrC0iUJEh3e5CVzIt3kXLVXH9Sa2DKrgoedGup0R8tLMjXzfBl40yk3btdv8yyXneXXFMAEp8OF%2BgqSPvNr%2FbXdb%2BGGaSELS92cURXwPK8eklzIFMToDDqri7thR6JFZbw04%2B6d4t9N2CRWn93Vr8TTSfKJ191n7zUsDcH6PwiGaADzF4%2FKAz53SaiKcK5KlXuXrmGJFnpI0qNfjN4oRi3g4GKP8IhXmIpzh8UUoU3XnEdTjAaDWzYejcMY2neAKeOvmfQ0%2Fwknkmo%2FVc6yreE8ZviVyIMQfOpycNuy7zMKDaA1GHVYicZwrbqArmdm5CBIahHHIzN%2FzPimybs5ZbJoeaBOKcfh6EEudcOyFsOoCd9KDUdDWa3u2K0HuszeIf01uckKaebLw%2B1RfNvIbnud9BiETp9uDIRyahEKa3FrOSUmair7FZFnaEN2FZg%2FBCMjNH3mqGwatHKz2XYOx1aYY88N2oank6m7p2N7jwIsYXxOfg5G3748ylJm7uw82iwyW%2BWq6pkDJoFm5Jp2DTuiKeeHjnYR0hK4f7bEvQZy6J7BHOmNLFJjgSpaRYYkdje1wnfIpGcOr3OzAJ9AWRUmm9kZfdocUCi4KBn5v4fng%2BWHzCQ1lUgk3gxBOjyBLaHS%2FCpN9GARUr3TYCeK8GhlHfG%2BXPku0ewl1PYzlOGQsr8%2ByJ%2BrPQ7WQi%2Bx1xgmTrzPJNwxLtjSoEnU4%2BjWrvmXWUKLufwIghdtRCctPXDtC1yRPSDh1K6Iky%2FU5CNzHWKiLal8lddy229ZK%2B2Q%2BmNrTpOfc%2BW3N2LlIRmb5x2ah2x7%2BLjsSqLRxmWIvqLG8TjIO8bqHsCZNTdQegy06u%2BcmiiOa%2F6TThUfVicVav1xO8%2B%2FYOe%2BfM96SnWqg2BmqDQH7c9Vjh7ZLOW%2Fjd4vUGeaMrnWnCZ4%2FMPkMCDRoTskxKwYdj2bDSH%2B7VKJDIOgaq1XgW8c6K0J8H2JCu5tBFKrjHfkrd1dt464grsQ6GSnfpAJ82y%2FAQvwUpMB77PN3vU8hcFXehwWmFAVhYieROPYLJTeLzkvHA7tpfSfTu7LiSHieU%2BxPSR4FIbcoY8bLcXNJwlxeuKHov2R6GZNtPr8tm6clVnVILJoiaUDVTS2ArsEl6cVTuBIxfWcHkid4kIvQpqhQ2Og95T6xF7GIYMtlGiY0kHCL4Ou5XcJkbFHZ1%2BRN2%2FTXGqH1vX69lQ4PA1xX9bgjEQTztke2un91xN9NvuUFtBc5BVrtr%2BI%2BUgbMVLctO79LnWeHw%2B5m4DFWvHZS5jy3Fp508ilF6jB3d4ASayLsA3l31x%2F641MiHI6CTajefBX7JWtPZBGmkPS4LtnkxOdZJUpYrQebpgDSu3WXk6%2FMy%2BQbN2DR2MlGDPRTdY%2BHcd1s9RCKSnc1pOWxkEnQE%2FSKDhxs2FeujBYHDKcDvJXGim2ZWIxQPb%2Bu%2B1t34UaGeKgiqLVWRx5a7eqTFQSRMFic6%2B%2FQGYC2koJXtkeE0SCQnStk5wg%2Fk%2Bc2oGZtntWJTvW6osExT3Hw%2FirkcphDzXmJ%2BFWw4ZkBovG4VN2w11oYOa2GUeZqRUDnEB6%2FS4vNk6jC73Ax18ESGM4xV4cFciE82wUMlEv2VmVCuTMOTEd8Rg54PKoBdcvFYjcRxrHlgHxZYzdd9A%2FOZk91CfCeIWmQrIjMA1b80TFqjBvYxQD0cYE9DJvIp5O4rGSj3gvMrQLDORKUAz%2F0uyxrFQM5lhRl47JQkCJoH9DjwLSiws%2B1PMeKiNIn2hRFKIoHZJRj3ZxZiEnlf7tXkqdBFl7SFTJDThOKCTRNQnFY%2FHowNkH4sqaBnjSo3F63mhcY7P5uW6d7W3Uz9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=FDzSMRR1XVn1du%2FNsXPdw58hpu%2BA7Ga85YK4kEW%2BWPm23ZqyNrqr6suJCI6wRHsovkGZe%2BBLtXU0%0ArIG94WFIyMDJBNqeawO%2F%2BABwCmACF0j32LI56itq4vssdYdipQrEvLDDmi89RF%2ByIBXAE0T04ho1%0ALA1j1Ey%2FurxulloMTOjz12KBGgzpCUNWZnbZvzM0BoUOGVYNgjeN0DFrZKapLJc%2FGTt3KpGPVyrb%0AI0MrrySMW1Di%2BQXlJ4UrfZhAAoHILxqrDh7TN21%2FUsrtke7iZLt1dv3%2Bfai%2BukC%2FWzNZcxtw3vQS%0Am3HTzVxDWjHbbFXQS2jCPT%2FMhmeOVI3NV75PlQ%3D%3D"
1583
network    2018.06.05 17:03:16.621   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Cache-Control": "no-cache, no-store"
1584
network    2018.06.05 17:03:16.621   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Pragma": "no-cache"
1585
network    2018.06.05 17:03:16.621   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Content-Length": "0"
1586
network    2018.06.05 17:03:16.622   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Date": "Tue, 05 Jun 2018 15:03:15 GMT"
1587
network    2018.06.05 17:03:16.622   UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46)                : SOP-Check( "https://eid-prod.verwalt-berlin.de:8443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= false
1588
default    2018.06.05 17:03:16.622   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:291) : SOP-Check failed, continue process
1589
