init 2018.06.05 15:01:43.681 printInfo(main.cpp:101) : Logging to "C:/Users/Stefan/AppData/Local/Temp/AusweisApp2.Hp4444.log" init 2018.06.05 15:01:43.684 I printInfo(main.cpp:103) : ################################################## init 2018.06.05 15:01:43.684 I printInfo(main.cpp:104) : ### ApplicationName: "AusweisApp2" init 2018.06.05 15:01:43.684 I printInfo(main.cpp:105) : ### ApplicationVersion: "1.14.0" init 2018.06.05 15:01:43.684 I printInfo(main.cpp:106) : ### OrganizationName: "Governikus GmbH & Co. KG" init 2018.06.05 15:01:43.685 I printInfo(main.cpp:107) : ### OrganizationDomain: "governikus.com" init 2018.06.05 15:01:43.685 I printInfo(main.cpp:108) : ### Build: Dec 15 2017 / 09:13:24 init 2018.06.05 15:01:43.685 I printInfo(main.cpp:109) : ### System: "Windows 10 (10.0)" init 2018.06.05 15:01:43.685 I printInfo(main.cpp:110) : ### Kernel: "10.0.17134" init 2018.06.05 15:01:43.685 I printInfo(main.cpp:111) : ### Architecture: "x86_64" init 2018.06.05 15:01:43.688 I printInfo(main.cpp:116) : ### Devicename: "Bascha-Laptop" init 2018.06.05 15:01:43.688 I printInfo(main.cpp:118) : ### Qt Version: 5.9.3 init 2018.06.05 15:01:43.883 I printInfo(main.cpp:119) : ### OpenSSL Version: "OpenSSL 1.0.2n 7 Dec 2017" init 2018.06.05 15:01:43.883 I printInfo(main.cpp:120) : ################################################## init 2018.06.05 15:01:43.883 printInfo(main.cpp:130) : Library path: "C:/Program Files (x86)/AusweisApp2 1.14.0" language 2018.06.05 15:01:43.885 LanguageLoader::load(global/LanguageLoader.cpp:135) : Use path: "C:/Program Files (x86)/AusweisApp2 1.14.0/translations" language 2018.06.05 15:01:43.886 LanguageLoader::load(global/LanguageLoader.cpp:141) : UI language: "de-DE" language 2018.06.05 15:01:43.886 LanguageLoader::loadTranslationFiles(global/LanguageLoader.cpp:196) : Try to load translation: QLocale(German, Latin, Germany) language 2018.06.05 15:01:43.886 LanguageLoader::createTranslator(global/LanguageLoader.cpp:81) : Load translation: "ausweisapp2" | true language 2018.06.05 15:01:43.886 LanguageLoader::createTranslator(global/LanguageLoader.cpp:81) : Load translation: "qtbase" | true language 2018.06.05 15:01:43.887 LanguageLoader::load(global/LanguageLoader.cpp:141) : UI language: "en-US" default 2018.06.05 15:01:43.889 ResourceLoader::init(global/ResourceLoader.cpp:56) : Register resource: "C:/Program Files (x86)/AusweisApp2 1.14.0/AusweisApp2.rcc" | true network 2018.06.05 15:01:43.889 NetworkManager::setApplicationProxyFactory(network/NetworkManager.cpp:280) : proxy -> system default 2018.06.05 15:01:43.890 Env::storeSingleton(global/Env.cpp:35) : Add instance: governikus::NetworkManager gui 2018.06.05 15:01:43.890 UILoader::load(core/view/UILoader.cpp:67) : Try to load UI plugin: "UIPlugInWidgets" gui 2018.06.05 15:01:43.890 UILoader::load(core/view/UILoader.cpp:75) : Load plugin: QJsonObject({"IID":"governikus.UIPlugIn","MetaData":{"dependencies":[],"name":"UIPlugInWidgets"},"className":"UIPlugInWidgets","debug":false,"version":329987}) card 2018.06.05 15:01:43.890 ReaderManagerWorker::onThreadStarted(card/base/ReaderManagerWorker.cpp:48) : Thread started card 2018.06.05 15:01:43.890 ReaderManagerWorker::registerPlugIns(card/base/ReaderManagerWorker.cpp:57) : Try to register plugins card 2018.06.05 15:01:43.890 ReaderManagerWorker::registerPlugIns(card/base/ReaderManagerWorker.cpp:63) : Register and initialize plugin: QJsonObject({"IID":"governikus.ReaderManagerPlugIn","MetaData":{"dependencies":[],"name":"RemoteReaderManagerPlugIn"},"className":"RemoteReaderManagerPlugIn","debug":false,"version":329987}) card 2018.06.05 15:01:43.890 ReaderManagerWorker::registerPlugIns(card/base/ReaderManagerWorker.cpp:63) : Register and initialize plugin: QJsonObject({"IID":"governikus.ReaderManagerPlugIn","MetaData":{"dependencies":[],"name":"PcscReaderManagerPlugIn"},"className":"PcscReaderManagerPlugIn","debug":false,"version":329987}) card_pcsc 2018.06.05 15:01:43.893 PcscReaderManagerPlugIn::init(card/pcsc/PcscReaderManagerPlugIn.cpp:57) : SCardEstablishContext: "Scard_S_Success" gui 2018.06.05 15:01:43.996 AppQtGui::loadStyleSheet(widget/AppQtGui.cpp:352) : loading style sheet ":/stylesheets/windows.qss" default 2018.06.05 15:01:44.016 Env::storeSingleton(global/Env.cpp:35) : Add instance: governikus::FileProvider secures... 2018.06.05 15:01:44.029 I SecureStorage::load(secure_storage/SecureStorage.cpp:187) : SecureStorage successfully loaded default 2018.06.05 15:01:44.030 Env::storeSingleton(global/Env.cpp:35) : Add instance: governikus::ProviderConfiguration default 2018.06.05 15:01:44.031 ProviderWidget::fill(widget/ProviderWidget.cpp:56) : add provider for desktop widgets. card_dr... 2018.06.05 15:01:44.392 ReaderDetector::ReaderDetector(card/drivers/ReaderDetector.cpp:38) : initNativeEvents() = true default 2018.06.05 15:01:44.393 Env::storeSingleton(global/Env.cpp:51) : Add owned instance: governikus::ReaderDetector default 2018.06.05 15:01:44.393 Env::storeSingleton(global/Env.cpp:35) : Add instance: governikus::ReaderConfiguration card_dr... 2018.06.05 15:01:44.397 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102" card_pcsc 2018.06.05 15:01:44.397 PcscReaderFeature::PcscReaderFeature(card/pcsc/PcscReaderFeature.cpp:22) : features: null card_pcsc 2018.06.05 15:01:44.397 ...ty::PcscReaderPaceCapability(card/pcsc/PcscReaderPaceCapability.cpp:22) : capabilities: null card_pcsc 2018.06.05 15:01:44.397 PcscReader::PcscReader(card/pcsc/PcscReader.cpp:23) : "Alcor Micro USB Smart Card Reader 0" card_pcsc 2018.06.05 15:01:44.399 PcscReader::PcscReader(card/pcsc/PcscReader.cpp:27) : SCardEstablishContext: "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.399 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:251) : "SCardConnect(cd010001, Alcor