default    2018.06.05 17:03:16.622   ...shAddress::sendGetRequest(core/states/StateCheckRefreshAddress.cpp:133) : Send GET request to URL:  "https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1iQ6gZc1tMoEEg1fv1R3j7bZe%2B%2FYfczICI847h7uxz3405%2BP9%2BunrZjmZuh%2F%2BQr%2FDH39qeizIW%2F66pevvid%2Bo77%2B%2Bdc%2Fzcn7hYzfnWIeh34ufroX9fP330d%2F%2BbpO%2FfchmZv5e5%2B8i%2Fn7kn13GUP%2FjvwMfR%2BnYRmy4fX1J76Yl6ZPlt82qpdlnL%2BDYNHk3%2B4p%2Bc%2FZ0PdFtvx8H2VPXsu3tJheTf9zXoDsWkxVMWlDvwzPIgV%2FiHaKrGi2wi2m7VUsf56L%2Bcf5lfwXHCZyGEnTbxBFY9%2BwHMW%2FpRAGf8sSiMZgkspKtPj6k8L%2F8rVAsRJKS%2FwbjZfZNwzCoW80AmffoJSmUZzAaSRN7pn9XzB7wy9f%2F5skCbQoCuRbVuTQvYiiv6U0TH9DEgonoZJGUPKH%2BHleC6Wfl6RffvmKQDD1DSK%2BQbgH498h9DtM%2FAxRePz1p%2BAvar8V9fUPJX%2F%2FbfH09xr%2B3xWczHMx%2FVDq11%2F%2Fqsx%2FUeKfwN9s9Yfwv9rTXZJlnf%2FpJzfkxU9B8lqL%2F33jG969%2BLu7Ztmt%2Fq%2Fgr39sMn7%2FB7HfhT6bznEpcuYvJ%2F2PwP3puP3yb8L4ZEn%2BkPPjj9896naofd9%2F3tGfh6kCEQiCQQgDb2e9Z%2FzXbZf8NmGCZUlGljmKFWRGQzgMESQMo1iWJnCaE%2BnXn7xzvKH%2FH%2BUJr%2BJd9MttuL8%2F2W0Io1jqIf%2BJeVXD1Cz1%2B%2F9CVlLMMEJ9y9Lshx7z%2BbtWnEpfDn8gzOd%2FIwMCIfoHvnxuqv%2F6p5MU%2BS3kd8x0QmcYDhcFhZBUQmNlkZFFntA4klF5mcP%2FXzBMc%2FIN%2Fm%2F8HwH8BibEIfqHvf76g%2FvhsWWTJUvxq6Eo%2FMVzHDO5FbMrLFMpHGMbO29HqjbESr1lJmMLOmszexUPB3cxKluZActEHtM5omFTP%2BbygW0rX4Q95uJQnZMndvAXY%2F4%2BMfPYTn1l72NMW8E3WEViYF%2FgakN3A0d4Nuzf1vCM9vua2fvCQIFktkJjcMxvC5h9j31IND2RfiVPe8lkdYs5vE0RfI2fJhRCwcO%2BhNpgKYlzP5KrpChvCyrjRO6X%2BPnqbOkFxfKwRO%2FgTKXXqr%2Bdl8FiIe8JqOEJu3kJsHEpuyEO95jyz2N%2Fhf%2Fl3%2BH%2FT%2BB%2F%2BXf4%2FxP4X%2F4d%2Fn8LX1FYpf1hqO5Td41E7xB7W1tkmAf3hbEp5nYPlqu02yUEBnmcVqokW17IbgnyDLVrDzoqHf9EME7B8wSDm0dY9XowgAlnV%2F61YK2luODRMl9kVb8igXBIJZC4zL40u7iSg%2Fdp%2B9E6%2BmAI7kzwRRSEcvJ4UyId2CazpWeOFkDrxmhYPPQzRRYNVbf%2By1qBzzT%2BWEYRLCAjKlOWFMicHt1JxlvlFnXstV7LR%2B4QsAq3Hr7dQebqRn3qOm2yTTUn4AMT5zjWDV8o1cJx78m7xzGQH%2BmFgYhqP5EccNLplLFq74VC68khKCF1kpEGJD4Cwla%2BoQWthcVbWrFHDz8rzzjFL1ihjVUeIwuAC4y6TL4l9rGARUkgkPKZ44Xf4qkfsTNF8Rh8dBgDJu9d4RmbYYdj2CX%2B9%2BslO4bwhWkZxmDmH96f8%2FttgV0ROv6frTX%2FZq0fBpos88n4wMUngzOlujy24KfW%2BoRSheCL09blByepSQKJ3qT3sfTfJeTBnYDNnMjI6%2FRRU4fMpFJwylQB6tAhIqclKnhh2hUNrmowzBUZ1oGuvmAoQNDdu2xDuacrvu%2FGviRAnFl4mxmMfPhI9SGzRTkFZL%2FhQNQ1y5r2vOvFLKBZukaDu0zlC%2FIGo%2BILvT6uXVzyR2xAKoyEZShoql37VJIDfszm79ryl%2BMACGE%2FshioD5Amck6lKtmTpLkadjciCv2BssC0fimWz9A8hxd5H2V7N%2B4JqENTGAuNZm9HpztDjjBG06D3wBq%2BVoKItbaECtuIBeWWlqI6vqolvVz4S%2BS%2BZHlJBGTkvPZffvkT%2BEco%2Ffvo%2BdfB3%2BPrjyl%2FpI4%2F0hLXjHUx%2Ff7vb3nq94Hf8vuvBU4bR3vuuWADE9kWx%2BvKe2qiLL42MSoI02OwX72%2FweJ7nVRl1jG%2BddwF3cAAC0FTteAt6OHtOdosgGqyBmcIUFVS2MIGRn7E7Kj6OjD3GZifKaSfGfgUkA51MpQwIZZ%2FiGS00j5KgcQsos9s0jMXoysB8AqeztYqQ8bklaDwS73SeFohBbDlduqeWf8yBtvTrCaG8gaj3QJ3vBccbeEoJhr58iNOAwmHsDySUUdchk7Ng8Tg8c6exrnGgle2aQaCdVHnIfkyBZEd8FC%2BerSF822aiLmpPwnvFaWFzuUphZk%2Bhh4id6dPG3Wm0w87yGlEpJchVz78GQi0F7grdtqgr2hBwvww1b%2Bo%2Bh%2BG%2FjDWPzKa227%2FzwYkvJJ9SxsQQ88rn00aQIydKE1kThZVSw3M8IbwU0%2FmNA6DtH%2FkR%2Fxok3HtuE3FxSdj7zZxrY4Fqx0CcS3pKHAz4wnxVPZN7Qb9WS3b9kbuuAfFG5MdbGcQ%2FEFOHdy2cRsKYg1gb%2BLzgjcAYdt9FNxKEtC%2Bdg4KVC7oAHr0wekflimgYeum68ia2Xmnn%2FMozx3GdEzB%2BStbhEMOxvaAQVYJiFf7WJoa4WDuakZGSsj2ZHuMRV6oPeyKs0aVkMwXfmQB7zYkzMH8vGAHHYbhIastG8U6Aqi8L3eboMsdI%2B8mYkhH3fuXfAaU0dLM8yHGZhXGCwjsgcW2%2BW5Rp0EnqeP6tJarntuPjsjoUMmnzIS8IWD96GpOP2pLXpgICBvGXHK1q%2Fcn2JfxzrOVOuEu2VMZQMNAlpqaOr%2B9QoFU3T5mu9j9DjUbpEKnNw0zxfghLS0nc7cejFXI6gKoCj4ALed8lS2MBSx1tdGorP7rqeMImz%2BXuU54mZsSO2WFxxXdfCoUGaMDcqPngkMYZ%2Bs1sp2W8ECErxyf9msbTEEBJsJsghnXcuuTCo%2F9c3i0VBIPptdhJUhX0O6VrKXfC6GIRPqi1DpKHPB8Uz76ASxeJmAS2iGRI9N46eJkJWEtjAAve3QI%2BaTYQW1ssY0c%2FuRj1xbmW00wmkQOKbNGTtIesgmcvTOcvNNlBkhz2vWAZ2%2B6imnJHjlqCOYuuZOGz8Ag%2BMBorgMw1grzC2DuQ%2BLK20cXU3PKU4PLGdfEyqT1CHz3wydOYvgk%2BhMzYaMeus7DZoUNGbtY7%2Fwyp7toKUMapTNApFUl7O7p1%2BvehCi1ENOilZMszg6REMMEH7KHc3W9YmUU8pyJ31kMcfnPFZDuvBqVeBngXe%2Fqq%2FLQ527NNss%2FiDzYDfe94LgVFMW8LvvsddfauRkyTxHFedxTWD0%2Fb%2BBZJTJiBSquht4aUPFQhmcBXthyYj8jXHqr1l2QhkJQVyUN8eagCoRdv5Qt4wymFW%2B%2FOHsx7QITKqaaBecUlAKQfAPMxxLZLWzniuVfvrdKEd9Z2aczPh9P1ABVCFVDUXNjHs0aKOCPrtBMZi1bLj28A5pz2uyNBwp5xWihvlgm45uHI42IvMXs2UObN7%2B2qQidnYeGUAiMj91FrLMCXATphyNxfTLsAt5MWssgEgMm8BGcqnlf%2FSBRRKfjXV4FJjxBepANy6avuXj2FQU%2BpjxQw5sHCaahr9ykKMM%2BQNkdplxtxHb9w9ysJlgOBvE8DonCUCUiZlwXWJ5asQg5mmlcxTtf8%2FHQxdnU%2FHz3YMQDzk1rSXmHJwfRjHRVASy7w4rW2MqL4Qbwc3S59ziujGyeTWxXJmUbs7O1Ox8Q21Ut6uDSYkR5BEHjaQEjuRJ%2BynRvV2mi8zkJAbd%2FGDcfQ%2FsP9dbvHSwGXl43n6LLZ7hwFf5Ul4pUqWAwyDKI5Gcn0YvnkfFwHSpi6znAVEbwPF1W4v2XHsoCPb73jxSD9ooNvQn1TL%2BQAV%2FB7esJ%2BIEz%2BrWFoX3aYt3FSo8oK4ZgMcS1600XNABEsZtVeM2WDTFP18yJAqY9Ng8%2FhFFOs49Xj1hAIMYLYuYmEE8Nz%2B1tIntt96xwluCSlIMJeDJH4p1P30K9Nsmj15sVs4SCneYsUNtMnZjRjXJzXj4Sa2ZZh1K7wZzQg8rGn%2FpbWD%2BYTG0jsjGrCF61wSG8QOZpqJeP9oXxp72ZtqYOSQjOs%2Bw3tTh%2B8DWhqB2zKwbpyLKmm9FiVKLIGpfV%2FWuIzSZK39IYrAFwvN9wGY7g5S8Z3Erq%2BM5lSQgetTLJ1rBmmMlGj96y38KH1ejjI1jbYiGHUKAtraAQGcAHFuunmGAE%2FQ6xZKCA2SmZ%2BClPMGYaDR4Yc8Cld0hxwk9ig5otJnodyCvbT%2BJOJ8divUA3aHef6hnM7GUU9C0LRTgWSO%2Fsp6pPc6LSE%2F489pb1WJsqccJJDo9DCYWM8hx4acSIjktDlYgmAzstBxorvYhjXWx5fdqjT66fZUcqAlzV%2BtN5w4tXUr7f%2BsbZAsV0dvpk4U1EkWeaURJgEFlW2p1q7u%2FgTVQHIlNNV5O3aPIKyXxdJzmgairWdkITzRGthQsbR88loDxeE0NIYjuaT7zNeAG4eTJVehsubVXv2KHTG5ICreuCoeAWvpBPerBU04%2FK4%2B3hAXhfzChdGercsSRI0dSPS86rrpmNlYbBepVeOcFh0CeHlDAvazj7RJFldno67UyTjmxz4SOE1It3PFrk019zCbopCHSlGLzV7O4wQaJyaLXcXPMOC7HUz4ke6RzabvJ7ewYVDKpbO53p9rrEm6A8RcDOg1MBWhYdtw7s1ZBsV8vFAxtM3w9IPT97ByoPJFoIdWCV%2Fsxd5BQdzM83frV7TSdpYXYh3LqiMqb3MmHkA2CEFWlFfV1QM3wk2xZmSwnLbvrsIQZgH6T1iHf84xeay31qFnt05GQlTlXXbDDYp4E02fxoIMlH2yySyGipn9VhyGMhUzMI6bVJ4Nl5yMV5V5UlVDJXU9YsAOT%2B2wAnHZbGR%2BTHrx2%2Br59vLZoCCAW2ikxBzIxW63tG8keb29E1x5jAokbNXFXkRGRpwWBZJMsDcxhm%2Bjh9KUAJXWHFwbYZie0cyfcj0Qk2JGTO6Qq19Kb16n3lqyDZscGWXj9oJYEP0mTVgwJhhrzZ4wRrAmoRj2Ni5KpQwbcnvQAmDTPcKB5utRFLFovvV3jFHssNepHNmzPU0bvR7XN5s28SCdiS1hyQWMtGBxz97WE5UNUpsfGXddNFldMmUSJdRjmCeJAx%2BrW2a4Dvm6U7b3qYOooQZG%2BsKAwO9WerBFMUI7dTFp0cUtUsbWOyaJidA6XBXA8KzkgqnSMDMHh8ZOsuoPJciT5UkvQGscTLGzhKqtlYyEYeMFih3ImA7mdE80icveOIP7X6ts41MC%2BzCRfqvJKTIRgZnWpZOEaPcHbl46Y5fvJiqH7sD7aghO1BjP1hLeRhrit%2FOmQd7mp0X3H1GZDknZnCrnqqqyI1ncSVXuyjOkEPpllZrLSxVcQsRzqSNwmqhVJcHyCRqUMG8CKOx1RpEK2t43kQOQFT6cc1KaN7fLZmZLUuqrS7mA%2BesPgcRQ5HzPqIHfgTkbsaPOXHghEvWuOkhhtkwbW3vY1UMQsaWFCRq0wS2DMvBKahYjwa%2BXi02%2Fbk3AVOmRRJxvPJq6tsDmxIp42oZBMITYf%2BeqlV%2Fnw77eWVYaUyucJU2uSL%2BxnnzKfXFqZJi9bDLr8OGP9qER6ez7a5W1tmshhtHUMEuyzrtenIZRcWWnplium4MznORSwNXGtZo8srA%2B6Su5aQeYm%2BVXsXi8bFBajbQw5iM0nljmXTLCWZtAtN3NeKa2PFa1jpaiCzRSKQwyk0xFHoz%2B0sF61AuZ2trT7Y1gsdzWO%2FuJuadkYxS9bNl5%2FC%2FcxguVqTrdEiAZfOY%2BMB2MIqmSjwAhp74NiQe93HKYoWHwuy8LNnEY7FGoVJB5sdyfDY%2FCEPkIggkCXDu0Y9iBcRze0z7%2F0Ohoo8LjuanSoq%2BUA6%2BAhrDHwHyGzmVhyRHy%2FoXuo7pAkTXKCr%2FwRraCzPpxE0fP2RjdCMb%2BIQfeZsgnpWSx00YjlWM8iBhs%2Fh9oDS5QxidAmYnTBNF4IJ1ZhPYL0fL8P1HUHfD4iPru5D2TndEdPF70FASoXAeuFJ3TvwjqrkMA8K2VnkvNmNb%2BggnaXO%2FXmutasEpHhy%2BEf5Cp23sBeyiZioZd3c53ItRlOXu89FZay06r6OsEQ%2BsnrelwugjAw6VJo4JwA%2FPC0tbsSiHHHSnySTsigwvvvMfZR62eBlr2nthjTNyMu0ONVoGrZ%2BKKJLQ7rIHqjdPAH%2BObVtQ7KGcPdlEKE1l0Y%2B20JanrHQusKQPB9ISXDuRbBPE3R%2F5MmxwaJSEV8OtlDc9HwK%2FjJHuHAYOX33Anyvn2yQxbPlyUvSkD1PzE4Od7DHPleMgl28aLbq606LU7WaOO0cVipYxCi%2Bi9f6co8nk0%2BA8gjSi4Ek6xpgvM%2F1CuFfuGFLetzTMePLJs4t96VzP1R%2FeZjWehA38R2QblX6yF9IEgd82STWJAbzE6NrAz3E27rNuQ53%2B%2B0Iq%2BvgGoWTdH34qCx54qLc2LVSYOJTK%2FWtD%2BUUb0PdsLUehIHqUojMheENjUH5nCTPIEHGrC0iUJEh3e5CVzIt3kXLVXH9Sa2DKrgoedGup0R8tLMjXzfBl40yk3btdv8yyXneXXFMAEp8OF%2BgqSPvNr%2FbXdb%2BGGaSELS92cURXwPK8eklzIFMToDDqri7thR6JFZbw04%2B6d4t9N2CRWn93Vr8TTSfKJ191n7zUsDcH6PwiGaADzF4%2FKAz53SaiKcK5KlXuXrmGJFnpI0qNfjN4oRi3g4GKP8IhXmIpzh8UUoU3XnEdTjAaDWzYejcMY2neAKeOvmfQ0%2Fwknkmo%2FVc6yreE8ZviVyIMQfOpycNuy7zMKDaA1GHVYicZwrbqArmdm5CBIahHHIzN%2FzPimybs5ZbJoeaBOKcfh6EEudcOyFsOoCd9KDUdDWa3u2K0HuszeIf01uckKaebLw%2B1RfNvIbnud9BiETp9uDIRyahEKa3FrOSUmair7FZFnaEN2FZg%2FBCMjNH3mqGwatHKz2XYOx1aYY88N2oank6m7p2N7jwIsYXxOfg5G3748ylJm7uw82iwyW%2BWq6pkDJoFm5Jp2DTuiKeeHjnYR0hK4f7bEvQZy6J7BHOmNLFJjgSpaRYYkdje1wnfIpGcOr3OzAJ9AWRUmm9kZfdocUCi4KBn5v4fng%2BWHzCQ1lUgk3gxBOjyBLaHS%2FCpN9GARUr3TYCeK8GhlHfG%2BXPku0ewl1PYzlOGQsr8%2ByJ%2BrPQ7WQi%2Bx1xgmTrzPJNwxLtjSoEnU4%2BjWrvmXWUKLufwIghdtRCctPXDtC1yRPSDh1K6Iky%2FU5CNzHWKiLal8lddy229ZK%2B2Q%2BmNrTpOfc%2BW3N2LlIRmb5x2ah2x7%2BLjsSqLRxmWIvqLG8TjIO8bqHsCZNTdQegy06u%2BcmiiOa%2F6TThUfVicVav1xO8%2B%2FYOe%2BfM96SnWqg2BmqDQH7c9Vjh7ZLOW%2Fjd4vUGeaMrnWnCZ4%2FMPkMCDRoTskxKwYdj2bDSH%2B7VKJDIOgaq1XgW8c6K0J8H2JCu5tBFKrjHfkrd1dt464grsQ6GSnfpAJ82y%2FAQvwUpMB77PN3vU8hcFXehwWmFAVhYieROPYLJTeLzkvHA7tpfSfTu7LiSHieU%2BxPSR4FIbcoY8bLcXNJwlxeuKHov2R6GZNtPr8tm6clVnVILJoiaUDVTS2ArsEl6cVTuBIxfWcHkid4kIvQpqhQ2Og95T6xF7GIYMtlGiY0kHCL4Ou5XcJkbFHZ1%2BRN2%2FTXGqH1vX69lQ4PA1xX9bgjEQTztke2un91xN9NvuUFtBc5BVrtr%2BI%2BUgbMVLctO79LnWeHw%2B5m4DFWvHZS5jy3Fp508ilF6jB3d4ASayLsA3l31x%2F641MiHI6CTajefBX7JWtPZBGmkPS4LtnkxOdZJUpYrQebpgDSu3WXk6%2FMy%2BQbN2DR2MlGDPRTdY%2BHcd1s9RCKSnc1pOWxkEnQE%2FSKDhxs2FeujBYHDKcDvJXGim2ZWIxQPb%2Bu%2B1t34UaGeKgiqLVWRx5a7eqTFQSRMFic6%2B%2FQGYC2koJXtkeE0SCQnStk5wg%2Fk%2Bc2oGZtntWJTvW6osExT3Hw%2FirkcphDzXmJ%2BFWw4ZkBovG4VN2w11oYOa2GUeZqRUDnEB6%2FS4vNk6jC73Ax18ESGM4xV4cFciE82wUMlEv2VmVCuTMOTEd8Rg54PKoBdcvFYjcRxrHlgHxZYzdd9A%2FOZk91CfCeIWmQrIjMA1b80TFqjBvYxQD0cYE9DJvIp5O4rGSj3gvMrQLDORKUAz%2F0uyxrFQM5lhRl47JQkCJoH9DjwLSiws%2B1PMeKiNIn2hRFKIoHZJRj3ZxZiEnlf7tXkqdBFl7SFTJDThOKCTRNQnFY%2FHowNkH4sqaBnjSo3F63mhcY7P5uW6d7W3Uz9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=FDzSMRR1XVn1du%2FNsXPdw58hpu%2BA7Ga85YK4kEW%2BWPm23ZqyNrqr6suJCI6wRHsovkGZe%2BBLtXU0%0ArIG94WFIyMDJBNqeawO%2F%2BABwCmACF0j32LI56itq4vssdYdipQrEvLDDmi89RF%2ByIBXAE0T04ho1%0ALA1j1Ey%2FurxulloMTOjz12KBGgzpCUNWZnbZvzM0BoUOGVYNgjeN0DFrZKapLJc%2FGTt3KpGPVyrb%0AI0MrrySMW1Di%2BQXlJ4UrfZhAAoHILxqrDh7TN21%2FUsrtke7iZLt1dv3%2Bfai%2BukC%2FWzNZcxtw3vQS%0Am3HTzVxDWjHbbFXQS2jCPT%2FMhmeOVI3NV75PlQ%3D%3D"
1590
network    2018.06.05 17:03:16.622   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "eid-prod.connect.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1iQ6gZc1tMoEEg1fv1R3j7bZe%2B%2FYfczICI847h7uxz3405%2BP9%2BunrZjmZuh%2F%2BQr%2FDH39qeizIW%2F66pevvid%2Bo77%2B%2Bdc%2Fzcn7hYzfnWIeh34ufroX9fP330d%2F%2BbpO%2FfchmZv5e5%2B8i%2Fn7kn13GUP%2FjvwMfR%2BnYRmy4fX1J76Yl6ZPlt82qpdlnL%2BDYNHk3%2B4p%2Bc%2FZ0PdFtvx8H2VPXsu3tJheTf9zXoDsWkxVMWlDvwzPIgV%2FiHaKrGi2wi2m7VUsf56L%2Bcf5lfwXHCZyGEnTbxBFY9%2BwHMW%2FpRAGf8sSiMZgkspKtPj6k8L%2F8rVAsRJKS%2FwbjZfZNwzCoW80AmffoJSmUZzAaSRN7pn9XzB7wy9f%2F5skCbQoCuRbVuTQvYiiv6U0TH9DEgonoZJGUPKH%2BHleC6Wfl6RffvmKQDD1DSK%2BQbgH498h9DtM%2FAxRePz1p%2BAvar8V9fUPJX%2F%2FbfH09xr%2B3xWczHMx%2FVDq11%2F%2Fqsx%2FUeKfwN9s9Yfwv9rTXZJlnf%2FpJzfkxU9B8lqL%2F33jG969%2BLu7Ztmt%2Fq%2Fgr39sMn7%2FB7HfhT6