Micro USB Smart Card Reader 0, 3, 0, 0, 0)" card_pcsc 2018.06.05 15:01:44.399 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:253) : SCardConnect for "Alcor Micro USB Smart Card Reader 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.401 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:273) : SCardControl for "Alcor Micro USB Smart Card Reader 0" : "UNKNOWN_STATE (00000001)" card_pcsc 2018.06.05 15:01:44.401 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:292) : FEATURES: "" card_pcsc 2018.06.05 15:01:44.401 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:294) : FEATURES: () card_pcsc 2018.06.05 15:01:44.401 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:337) : SCardDisconnect for "Alcor Micro USB Smart Card Reader 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.402 PcscReader::updateCard(card/pcsc/PcscReader.cpp:194) : old state: "(0x0) UNAWARE" | new state: "(0x50012) CHANGED EMPTY" card_pcsc 2018.06.05 15:01:44.402 ...ManagerPlugIn::updateReaders(card/pcsc/PcscReaderManagerPlugIn.cpp:183) : fireReaderAdded "Alcor Micro USB Smart Card Reader 0" card_dr... 2018.06.05 15:01:44.406 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102" card_pcsc 2018.06.05 15:01:44.406 PcscReaderFeature::PcscReaderFeature(card/pcsc/PcscReaderFeature.cpp:22) : features: null card_pcsc 2018.06.05 15:01:44.406 ...ty::PcscReaderPaceCapability(card/pcsc/PcscReaderPaceCapability.cpp:22) : capabilities: null card_pcsc 2018.06.05 15:01:44.406 PcscReader::PcscReader(card/pcsc/PcscReader.cpp:23) : "REINER SCT cyberJack RFID basis 0" card_pcsc 2018.06.05 15:01:44.407 PcscReader::PcscReader(card/pcsc/PcscReader.cpp:27) : SCardEstablishContext: "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.407 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:251) : "SCardConnect(cd010002, REINER SCT cyberJack RFID basis 0, 3, 0, 0, 0)" card_pcsc 2018.06.05 15:01:44.408 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:253) : SCardConnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.409 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:273) : SCardControl for "REINER SCT cyberJack RFID basis 0" : "UNKNOWN_STATE (00000032)" card_pcsc 2018.06.05 15:01:44.409 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:292) : FEATURES: "" card_pcsc 2018.06.05 15:01:44.409 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:294) : FEATURES: () card_pcsc 2018.06.05 15:01:44.412 ...er::readReaderFeaturesAndPACECapabilities(card/pcsc/PcscReader.cpp:337) : SCardDisconnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.412 PcscReader::updateCard(card/pcsc/PcscReader.cpp:194) : old state: "(0x0) UNAWARE" | new state: "(0x20022) CHANGED PRESENT" card_pcsc 2018.06.05 15:01:44.413 PcscCard::PcscCard(card/pcsc/PcscCard.cpp:59) : SCardEstablishContext for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.415 PcscCard::connect(card/pcsc/PcscCard.cpp:111) : SCardConnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" | cardHandle: 3926065152 | protocol: "SCARD_PROTOCOL_T1" card_pcsc 2018.06.05 15:01:44.416 PcscCard::connect(card/pcsc/PcscCard.cpp:118) : SCardBeginTransaction for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.416 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4000c023f00" card_pcsc 2018.06.05 15:01:44.448 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.448 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000" card_pcsc 2018.06.05 15:01:44.448 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4020c022f00" card_pcsc 2018.06.05 15:01:44.456 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.456 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000" card_pcsc 2018.06.05 15:01:44.456 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00b000005a" card_pcsc 2018.06.05 15:01:44.467 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.468 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "61324f0fe828bd080fa000000167455349474e500f434941207a752044462e655369676e5100730c4f0aa000000167455349474e61094f07a0000002471001610b4f09e80704007f00070302610c4f0aa000000167455349474e9000" card_pcsc 2018.06.05 15:01:44.468 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4020c02011c" card_pcsc 2018.06.05 15:01:44.477 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.477 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000" card_pcsc 2018.06.05 15:01:44.477 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00b00000ff" card_pcsc 2018.06.05 15:01:44.495 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.495 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "3181c1300d060804007f00070202020201023012060a04007f000702020302020201020201483012060a04007f0007020204020202010202010d301c060904007f000702020302300c060704007f0007010202010d020148302a060804007f0007020206161e687474703a2f2f6273692e62756e642e64652f6369662f6e70612e786d6c303e060804007f000702020831323012060a04007f00070202030202020102020149301c060904007f000702020302300c060704007f0007010202010d02014900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000" card_pcsc 2018.06.05 15:01:44.495 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00b000ffff" card_pcsc 2018.06.05 15:01:44.513 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.513 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000" card_pcsc 2018.06.05 15:01:44.513 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00b001feff" card_pcsc 2018.06.05 15:01:44.531 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.531 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000" card_pcsc 2018.06.05 15:01:44.531 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00b002fdff" card_pcsc 2018.06.05 15:01:44.549 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.549 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000" card_pcsc 2018.06.05 15:01:44.549 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00b003fcff" card_pcsc 2018.06.05 15:01:44.557 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.557 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "000000006282" card 2018.06.05 15:01:44.557 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.2" card 2018.06.05 15:01:44.557 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:67) : Parsed ChipAuthenticationInfo card 2018.06.05 15:01:44.557 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:61) : Parsed PACEInfo card 2018.06.05 15:01:44.557 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.3.2" card 2018.06.05 15:01:44.557 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.6" card 2018.06.05 15:01:44.557 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.8" card_pcsc 2018.06.05 15:01:44.557 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4020c02011c" card_pcsc 2018.06.05 15:01:44.565 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.565 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000" card_pcsc 2018.06.05 15:01:44.565 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0022c1a412800a04007f0007020204020283010384010d" card_pcsc 2018.06.05 15:01:44.593 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.593 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000" card 2018.06.05 15:01:44.593 Reader::getRetryCounter(card/base/Reader.cpp:151) : StatusCode: SUCCESS support 2018.06.05 15:01:44.593 I Reader::updateRetryCounter(card/base/Reader.cpp:103) : retrieved retry counter: 3 , was: -1 , PIN deactivated: false card_pcsc 2018.06.05 15:01:44.593 PcscReader::updateCard(card/pcsc/PcscReader.cpp:212) : Card detected: {Type: EID_CARD, Retry counter: 3, Pin deactivated: false} support 2018.06.05 15:01:44.593 I Reader::fireUpdateSignal(card/base/Reader.cpp:167) : Card inserted: {Type: EID_CARD, Retry counter: 3, Pin deactivated: false} card_pcsc 2018.06.05 15:01:44.593 ...ManagerPlugIn::updateReaders(card/pcsc/PcscReaderManagerPlugIn.cpp:183) : fireReaderAdded "REINER SCT cyberJack RFID basis 0" card_pcsc 2018.06.05 15:01:44.593 PcscCard::disconnect(card/pcsc/PcscCard.cpp:143) : SCardEndTransaction for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:44.657 PcscCard::disconnect(card/pcsc/PcscCard.cpp:148) : SCardDisconnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" default 2018.06.05 15:01:44.997 Env::storeSingleton(global/Env.cpp:35) : Add instance: governikus::ReaderManager default 2018.06.05 15:01:44.997 Env::storeSingleton(global/Env.cpp:35) : Add instance: governikus::AppSettings card_dr... 2018.06.05 15:01:45.000 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102" default 2018.06.05 15:01:45.244 W unknown(unknown:0) : QMainWindowLayout::count: ? default 2018.06.05 15:01:45.262 Env::storeSingleton(global/Env.cpp:35) : Add instance: governikus::Service default 2018.06.05 15:01:45.262 AppController::onUiPlugin(core/controller/AppController.cpp:368) : Register UI: governikus::UIPlugInWidgets activation 2018.06.05 15:01:45.262 ActivationHandler::getInstances(activation/base/ActivationHandler.cpp:55) : Try to register plugin activation 2018.06.05 15:01:45.263 ActivationHandler::getInstances(activation/base/ActivationHandler.cpp:61) : Load plugin: QJsonObject({"IID":"governikus.ActivationHandler","MetaData":{"dependencies":[],"name":"WebserviceActivationHandler"},"className":"WebserviceActivationHandler","debug":false,"version":329987}) activation 2018.06.05 15:01:45.263 ActivationHandler::getInstances(activation/base/ActivationHandler.cpp:61) : Load plugin: QJsonObject({"IID":"governikus.ActivationHandler","MetaData":{"dependencies":[],"name":"InternalActivationHandler"},"className":"InternalActivationHandler","debug":false,"version":329987}) network 2018.06.05 15:01:45.263 HttpServer::HttpServer(network/HttpServer.cpp:23) : Listening on port: 24727 default 2018.06.05 15:01:45.263 AppController::start(core/controller/AppController.cpp:135) : Successfully started activation handler: governikus::WebserviceActivationHandler(0x5c93230) default 2018.06.05 15:01:45.263 AppController::start(core/controller/AppController.cpp:135) : Successfully started activation handler: governikus::InternalActivationHandler(0x5c3deb0) card_dr... 2018.06.05 15:01:45.271 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102" card_dr... 2018.06.05 15:01:45.279 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102" filepro... 2018.06.05 15:01:46.791 UpdatableFile::update(file_provider/UpdatableFile.cpp:304) : Update Triggered for Name: "supported-readers.json" with URL: QUrl("https://appl.governikus-asp.de/ausweisapp2/updatable-files/supported-readers.json") default 2018.06.05 15:01:46.791 Env::storeSingleton(global/Env.cpp:35) : Add instance: governikus::Downloader filepro... 2018.06.05 15:01:46.792 Downloader::downloadIfNew(file_provider/Downloader.cpp:208) : Download: QUrl("https://appl.governikus-asp.de/ausweisapp2/updatable-files/supported-readers.json") network 2018.06.05 15:01:46.792 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "appl.governikus-asp.de", localPort: -1, url: QUrl("https://appl.governikus-asp.de/ausweisapp2/updatable-files/supported-readers.json")) network 2018.06.05 15:01:46.799 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) filepro... 2018.06.05 15:01:46.800 UpdatableFile::update(file_provider/UpdatableFile.cpp:304) : Update Triggered for Name: "supported-providers.json" with URL: QUrl("https://appl.governikus-asp.de/ausweisapp2/updatable-files/supported-providers.json") filepro... 2018.06.05 15:01:46.800 Downloader::downloadIfNew(file_provider/Downloader.cpp:208) : Download: QUrl("https://appl.governikus-asp.de/ausweisapp2/updatable-files/supported-providers.json") filepro... 