bznEpcuYvJ%2F2PwP3puP3yb8L4ZEn%2BkPPjj9896naofd9%2F3tGfh6kCEQiCQQgDb2e9Z%2FzXbZf8NmGCZUlGljmKFWRGQzgMESQMo1iWJnCaE%2BnXn7xzvKH%2FH%2BUJr%2BJd9MttuL8%2F2W0Io1jqIf%2BJeVXD1Cz1%2B%2F9CVlLMMEJ9y9Lshx7z%2BbtWnEpfDn8gzOd%2FIwMCIfoHvnxuqv%2F6p5MU%2BS3kd8x0QmcYDhcFhZBUQmNlkZFFntA4klF5mcP%2FXzBMc%2FIN%2Fm%2F8HwH8BibEIfqHvf76g%2FvhsWWTJUvxq6Eo%2FMVzHDO5FbMrLFMpHGMbO29HqjbESr1lJmMLOmszexUPB3cxKluZActEHtM5omFTP%2BbygW0rX4Q95uJQnZMndvAXY%2F4%2BMfPYTn1l72NMW8E3WEViYF%2FgakN3A0d4Nuzf1vCM9vua2fvCQIFktkJjcMxvC5h9j31IND2RfiVPe8lkdYs5vE0RfI2fJhRCwcO%2BhNpgKYlzP5KrpChvCyrjRO6X%2BPnqbOkFxfKwRO%2FgTKXXqr%2Bdl8FiIe8JqOEJu3kJsHEpuyEO95jyz2N%2Fhf%2Fl3%2BH%2FT%2BB%2F%2BXf4%2FxP4X%2F4d%2Fn8LX1FYpf1hqO5Td41E7xB7W1tkmAf3hbEp5nYPlqu02yUEBnmcVqokW17IbgnyDLVrDzoqHf9EME7B8wSDm0dY9XowgAlnV%2F61YK2luODRMl9kVb8igXBIJZC4zL40u7iSg%2Fdp%2B9E6%2BmAI7kzwRRSEcvJ4UyId2CazpWeOFkDrxmhYPPQzRRYNVbf%2By1qBzzT%2BWEYRLCAjKlOWFMicHt1JxlvlFnXstV7LR%2B4QsAq3Hr7dQebqRn3qOm2yTTUn4AMT5zjWDV8o1cJx78m7xzGQH%2BmFgYhqP5EccNLplLFq74VC68khKCF1kpEGJD4Cwla%2BoQWthcVbWrFHDz8rzzjFL1ihjVUeIwuAC4y6TL4l9rGARUkgkPKZ44Xf4qkfsTNF8Rh8dBgDJu9d4RmbYYdj2CX%2B9%2BslO4bwhWkZxmDmH96f8%2FttgV0ROv6frTX%2FZq0fBpos88n4wMUngzOlujy24KfW%2BoRSheCL09blByepSQKJ3qT3sfTfJeTBnYDNnMjI6%2FRRU4fMpFJwylQB6tAhIqclKnhh2hUNrmowzBUZ1oGuvmAoQNDdu2xDuacrvu%2FGviRAnFl4mxmMfPhI9SGzRTkFZL%2FhQNQ1y5r2vOvFLKBZukaDu0zlC%2FIGo%2BILvT6uXVzyR2xAKoyEZShoql37VJIDfszm79ryl%2BMACGE%2FshioD5Amck6lKtmTpLkadjciCv2BssC0fimWz9A8hxd5H2V7N%2B4JqENTGAuNZm9HpztDjjBG06D3wBq%2BVoKItbaECtuIBeWWlqI6vqolvVz4S%2BS%2BZHlJBGTkvPZffvkT%2BEco%2Ffvo%2BdfB3%2BPrjyl%2FpI4%2F0hLXjHUx%2Ff7vb3nq94Hf8vuvBU4bR3vuuWADE9kWx%2BvKe2qiLL42MSoI02OwX72%2FweJ7nVRl1jG%2BddwF3cAAC0FTteAt6OHtOdosgGqyBmcIUFVS2MIGRn7E7Kj6OjD3GZifKaSfGfgUkA51MpQwIZZ%2FiGS00j5KgcQsos9s0jMXoysB8AqeztYqQ8bklaDwS73SeFohBbDlduqeWf8yBtvTrCaG8gaj3QJ3vBccbeEoJhr58iNOAwmHsDySUUdchk7Ng8Tg8c6exrnGgle2aQaCdVHnIfkyBZEd8FC%2BerSF822aiLmpPwnvFaWFzuUphZk%2Bhh4id6dPG3Wm0w87yGlEpJchVz78GQi0F7grdtqgr2hBwvww1b%2Bo%2Bh%2BG%2FjDWPzKa227%2FzwYkvJJ9SxsQQ88rn00aQIydKE1kThZVSw3M8IbwU0%2FmNA6DtH%2FkR%2Fxok3HtuE3FxSdj7zZxrY4Fqx0CcS3pKHAz4wnxVPZN7Qb9WS3b9kbuuAfFG5MdbGcQ%2FEFOHdy2cRsKYg1gb%2BLzgjcAYdt9FNxKEtC%2Bdg4KVC7oAHr0wekflimgYeum68ia2Xmnn%2FMozx3GdEzB%2BStbhEMOxvaAQVYJiFf7WJoa4WDuakZGSsj2ZHuMRV6oPeyKs0aVkMwXfmQB7zYkzMH8vGAHHYbhIastG8U6Aqi8L3eboMsdI%2B8mYkhH3fuXfAaU0dLM8yHGZhXGCwjsgcW2%2BW5Rp0EnqeP6tJarntuPjsjoUMmnzIS8IWD96GpOP2pLXpgICBvGXHK1q%2Fcn2JfxzrOVOuEu2VMZQMNAlpqaOr%2B9QoFU3T5mu9j9DjUbpEKnNw0zxfghLS0nc7cejFXI6gKoCj4ALed8lS2MBSx1tdGorP7rqeMImz%2BXuU54mZsSO2WFxxXdfCoUGaMDcqPngkMYZ%2Bs1sp2W8ECErxyf9msbTEEBJsJsghnXcuuTCo%2F9c3i0VBIPptdhJUhX0O6VrKXfC6GIRPqi1DpKHPB8Uz76ASxeJmAS2iGRI9N46eJkJWEtjAAve3QI%2BaTYQW1ssY0c%2FuRj1xbmW00wmkQOKbNGTtIesgmcvTOcvNNlBkhz2vWAZ2%2B6imnJHjlqCOYuuZOGz8Ag%2BMBorgMw1grzC2DuQ%2BLK20cXU3PKU4PLGdfEyqT1CHz3wydOYvgk%2BhMzYaMeus7DZoUNGbtY7%2Fwyp7toKUMapTNApFUl7O7p1%2BvehCi1ENOilZMszg6REMMEH7KHc3W9YmUU8pyJ31kMcfnPFZDuvBqVeBngXe%2Fqq%2FLQ527NNss%2FiDzYDfe94LgVFMW8LvvsddfauRkyTxHFedxTWD0%2Fb%2BBZJTJiBSquht4aUPFQhmcBXthyYj8jXHqr1l2QhkJQVyUN8eagCoRdv5Qt4wymFW%2B%2FOHsx7QITKqaaBecUlAKQfAPMxxLZLWzniuVfvrdKEd9Z2aczPh9P1ABVCFVDUXNjHs0aKOCPrtBMZi1bLj28A5pz2uyNBwp5xWihvlgm45uHI42IvMXs2UObN7%2B2qQidnYeGUAiMj91FrLMCXATphyNxfTLsAt5MWssgEgMm8BGcqnlf%2FSBRRKfjXV4FJjxBepANy6avuXj2FQU%2BpjxQw5sHCaahr9ykKMM%2BQNkdplxtxHb9w9ysJlgOBvE8DonCUCUiZlwXWJ5asQg5mmlcxTtf8%2FHQxdnU%2FHz3YMQDzk1rSXmHJwfRjHRVASy7w4rW2MqL4Qbwc3S59ziujGyeTWxXJmUbs7O1Ox8Q21Ut6uDSYkR5BEHjaQEjuRJ%2BynRvV2mi8zkJAbd%2FGDcfQ%2FsP9dbvHSwGXl43n6LLZ7hwFf5Ul4pUqWAwyDKI5Gcn0YvnkfFwHSpi6znAVEbwPF1W4v2XHsoCPb73jxSD9ooNvQn1TL%2BQAV%2FB7esJ%2BIEz%2BrWFoX3aYt3FSo8oK4ZgMcS1600XNABEsZtVeM2WDTFP18yJAqY9Ng8%2FhFFOs49Xj1hAIMYLYuYmEE8Nz%2B1tIntt96xwluCSlIMJeDJH4p1P30K9Nsmj15sVs4SCneYsUNtMnZjRjXJzXj4Sa2ZZh1K7wZzQg8rGn%2FpbWD%2BYTG0jsjGrCF61wSG8QOZpqJeP9oXxp72ZtqYOSQjOs%2Bw3tTh%2B8DWhqB2zKwbpyLKmm9FiVKLIGpfV%2FWuIzSZK39IYrAFwvN9wGY7g5S8Z3Erq%2BM5lSQgetTLJ1rBmmMlGj96y38KH1ejjI1jbYiGHUKAtraAQGcAHFuunmGAE%2FQ6xZKCA2SmZ%2BClPMGYaDR4Yc8Cld0hxwk9ig5otJnodyCvbT%2BJOJ8divUA3aHef6hnM7GUU9C0LRTgWSO%2Fsp6pPc6LSE%2F489pb1WJsqccJJDo9DCYWM8hx4acSIjktDlYgmAzstBxorvYhjXWx5fdqjT66fZUcqAlzV%2BtN5w4tXUr7f%2BsbZAsV0dvpk4U1EkWeaURJgEFlW2p1q7u%2FgTVQHIlNNV5O3aPIKyXxdJzmgairWdkITzRGthQsbR88loDxeE0NIYjuaT7zNeAG4eTJVehsubVXv2KHTG5ICreuCoeAWvpBPerBU04%2FK4%2B3hAXhfzChdGercsSRI0dSPS86rrpmNlYbBepVeOcFh0CeHlDAvazj7RJFldno67UyTjmxz4SOE1It3PFrk019zCbopCHSlGLzV7O4wQaJyaLXcXPMOC7HUz4ke6RzabvJ7ewYVDKpbO53p9rrEm6A8RcDOg1MBWhYdtw7s1ZBsV8vFAxtM3w9IPT97ByoPJFoIdWCV%2Fsxd5BQdzM83frV7TSdpYXYh3LqiMqb3MmHkA2CEFWlFfV1QM3wk2xZmSwnLbvrsIQZgH6T1iHf84xeay31qFnt05GQlTlXXbDDYp4E02fxoIMlH2yySyGipn9VhyGMhUzMI6bVJ4Nl5yMV5V5UlVDJXU9YsAOT%2B2wAnHZbGR%2BTHrx2%2Br59vLZoCCAW2ikxBzIxW63tG8keb29E1x5jAokbNXFXkRGRpwWBZJMsDcxhm%2Bjh9KUAJXWHFwbYZie0cyfcj0Qk2JGTO6Qq19Kb16n3lqyDZscGWXj9oJYEP0mTVgwJhhrzZ4wRrAmoRj2Ni5KpQwbcnvQAmDTPcKB5utRFLFovvV3jFHssNepHNmzPU0bvR7XN5s28SCdiS1hyQWMtGBxz97WE5UNUpsfGXddNFldMmUSJdRjmCeJAx%2BrW2a4Dvm6U7b3qYOooQZG%2BsKAwO9WerBFMUI7dTFp0cUtUsbWOyaJidA6XBXA8KzkgqnSMDMHh8ZOsuoPJciT5UkvQGscTLGzhKqtlYyEYeMFih3ImA7mdE80icveOIP7X6ts41MC%2BzCRfqvJKTIRgZnWpZOEaPcHbl46Y5fvJiqH7sD7aghO1BjP1hLeRhrit%2FOmQd7mp0X3H1GZDknZnCrnqqqyI1ncSVXuyjOkEPpllZrLSxVcQsRzqSNwmqhVJcHyCRqUMG8CKOx1RpEK2t43kQOQFT6cc1KaN7fLZmZLUuqrS7mA%2BesPgcRQ5HzPqIHfgTkbsaPOXHghEvWuOkhhtkwbW3vY1UMQsaWFCRq0wS2DMvBKahYjwa%2BXi02%2Fbk3AVOmRRJxvPJq6tsDmxIp42oZBMITYf%2BeqlV%2Fnw77eWVYaUyucJU2uSL%2BxnnzKfXFqZJi9bDLr8OGP9qER6ez7a5W1tmshhtHUMEuyzrtenIZRcWWnplium4MznORSwNXGtZo8srA%2B6Su5aQeYm%2BVXsXi8bFBajbQw5iM0nljmXTLCWZtAtN3NeKa2PFa1jpaiCzRSKQwyk0xFHoz%2B0sF61AuZ2trT7Y1gsdzWO%2FuJuadkYxS9bNl5%2FC%2FcxguVqTrdEiAZfOY%2BMB2MIqmSjwAhp74NiQe93HKYoWHwuy8LNnEY7FGoVJB5sdyfDY%2FCEPkIggkCXDu0Y9iBcRze0z7%2F0Ohoo8LjuanSoq%2BUA6%2BAhrDHwHyGzmVhyRHy%2FoXuo7pAkTXKCr%2FwRraCzPpxE0fP2RjdCMb%2BIQfeZsgnpWSx00YjlWM8iBhs%2Fh9oDS5QxidAmYnTBNF4IJ1ZhPYL0fL8P1HUHfD4iPru5D2TndEdPF70FASoXAeuFJ3TvwjqrkMA8K2VnkvNmNb%2BggnaXO%2FXmutasEpHhy%2BEf5Cp23sBeyiZioZd3c53ItRlOXu89FZay06r6OsEQ%2BsnrelwugjAw6VJo4JwA%2FPC0tbsSiHHHSnySTsigwvvvMfZR62eBlr2nthjTNyMu0ONVoGrZ%2BKKJLQ7rIHqjdPAH%2BObVtQ7KGcPdlEKE1l0Y%2B20JanrHQusKQPB9ISXDuRbBPE3R%2F5MmxwaJSEV8OtlDc9HwK%2FjJHuHAYOX33Anyvn2yQxbPlyUvSkD1PzE4Od7DHPleMgl28aLbq606LU7WaOO0cVipYxCi%2Bi9f6co8nk0%2BA8gjSi4Ek6xpgvM%2F1CuFfuGFLetzTMePLJs4t96VzP1R%2FeZjWehA38R2QblX6yF9IEgd82STWJAbzE6NrAz3E27rNuQ53%2B%2B0Iq%2BvgGoWTdH34qCx54qLc2LVSYOJTK%2FWtD%2BUUb0PdsLUehIHqUojMheENjUH5nCTPIEHGrC0iUJEh3e5CVzIt3kXLVXH9Sa2DKrgoedGup0R8tLMjXzfBl40yk3btdv8yyXneXXFMAEp8OF%2BgqSPvNr%2FbXdb%2BGGaSELS92cURXwPK8eklzIFMToDDqri7thR6JFZbw04%2B6d4t9N2CRWn93Vr8TTSfKJ191n7zUsDcH6PwiGaADzF4%2FKAz53SaiKcK5KlXuXrmGJFnpI0qNfjN4oRi3g4GKP8IhXmIpzh8UUoU3XnEdTjAaDWzYejcMY2neAKeOvmfQ0%2Fwknkmo%2FVc6yreE8ZviVyIMQfOpycNuy7zMKDaA1GHVYicZwrbqArmdm5CBIahHHIzN%2FzPimybs5ZbJoeaBOKcfh6EEudcOyFsOoCd9KDUdDWa3u2K0HuszeIf01uckKaebLw%2B1RfNvIbnud9BiETp9uDIRyahEKa3FrOSUmair7FZFnaEN2FZg%2FBCMjNH3mqGwatHKz2XYOx1aYY88N