2018.06.05 15:01:46.800 Downloader::startDownloadIfPending(file_provider/Downloader.cpp:44) : A download is already in progress... delaying. filepro... 2018.06.05 15:01:46.800 Downloader::download(file_provider/Downloader.cpp:198) : Download: QUrl("https://appl.governikus-asp.de/ausweisapp2/Appcast.json") filepro... 2018.06.05 15:01:46.800 Downloader::startDownloadIfPending(file_provider/Downloader.cpp:44) : A download is already in progress... delaying. network 2018.06.05 15:01:46.998 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig" network 2018.06.05 15:01:46.998 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors network 2018.06.05 15:01:46.998 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES128-GCM-SHA256, bits=128, proto=TLSv1.2) network 2018.06.05 15:01:46.998 I (:0) : Used session protocol: "TlsV1_2" network 2018.06.05 15:01:46.998 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 256) network 2018.06.05 15:01:46.998 I (:0) : Used peer certificate: QSslCertificate("3", "d5:b6:a4:dc:1f:d8:85:4a", "OPEtmOf3NCEwD34R8sNgNQ==", ("T-Systems International GmbH"), ("Governikus GmbH & Co. KG"), QMap((1, "appl.governikus-asp.de")), QDateTime(2017-12-01 10:47:32.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-12-06 23:59:59.000 UTC Qt::TimeSpec(UTC))) network 2018.06.05 15:01:46.998 I Downloader::onSslHandshakeDone(file_provider/Downloader.cpp:75) : Handshake of tls connection done! filepro... 2018.06.05 15:01:47.035 Downloader::onMetadataChanged(file_provider/Downloader.cpp:96) : Abort request for "supported-readers.json" with status 304 - NOT_MODIFIED filepro... 2018.06.05 15:01:47.036 Downloader::onNetworkReplyFinished(file_provider/Downloader.cpp:110) : Downloader::onNetworkReplyFinished() filepro... 2018.06.05 15:01:47.036 W Downloader::onNetworkReplyFinished(file_provider/Downloader.cpp:139) : Server did not provide a valid LastModifiedHeader network 2018.06.05 15:01:47.036 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "appl.governikus-asp.de", localPort: -1, url: QUrl("https://appl.governikus-asp.de/ausweisapp2/updatable-files/supported-providers.json")) network 2018.06.05 15:01:47.036 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) filepro... 2018.06.05 15:01:47.072 Downloader::onMetadataChanged(file_provider/Downloader.cpp:96) : Abort request for "supported-providers.json" with status 304 - NOT_MODIFIED filepro... 2018.06.05 15:01:47.072 Downloader::onNetworkReplyFinished(file_provider/Downloader.cpp:110) : Downloader::onNetworkReplyFinished() filepro... 2018.06.05 15:01:47.072 W Downloader::onNetworkReplyFinished(file_provider/Downloader.cpp:139) : Server did not provide a valid LastModifiedHeader network 2018.06.05 15:01:47.072 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "appl.governikus-asp.de", localPort: -1, url: QUrl("https://appl.governikus-asp.de/ausweisapp2/Appcast.json")) network 2018.06.05 15:01:47.072 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) filepro... 2018.06.05 15:01:47.107 Downloader::onMetadataChanged(file_provider/Downloader.cpp:100) : Continue request for "Appcast.json" with status 200 - OK filepro... 2018.06.05 15:01:47.107 Downloader::onNetworkReplyFinished(file_provider/Downloader.cpp:110) : Downloader::onNetworkReplyFinished() appupdate 2018.06.05 15:01:47.108 AppUpdateData::checkPlatformObject(services/AppUpdateData.cpp:208) : Unused platform: "mac" appupdate 2018.06.05 15:01:47.108 AppUpdateData::checkPlatformObject(services/AppUpdateData.cpp:212) : Found platform: "win" appupdate 2018.06.05 15:01:47.108 I AppUpdater::onUpdateDownloadFinished(services/AppUpdater.cpp:83) : Found new version: "1.14.1" , greater than old version "1.14.0" filepro... 2018.06.05 15:01:47.108 Downloader::download(file_provider/Downloader.cpp:198) : Download: QUrl("https://appl.governikus-asp.de/ausweisapp2/ReleaseNotes.html#1.14.1") filepro... 2018.06.05 15:01:47.108 Downloader::startDownloadIfPending(file_provider/Downloader.cpp:44) : A download is already in progress... delaying. network 2018.06.05 15:01:47.108 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "appl.governikus-asp.de", localPort: -1, url: QUrl("https://appl.governikus-asp.de/ausweisapp2/ReleaseNotes.html#1.14.1")) network 2018.06.05 15:01:47.108 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) filepro... 2018.06.05 15:01:47.146 Downloader::onMetadataChanged(file_provider/Downloader.cpp:100) : Continue request for "ReleaseNotes.html" with status 200 - OK filepro... 2018.06.05 15:01:47.146 Downloader::onNetworkReplyFinished(file_provider/Downloader.cpp:110) : Downloader::onNetworkReplyFinished() appupdate 2018.06.05 15:01:47.146 AppUpdater::onUpdateDownloadFinished(services/AppUpdater.cpp:102) : Release notes downloaded successfully filepro... 2018.06.05 15:01:47.203 Downloader::startDownloadIfPending(file_provider/Downloader.cpp:51) : No pending requests to be started. network 2018.06.05 15:01:53.704 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Host": "127.0.0.1:24727" network 2018.06.05 15:01:53.704 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" network 2018.06.05 15:01:53.704 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" network 2018.06.05 15:01:53.704 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Accept-Language": "de,en-US;q=0.7,en;q=0.3" network 2018.06.05 15:01:53.704 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Accept-Encoding": "gzip, deflate" network 2018.06.05 15:01:53.704 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Connection": "keep-alive" network 2018.06.05 15:01:53.704 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Upgrade-Insecure-Requests": "1" network 2018.06.05 15:01:53.705 HttpRequest::onHeadersComplete(network/HttpRequest.cpp:153) : "GET" | QUrl("/eID-Client?tcTokenURL=https%3A%2F%2Feid-prod.connect.verwalt-berlin.de%2FBuergerKontoWeb%2FSAMLRequestServlet%3FsessionId%3D07b1c398-cc77-4b92-902a-eddfb96eb62f") network 2018.06.05 15:01:53.705 HttpRequest::onHeadersComplete(network/HttpRequest.cpp:154) : Header completed network 2018.06.05 15:01:53.705 HttpRequest::onMessageComplete(network/HttpRequest.cpp:144) : Message completed activation 2018.06.05 15:01:53.705 ...onNewRequest(activation/webservice/WebserviceActivationHandler.cpp:101) : Request type: authentication default 2018.06.05 15:01:53.705 ...troller::onAuthenticationRequest(core/controller/AppController.cpp:258) : authentication requested card 2018.06.05 15:01:53.705 W ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:42) : No valid chains could be built card 2018.06.05 15:01:53.705 W ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:42) : No valid chains could be built support 2018.06.05 15:01:53.705 I EnumAction::Action](core/controller/AppController.cpp:399) : Starting new workflow AUTH default 2018.06.05 15:01:53.706 EnumAction::Action](core/controller/AppController.cpp:405) : Start governikus::AuthController statema... 2018.06.05 15:01:53.787 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateProcessing" statema... 2018.06.05 15:01:53.787 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateProcessing" statema... 2018.06.05 15:01:53.787 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateProcessing" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:53.787 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateParseTcTokenUrl" statema... 2018.06.05 15:01:53.787 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateParseTcTokenUrl" statema... 2018.06.05 15:01:53.787 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateParseTcTokenUrl" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:53.787 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateGetTcToken" statema... 2018.06.05 15:01:53.787 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateGetTcToken" default 2018.06.05 15:01:53.787 StateGetTcToken::run(core/states/StateGetTcToken.cpp:42) : Got TC Token URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLRequestServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f") network 2018.06.05 15:01:53.788 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "eid-prod.connect.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLRequestServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f")) network 2018.06.05 15:01:53.788 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 15:01:53.938 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig" network 2018.06.05 15:01:53.938 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors network 2018.06.05 15:01:53.938 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-GCM-SHA384, bits=256, proto=TLSv1.2) network 2018.06.05 15:01:53.938 I (:0) : Used session protocol: "TlsV1_2" network 2018.06.05 15:01:53.938 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384) network 2018.06.05 15:01:53.938 I (:0) : Used peer certificate: QSslCertificate("3", "e7:08:a6:d2:a3:00:be:42", "7d4jrw+Ie/197bX/lQTapw==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.connect.verwalt-berlin.de")), QDateTime(2016-07-20 04:59:12.000 UTC Qt::TimeSpec(UTC)), QDateTime(2019-07-25 23:59:59.000 UTC Qt::TimeSpec(UTC))) network 2018.06.05 15:01:53.938 I StateGetTcToken::onSslHandshakeDone(core/states/StateGetTcToken.cpp:110) : Handshake of tls connection done! default 2018.06.05 15:01:53.938 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048 default 2018.06.05 15:01:53.938 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000 default 2018.06.05 15:01:53.938 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384 default 2018.06.05 15:01:53.939 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224 default 2018.06.05 15:01:53.939 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" for URL origin QUrl("https://eid-prod.connect.verwalt-berlin.de:443") default 2018.06.05 15:01:53.995 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:139) : Status Code: 303 | RedirectUrl: QUrl("https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?SAMLRequest=nZLbbtswDEB%2FxdC7bFl2fBHiBOncAcG6YUh6AfZiyDKdGnCoTJK97e%2BrdCmwYkUfqjdBpHjIw%2BX693EMZjB20FiROGQkAFS6G%2FBQkbvbz7Qg69XSyuPIT2IzuUfcwc8JrAt8Ilrx96Uik0GhpR2sQHkEK5wS%2B83XG8FDJk5GO630SIKNtWCcL%2FVJo52OYPZg5kHB3e6mIo%2FOnayIIhg66lO6UGlEUC70eL%2Fk6GgLZhww7CC6msAcwHzR6PQDtNG51A4UDDOcfxzBrS3Yc0%2FbrmJ5G6ukLKhSeU7TtuS0ZFxS6Lq%2BLTNoM96ToPY9DSjPcG%2Bg%2FIcgijRNooOeGzk5QBdJ%2BwcVCbZ1RZoWkp73fUJjJjlNC1XSNskVzXhc5ixhvGfgQ62dYIvWSXQV4SwuKMsoW9zGiWCxWCThYlH8IMF3o%2BehA%2FPND7Yi9TXzJy3yZg%2B4Raz3jRxHqKWn6GH0cc19f0WZVxmHcUmztPAICU9TEty%2FePZWyMWqeMYw%2F%2Bp836Z8cUhWH2dZRs%2BLcym%2Bulxfb9jqCQ%3D%3D&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=hr9RBbyvfdUFJyCJefbC%2FcCIE4A4fTl5RtDwuPutCmqlcBuOECnrTKCLZ%2F3zLpCt0kFtiHmjk6RHParFwC%2F36hvbYIuKcGcDasWknJIUANY8%2FlRLqadT6B2Q42TuElDsjkgrQom%2BGARlaPjJmabFKVYdNpxhWa1z3TlgU9iRxZPHX4XLAm0JSmDABdZpuZg0KUvXRr2MPlYESE3HCaHs2uf2rpIzt1svmNvfeb73im2FawiDzthAIvTM1QatjnsZ1tsdNHunm0jXY0dUY57jIjh0tetU%2BJG9Veqk%2FMCLIQDN4p8i3pprrpyaGZD3cdr22C2FXmcjVDNSN77cj2n0TA%3D%3D") network 2018.06.05 15:01:53.995 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Cache-Control": "no-cache, no-store" network 2018.06.05 15:01:53.995 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Pragma": "no-cache" network 2018.06.05 15:01:53.995 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Location": "https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?SAMLRequest=nZLbbtswDEB%2FxdC7bFl2fBHiBOncAcG6YUh6AfZiyDKdGnCoTJK97e%2BrdCmwYkUfqjdBpHjIw%2BX693EMZjB20FiROGQkAFS6G%2FBQkbvbz7Qg69XSyuPIT2IzuUfcwc8JrAt8Ilrx96Uik0GhpR2sQHkEK5wS%2B83XG8FDJk5GO630SIKNtWCcL%2FVJo52OYPZg5kHB3e6mIo%2FOnayIIhg66lO6UGlEUC70eL%2Fk6GgLZhww7CC6msAcwHzR6PQDtNG51A4UDDOcfxzBrS3Yc0%2FbrmJ5G6ukLKhSeU7TtuS0ZFxS6Lq%2BLTNoM96ToPY9DSjPcG%2Bg%2FIcgijRNooOeGzk5QBdJ%2BwcVCbZ1RZoWkp73fUJjJjlNC1XSNskVzXhc5ixhvGfgQ62dYIvWSXQV4SwuKMsoW9zGiWCxWCThYlH8IMF3o%2BehA%2FPND7Yi9TXzJy3yZg%2B4Raz3jRxHqKWn6GH0cc19f0WZVxmHcUmztPAICU9TEty%2FePZWyMWqeMYw%2F%2Bp836Z8cUhWH2dZRs%2BLcym%2Bulxfb9jqCQ%3D%3D&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=hr9RBbyvfdUFJyCJefbC%2FcCIE4A4fTl5RtDwuPutCmqlcBuOECnrTKCLZ%2F3zLpCt0kFtiHmjk6RHParFwC%2F36hvbYIuKcGcDasWknJIUANY8%2FlRLqadT6B2Q42TuElDsjkgrQom%2BGARlaPjJmabFKVYdNpxhWa1z3TlgU9iRxZPHX4XLAm0JSmDABdZpuZg0KUvXRr2MPlYESE3HCaHs2uf2rpIzt1svmNvfeb73im2FawiDzthAIvTM1QatjnsZ1tsdNHunm0jXY0dUY57jIjh0tetU%2BJG9Veqk%2FMCLIQDN4p8i3pprrpyaGZD3cdr22C2FXmcjVDNSN77cj2n0TA%3D%3D" network 2018.06.05 15:01:53.995 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Content-Type": "text/html" network 2018.06.05 15:01:53.995 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Content-Length": "0" network 2018.06.05 15:01:53.995 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Date": "Tue, 05 Jun 2018 13:01:53 GMT" network 2018.06.05 15:01:53.995 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Set-Cookie": "TS015f2d62=01d33437f96092ea00ce1bf9d1a67ceedbea601dcce261a9ef510cb657ac22bddf92e81c9ab4b7a5a7c393d2a6ab8a1b11950e9724; Path=/" network 2018.06.05 15:01:53.996 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8443, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?SAMLRequest=nZLbbtswDEB%2FxdC7bFl2fBHiBOncAcG6YUh6AfZiyDKdGnCoTJK97e%2BrdCmwYkUfqjdBpHjIw%2BX693EMZjB20FiROGQkAFS6G%2FBQkbvbz7Qg69XSyuPIT2IzuUfcwc8JrAt8Ilrx96Uik0GhpR2sQHkEK5wS%2B83XG8FDJk5GO630SIKNtWCcL%2FVJo52OYPZg5kHB3e6mIo%2FOnayIIhg66lO6UGlEUC70eL%2Fk6GgLZhww7CC6msAcwHzR6PQDtNG51A4UDDOcfxzBrS3Yc0%2FbrmJ5G6ukLKhSeU7TtuS0ZFxS6Lq%2BLTNoM96ToPY9DSjPcG%2Bg%2FIcgijRNooOeGzk5QBdJ%2BwcVCbZ1RZoWkp73fUJjJjlNC1XSNskVzXhc5ixhvGfgQ62dYIvWSXQV4SwuKMsoW9zGiWCxWCThYlH8IMF3o%2BehA%2FPND7Yi9TXzJy3yZg%2B4Raz3jRxHqKWn6GH0cc19f0WZVxmHcUmztPAICU9TEty%2FePZWyMWqeMYw%2F%2Bp836Z8cUhWH2dZRs%2BLcym%2Bulxfb9jqCQ%3D%3D&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=hr9RBbyvfdUFJyCJefbC%2FcCIE4A4fTl5RtDwuPutCmqlcBuOECnrTKCLZ%2F3zLpCt0kFtiHmjk6RHParFwC%2F36hvbYIuKcGcDasWknJIUANY8%2FlRLqadT6B2Q42TuElDsjkgrQom%2BGARlaPjJmabFKVYdNpxhWa1z3TlgU9iRxZPHX4XLAm0JSmDABdZpuZg0KUvXRr2MPlYESE3HCaHs2uf2rpIzt1svmNvfeb73im2FawiDzthAIvTM1QatjnsZ1tsdNHunm0jXY0dUY57jIjh0tetU%2BJG9Veqk%2FMCLIQDN4p8i3pprrpyaGZD3cdr22C2FXmcjVDNSN77cj2n0TA%3D%3D")) network 2018.06.05 15:01:53.996 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 15:01:54.245 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig" network 2018.06.05 15:01:54.245 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors network 2018.06.05 15:01:54.245 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-SHA384, bits=256, proto=TLSv1.2) network 2018.06.05 15:01:54.245 I (:0) : Used session protocol: "TlsV1_2" network 2018.06.05 15:01:54.245 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384) network 2018.06.05 15:01:54.246 I (:0) : Used peer certificate: QSslCertificate("3", "3c:3f:e6:1c:7c:28:28:d9", "Kfl3PTkdwoi1P7sQWG1dvQ==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.verwalt-berlin.de")), QDateTime(2017-10-16 13:01:51.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-10-21 23:59:59.000 UTC Qt::TimeSpec(UTC))) network 2018.06.05 15:01:54.246 I StateGetTcToken::onSslHandshakeDone(core/states/StateGetTcToken.cpp:110) : Handshake of tls connection done! default 2018.06.05 15:01:54.246 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048 default 2018.06.05 15:01:54.246 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000 default 2018.06.05 15:01:54.246 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384 default 2018.06.05 15:01:54.246 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224 default 2018.06.05 15:01:54.246 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" for URL origin QUrl("https://eid-prod.verwalt-berlin.de:8443") default 2018.06.05 15:01:54.637 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:139) : Status Code: 303 | RedirectUrl: QUrl("https://eid-prod.verwalt-berlin.de:8443/ecardpaos/startauthentication?RestrictedId=true&idProviderUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8443%2Fgov_autent%2Fasync&IssuingState=true&FamilyNames=true&ArtisticName=true&PlaceOfBirth=true&AcademicTitle=true&PlaceOfResidence=true&Signature=m48LCeBbrVZcAaS9%2BohPoh2ePZBB3ZwS1A%2Fy%2BU7DwIgBaGtpxx3UWCS8o12RAQUTzxDrg4NtL142%0APjvxJQCV1DTqMIR0VMLpRXmOZ8axVQUG2zf%2BQ7YxMOimpY%2BF3Y5rCZUH6A40YGWtvowZZIdlLQb3%0AwIvyLaOGLxDuUogacfElJ9FJPMxexvryMlWybWAhl5AO404drpSG36MRLvqzRMPy6a3jR%2BD2kqjm%0Av%2FgdLKSgFeyfd4TNOAE%2Bivi0h%2Fs6cplw5rUXbyEjMdMjGFdWJ8%2BCZmUSVgA8u0gDhrwEJdzGPN40%0AkhPvEQx8%2BJy5kezGYKx9zsuBB1oVl5iBqumU5Q%3D%3D&Nationality=true&DateOfBirth=true&GivenNames=true&requestID=cbd5ac4bf2b50fb720032320c0b7b59290646fa&receiverUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8445%2Fecardpaos%2Fpaosreceiver&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%2Frsa-sha256&DocumentType=true&ResidencePermitI=true") network 2018.06.05 15:01:54.637 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Server": "Apache-Coyote/1.1" network 2018.06.05 15:01:54.637 