2oank6m7p2N7jwIsYXxOfg5G3748ylJm7uw82iwyW%2BWq6pkDJoFm5Jp2DTuiKeeHjnYR0hK4f7bEvQZy6J7BHOmNLFJjgSpaRYYkdje1wnfIpGcOr3OzAJ9AWRUmm9kZfdocUCi4KBn5v4fng%2BWHzCQ1lUgk3gxBOjyBLaHS%2FCpN9GARUr3TYCeK8GhlHfG%2BXPku0ewl1PYzlOGQsr8%2ByJ%2BrPQ7WQi%2Bx1xgmTrzPJNwxLtjSoEnU4%2BjWrvmXWUKLufwIghdtRCctPXDtC1yRPSDh1K6Iky%2FU5CNzHWKiLal8lddy229ZK%2B2Q%2BmNrTpOfc%2BW3N2LlIRmb5x2ah2x7%2BLjsSqLRxmWIvqLG8TjIO8bqHsCZNTdQegy06u%2BcmiiOa%2F6TThUfVicVav1xO8%2B%2FYOe%2BfM96SnWqg2BmqDQH7c9Vjh7ZLOW%2Fjd4vUGeaMrnWnCZ4%2FMPkMCDRoTskxKwYdj2bDSH%2B7VKJDIOgaq1XgW8c6K0J8H2JCu5tBFKrjHfkrd1dt464grsQ6GSnfpAJ82y%2FAQvwUpMB77PN3vU8hcFXehwWmFAVhYieROPYLJTeLzkvHA7tpfSfTu7LiSHieU%2BxPSR4FIbcoY8bLcXNJwlxeuKHov2R6GZNtPr8tm6clVnVILJoiaUDVTS2ArsEl6cVTuBIxfWcHkid4kIvQpqhQ2Og95T6xF7GIYMtlGiY0kHCL4Ou5XcJkbFHZ1%2BRN2%2FTXGqH1vX69lQ4PA1xX9bgjEQTztke2un91xN9NvuUFtBc5BVrtr%2BI%2BUgbMVLctO79LnWeHw%2B5m4DFWvHZS5jy3Fp508ilF6jB3d4ASayLsA3l31x%2F641MiHI6CTajefBX7JWtPZBGmkPS4LtnkxOdZJUpYrQebpgDSu3WXk6%2FMy%2BQbN2DR2MlGDPRTdY%2BHcd1s9RCKSnc1pOWxkEnQE%2FSKDhxs2FeujBYHDKcDvJXGim2ZWIxQPb%2Bu%2B1t34UaGeKgiqLVWRx5a7eqTFQSRMFic6%2B%2FQGYC2koJXtkeE0SCQnStk5wg%2Fk%2Bc2oGZtntWJTvW6osExT3Hw%2FirkcphDzXmJ%2BFWw4ZkBovG4VN2w11oYOa2GUeZqRUDnEB6%2FS4vNk6jC73Ax18ESGM4xV4cFciE82wUMlEv2VmVCuTMOTEd8Rg54PKoBdcvFYjcRxrHlgHxZYzdd9A%2FOZk91CfCeIWmQrIjMA1b80TFqjBvYxQD0cYE9DJvIp5O4rGSj3gvMrQLDORKUAz%2F0uyxrFQM5lhRl47JQkCJoH9DjwLSiws%2B1PMeKiNIn2hRFKIoHZJRj3ZxZiEnlf7tXkqdBFl7SFTJDThOKCTRNQnFY%2FHowNkH4sqaBnjSo3F63mhcY7P5uW6d7W3Uz9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=FDzSMRR1XVn1du%2FNsXPdw58hpu%2BA7Ga85YK4kEW%2BWPm23ZqyNrqr6suJCI6wRHsovkGZe%2BBLtXU0%0ArIG94WFIyMDJBNqeawO%2F%2BABwCmACF0j32LI56itq4vssdYdipQrEvLDDmi89RF%2ByIBXAE0T04ho1%0ALA1j1Ey%2FurxulloMTOjz12KBGgzpCUNWZnbZvzM0BoUOGVYNgjeN0DFrZKapLJc%2FGTt3KpGPVyrb%0AI0MrrySMW1Di%2BQXlJ4UrfZhAAoHILxqrDh7TN21%2FUsrtke7iZLt1dv3%2Bfai%2BukC%2FWzNZcxtw3vQS%0Am3HTzVxDWjHbbFXQS2jCPT%2FMhmeOVI3NV75PlQ%3D%3D"))
1591
network    2018.06.05 17:03:16.622   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
1592
network    2018.06.05 17:03:16.739   TlsChecker::getFatalErrors(network/TlsChecker.cpp:205)                     : (ignored)  "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
1593
network    2018.06.05 17:03:16.739   TlsChecker::containsFatalError(network/TlsChecker.cpp:218)                 : Ignore SSL errors
1594
network    2018.06.05 17:03:16.739 I (:0)                                                                       : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-GCM-SHA384, bits=256, proto=TLSv1.2)
1595
network    2018.06.05 17:03:16.740 I (:0)                                                                       : Used session protocol: "TlsV1_2"
1596
network    2018.06.05 17:03:16.740 I (:0)                                                                       : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
1597
network    2018.06.05 17:03:16.740 I (:0)                                                                       : Used peer certificate: QSslCertificate("3", "e7:08:a6:d2:a3:00:be:42", "7d4jrw+Ie/197bX/lQTapw==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.connect.verwalt-berlin.de")), QDateTime(2016-07-20 04:59:12.000 UTC Qt::TimeSpec(UTC)), QDateTime(2019-07-25 23:59:59.000 UTC Qt::TimeSpec(UTC)))
1598
network    2018.06.05 17:03:16.740 I ...dress::onSslHandshakeDone(core/states/StateCheckRefreshAddress.cpp:162) : Handshake of tls connection done!