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Location": "https://eid-prod.verwalt-berlin.de:8443/ecardpaos/startauthentication?RestrictedId=true&idProviderUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8443%2Fgov_autent%2Fasync&IssuingState=true&FamilyNames=true&ArtisticName=true&PlaceOfBirth=true&AcademicTitle=true&PlaceOfResidence=true&Signature=m48LCeBbrVZcAaS9%2BohPoh2ePZBB3ZwS1A%2Fy%2BU7DwIgBaGtpxx3UWCS8o12RAQUTzxDrg4NtL142%0APjvxJQCV1DTqMIR0VMLpRXmOZ8axVQUG2zf%2BQ7YxMOimpY%2BF3Y5rCZUH6A40YGWtvowZZIdlLQb3%0AwIvyLaOGLxDuUogacfElJ9FJPMxexvryMlWybWAhl5AO404drpSG36MRLvqzRMPy6a3jR%2BD2kqjm%0Av%2FgdLKSgFeyfd4TNOAE%2Bivi0h%2Fs6cplw5rUXbyEjMdMjGFdWJ8%2BCZmUSVgA8u0gDhrwEJdzGPN40%0AkhPvEQx8%2BJy5kezGYKx9zsuBB1oVl5iBqumU5Q%3D%3D&Nationality=true&DateOfBirth=true&GivenNames=true&requestID=cbd5ac4bf2b50fb720032320c0b7b59290646fa&receiverUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8445%2Fecardpaos%2Fpaosreceiver&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%2Frsa-sha256&DocumentType=true&ResidencePermitI=true" network 2018.06.05 15:01:54.637 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Cache-Control": "no-cache, no-store" network 2018.06.05 15:01:54.637 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Pragma": "no-cache" network 2018.06.05 15:01:54.637 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Content-Length": "0" network 2018.06.05 15:01:54.637 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Date": "Tue, 05 Jun 2018 13:01:54 GMT" network 2018.06.05 15:01:54.637 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8443, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8443/ecardpaos/startauthentication?RestrictedId=true&idProviderUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8443%2Fgov_autent%2Fasync&IssuingState=true&FamilyNames=true&ArtisticName=true&PlaceOfBirth=true&AcademicTitle=true&PlaceOfResidence=true&Signature=m48LCeBbrVZcAaS9%2BohPoh2ePZBB3ZwS1A%2Fy%2BU7DwIgBaGtpxx3UWCS8o12RAQUTzxDrg4NtL142%0APjvxJQCV1DTqMIR0VMLpRXmOZ8axVQUG2zf%2BQ7YxMOimpY%2BF3Y5rCZUH6A40YGWtvowZZIdlLQb3%0AwIvyLaOGLxDuUogacfElJ9FJPMxexvryMlWybWAhl5AO404drpSG36MRLvqzRMPy6a3jR%2BD2kqjm%0Av%2FgdLKSgFeyfd4TNOAE%2Bivi0h%2Fs6cplw5rUXbyEjMdMjGFdWJ8%2BCZmUSVgA8u0gDhrwEJdzGPN40%0AkhPvEQx8%2BJy5kezGYKx9zsuBB1oVl5iBqumU5Q%3D%3D&Nationality=true&DateOfBirth=true&GivenNames=true&requestID=cbd5ac4bf2b50fb720032320c0b7b59290646fa&receiverUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8445%2Fecardpaos%2Fpaosreceiver&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%2Frsa-sha256&DocumentType=true&ResidencePermitI=true")) network 2018.06.05 15:01:54.638 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) default 2018.06.05 15:01:54.684 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:139) : Status Code: 200 | RedirectUrl: QUrl("") network 2018.06.05 15:01:54.684 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Server": "Apache-Coyote/1.1" network 2018.06.05 15:01:54.684 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Content-Length": "638" network 2018.06.05 15:01:54.685 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Date": "Tue, 05 Jun 2018 13:01:54 GMT" default 2018.06.05 15:01:54.685 TcToken::parse(core/TcToken.cpp:39) : Parsing TcToken: default 2018.06.05 15:01:54.685 TcToken::parse(core/TcToken.cpp:40) : "\nhttps://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver\ncbd5ac4bf2b50fb720032320c0b7b59290646fa\nhttps://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=cbd5ac4bf2b50fb720032320c0b7b59290646fa\nurn:liberty:paos:2006-08\nurn:ietf:rfc:4279\n\n621A9ED4FF15BCACF7A9834DC2F4875247FB52797CFC65B7D00E8ED0FA38339BF2DA9DC1D4982EAEA47117F2A87EEE26323F44366ED7B8629B49A83AE6D7923E\n\n\n" statema... 2018.06.05 15:01:54.687 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateGetTcToken" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:54.687 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateStartPaos" statema... 2018.06.05 15:01:54.687 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateStartPaos" statema... 2018.06.05 15:01:54.687 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateStartPaos" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:54.687 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendStartPaos" statema... 2018.06.05 15:01:54.687 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendStartPaos" network 2018.06.05 15:01:54.687 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data: "\n \n \n urn:liberty:paos:2006-08\n \n http://www.projectliberty.org/2006/01/role/paos\n \n http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand\n \n \n \n \n http://www.projectliberty.org/2006/02/role/paos\n \n urn:uuid:39240635-52aa-47bd-a017-440756bbd1e2\n \n \n \n cbd5ac4bf2b50fb720032320c0b7b59290646fa\n \n e80704007f00070302\n 00\n \n \n AusweisApp2\n 1\n 14\n 0\n \n \n 1\n 1\n 5\n \n \n \n\n" network 2018.06.05 15:01:54.689 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver")) network 2018.06.05 15:01:54.689 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 15:01:54.798 ...dKeyAuthenticationRequired(core/states/StateGenericSendReceive.cpp:141) : pre-shared key authentication requested: "Hint" network 2018.06.05 15:01:54.852 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig" network 2018.06.05 15:01:54.852 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors network 2018.06.05 15:01:54.852 I (:0) : Used session cipher QSslCipher(name=RSA-PSK-AES256-CBC-SHA, bits=256, proto=SSLv3) network 2018.06.05 15:01:54.852 I (:0) : Used session protocol: "TlsV1_2" network 2018.06.05 15:01:54.852 I (:0) : Used ephemeral server key: network 2018.06.05 15:01:54.853 I (:0) : Used peer certificate: QSslCertificate("3", "3c:3f:e6:1c:7c:28:28:d9", "Kfl3PTkdwoi1P7sQWG1dvQ==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.verwalt-berlin.de")), QDateTime(2017-10-16 13:01:51.