1599
default    2018.06.05 17:03:16.740   TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49)        : Check certificate key of type "Rsa" and key size 2048
1600
default    2018.06.05 17:03:16.740   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 2000
1601
default    2018.06.05 17:03:16.740   TlsChecker::checkCertificate(network/TlsChecker.cpp:29)                    : Check certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42"
1602
default    2018.06.05 17:03:16.740   TlsChecker::checkCertificate(network/TlsChecker.cpp:31)                    : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "774af1694f2280b09d0d640948b22a77ea638f1157f517923c255bd2aae56b94"
1603
default    2018.06.05 17:03:16.740   TlsChecker::checkCertificate(network/TlsChecker.cpp:32)                    : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
1604
default    2018.06.05 17:03:16.740   AuthContext::addCertificateData(core/context/AuthContext.h:143)            : Adding certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" for URL origin QUrl("https://eid-prod.connect.verwalt-berlin.de:443")
1605
default    2018.06.05 17:03:16.740   TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84)          : Check ephemeral key of type "Ec" and key size 384
1606
default    2018.06.05 17:03:16.741   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 224
1607
default    2018.06.05 17:03:16.837   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:212) : Status Code:  303  | redirect URL:  QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e")
1608
network    2018.06.05 17:03:16.837   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Location": "https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e"
1609
network    2018.06.05 17:03:16.837   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Cache-Control": "no-cache, no-store"
1610
network    2018.06.05 17:03:16.837   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Pragma": "no-cache"
1611
network    2018.06.05 17:03:16.837   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Content-Length": "0"
1612
network    2018.06.05 17:03:16.837   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Date": "Tue, 05 Jun 2018 15:03:16 GMT"
1613
network    2018.06.05 17:03:16.837   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Set-Cookie": "TS015f2d62=01d33437f99f830f21e1cdc71a11b77fe6b9aeedcd7b0848b7009167cacf04fac5c3cce811437943cfe8a82a6647be80f47766aece; Path=/"
1614
network    2018.06.05 17:03:16.837   UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46)                : SOP-Check( "https://eid-prod.connect.verwalt-berlin.de:443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= true
1615
default    2018.06.05 17:03:16.837   ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:285) : SOP-Check succeeded, abort process
1616
default    2018.06.05 17:03:16.837   ...s::fetchServerCertificate(core/states/StateCheckRefreshAddress.cpp:321) : Fetch TLS certificate for URL QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e")
1617
network    2018.06.05 17:03:16.839   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "eid-prod.connect.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e"))
1618
network    2018.06.05 17:03:16.839   ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"])
1619
network    2018.06.05 17:03:16.957   TlsChecker::getFatalErrors(network/TlsChecker.cpp:205)                     : (ignored)  "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig"
1620
network    2018.06.05 17:03:16.957   TlsChecker::containsFatalError(network/TlsChecker.cpp:218)                 : Ignore SSL errors
1621
network    2018.06.05 17:03:16.957 I (:0)                                                                       : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-GCM-SHA384, bits=256, proto=TLSv1.2)
1622
network    2018.06.05 17:03:16.958 I (:0)                                                                       : Used session protocol: "TlsV1_2"
1623
network    2018.06.05 17:03:16.958 I (:0)                                                                       : Used ephemeral server key: QSslKey(PublicKey, EC, 384)
1624
network    2018.06.05 17:03:16.958 I (:0)                                                                       : Used peer certificate: QSslCertificate("3", "e7:08:a6:d2:a3:00:be:42", "7d4jrw+Ie/197bX/lQTapw==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.connect.verwalt-berlin.de")), QDateTime(2016-07-20 04:59:12.000 UTC Qt::TimeSpec(UTC)), QDateTime(2019-07-25 23:59:59.000 UTC Qt::TimeSpec(UTC)))
1625
network    2018.06.05 17:03:16.958 I ...FetchingServerCertificate(core/states/StateCheckRefreshAddress.cpp:340) : Handshake of tls connection done!
1626
default    2018.06.05 17:03:16.958   TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49)        : Check certificate key of type "Rsa" and key size 2048
1627
default    2018.06.05 17:03:16.958   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 2000
1628
default    2018.06.05 17:03:16.958   TlsChecker::checkCertificate(network/TlsChecker.cpp:29)                    : Check certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42"
1629
default    2018.06.05 17:03:16.958   TlsChecker::checkCertificate(network/TlsChecker.cpp:31)                    : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "774af1694f2280b09d0d640948b22a77ea638f1157f517923c255bd2aae56b94"
1630
default    2018.06.05 17:03:16.958   TlsChecker::checkCertificate(network/TlsChecker.cpp:32)                    : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C")
1631
default    2018.06.05 17:03:16.958   AuthContext::addCertificateData(core/context/AuthContext.h:143)            : Adding certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" for URL origin QUrl("https://eid-prod.connect.verwalt-berlin.de:443")
1632
default    2018.06.05 17:03:16.958   TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84)          : Check ephemeral key of type "Ec" and key size 384
1633
default    2018.06.05 17:03:16.959   TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94)                    : Minimum requested key size 224
1634
default    2018.06.05 17:03:16.959   ...freshAddress::doneSuccess(core/states/StateCheckRefreshAddress.cpp:359) : Determined RefreshUrl:  QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e")
1635
statema... 2018.06.05 17:03:16.959   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateCheckRefreshAddress" with status: No_Error | "Es ist kein Fehler aufgetreten."
1636
statema... 2018.06.05 17:03:16.959   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateWriteHistory"
1637
statema... 2018.06.05 17:03:16.961   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateWriteHistory"
1638
statema... 2018.06.05 17:03:17.039   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateWriteHistory" with status: No_Error | "Es ist kein Fehler aufgetreten."
1639
statema... 2018.06.05 17:03:17.039   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "StateRedirectBrowser"
1640
statema... 2018.06.05 17:03:17.039   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "StateRedirectBrowser"
1641
activation 2018.06.05 17:03:17.039   ...sendRedirect(activation/webservice/WebserviceActivationContext.cpp:126) : Redirect URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e&ResultMajor=ok")
1642
activation 2018.06.05 17:03:17.039   ...sendRedirect(activation/webservice/WebserviceActivationContext.cpp:135) : Redirecting now to URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e&ResultMajor=ok")
1643
statema... 2018.06.05 17:03:17.039   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "StateRedirectBrowser" with status: No_Error | "Es ist kein Fehler aufgetreten."
1644
statema... 2018.06.05 17:03:17.039   AbstractState::onEntry(core/states/AbstractState.cpp:77)                   : Next state is "FinalState"
1645
card_dr... 2018.06.05 17:03:17.042   const(card/drivers/ReaderDetector.cpp:59)                                  : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102"
1646
statema... 2018.06.05 17:03:18.396   AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60)    : Running state "FinalState"
1647
statema... 2018.06.05 17:03:18.396   AbstractState::onExit(core/states/AbstractState.cpp:87)                    : Leaving state "FinalState" with status: No_Error | "Es ist kein Fehler aufgetreten."
1648
default    2018.06.05 17:03:18.417   AppController::onWorkflowFinished(core/controller/AppController.cpp:144)   : governikus::AuthController done
1649
support    2018.06.05 17:03:18.424 I AppController::onWorkflowFinished(core/controller/AppController.cpp:150)   : Finished workflow AUTH
1650
card_pcsc  2018.06.05 17:03:26.536   PcscReader::updateCard(card/pcsc/PcscReader.cpp:194)                       : old state: "(0x20022) CHANGED PRESENT" | new state: "(0x20422) CHANGED PRESENT UNPOWERED"
1651
default    2018.06.05 17:03:37.197   unknown(unknown:0)                                                         : onSelectionChange (QUrl("file:///C:/Users/Stefan/AusweisApp2.2018-06-05_15-01.log")) 1
1652
default    2018.06.05 17:03:39.401   unknown(unknown:0)                                                         : onSelectionChange (QUrl("file:///C:/Users/Stefan/Desktop/AusweisApp2.2018-06-05_15-01.log")) 1
1653
gui        2018.06.05 17:03:40.586   LogFilesDialog::saveLogFile(widget/LogFilesDialog.cpp:204)                 : File location: "C:/Users/Stefan/Desktop/AusweisApp2.2018-06-05_15-01.log"