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-10-21 23:59:59.000 UTC Qt::TimeSpec(UTC))) network 2018.06.05 15:01:54.853 I ...eceive::onSslHandshakeDone(core/states/StateGenericSendReceive.cpp:115) : Handshake of tls connection done! default 2018.06.05 15:01:54.853 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048 default 2018.06.05 15:01:54.853 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000 default 2018.06.05 15:01:54.853 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" for URL origin QUrl("https://eid-prod.verwalt-berlin.de:8445") network 2018.06.05 15:01:54.894 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server network 2018.06.05 15:01:54.895 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1" network 2018.06.05 15:01:54.895 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1" network 2018.06.05 15:01:54.895 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked" network 2018.06.05 15:01:54.895 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:01:54 GMT" network 2018.06.05 15:01:54.895 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data: "\n \n \n \n \n \n\n\n" network 2018.06.05 15:01:54.895 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: INITIALIZE_FRAMEWORK statema... 2018.06.05 15:01:54.896 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendStartPaos" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:54.896 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateInitializeFramework" statema... 2018.06.05 15:01:54.896 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateInitializeFramework" statema... 2018.06.05 15:01:54.896 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateInitializeFramework" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:54.896 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendInitializeFrameworkResponse" statema... 2018.06.05 15:01:54.896 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendInitializeFrameworkResponse" network 2018.06.05 15:01:54.896 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data: "\n \n \n urn:liberty:paos:2006-08\n \n http://www.projectliberty.org/2006/01/role/paos\n \n http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand\n \n \n \n \n http://www.projectliberty.org/2006/02/role/paos\n \n urn:uuid:9cd94743-9512-4f37-9093-4892a28f1fa6\n \n \n \n \n http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok\n \n \n 1\n 1\n 5\n \n \n \n\n" network 2018.06.05 15:01:54.896 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver")) network 2018.06.05 15:01:54.896 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 15:01:54.938 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server network 2018.06.05 15:01:54.939 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1" network 2018.06.05 15:01:54.939 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1" network 2018.06.05 15:01:54.939 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked" network 2018.06.05 15:01:54.939 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:01:54 GMT" network 2018.06.05 15:01:54.939 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data: "\n \n \n \n \n \n\nE80704007F00070302\n00\n\n\n\n\n" network 2018.06.05 15:01:54.939 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DID_LIST statema... 2018.06.05 15:01:54.939 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendInitializeFrameworkResponse" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:54.939 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateDidList" statema... 2018.06.05 15:01:54.939 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateDidList" statema... 2018.06.05 15:01:54.939 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateDidList" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:54.940 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendDIDListResponse" statema... 2018.06.05 15:01:54.940 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendDIDListResponse" network 2018.06.05 15:01:54.940 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data: "\n \n \n urn:liberty:paos:2006-08\n \n http://www.projectliberty.org/2006/01/role/paos\n \n http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand\n \n \n \n \n http://www.projectliberty.org/2006/02/role/paos\n \n urn:uuid:e2ba4c83-f16b-4132-a263-3b2e429d879d\n \n \n \n \n http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok\n \n \n PIN\n \n \n \n\n" network 2018.06.05 15:01:54.940 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver")) network 2018.06.05 15:01:54.940 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 15:01:55.020 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server network 2018.06.05 15:01:55.020 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1" network 2018.06.05 15:01:55.020 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1" network 2018.06.05 15:01:55.020 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked" network 2018.06.05 15:01:55.020 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:01:54 GMT" network 2018.06.05 15:01:55.020 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data: "\n \n \n \n \n \n\nE80704007F00070302\n00\n\nPIN\n\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n7F2181E77F4E81A05F290100420E44454356434165494430303130347F494F060A04007F00070202020203864104623D7CEBFF7918590B4D5C53D507DCF1EE3AE9E20A5E62AFEB8DBFC958F7EFFB4CCF7952FDA2B3F6254E9DC34FE5ECD1E084D4C23658319EC5BBE5A009D1E0EC5F2010444544566549444454523130313433337F4C12060904007F0007030102025305400513FF975F25060108000501075F24060108000801055F374054483CEF8791A094D40343B753FA83689C2B56256BB8428C56DDCDAB94709CAE8107DE8649DC37F7D130D75E36936CD85DAC818D1297C348BA408DA179A20CE4\n7F218201B67F4E82016E5F290100420E44454356434165494430303130337F4982011D060A04007F000702020202038120A9FB57DBA1EEA9BC3E660A909D838D726E3BF623D52620282013481D1F6E537782207D5A0975FC2C3057EEF67530417AFFE7FB8055C126DC5C6CE94A4B44F330B5D9832026DC5C6CE94A4B44F330B5D9BBD77CBF958416295CF7E1CE6BCCDC18FF8C07B68441048BD2AEB9CB7E57CB2C4B482FFC81B7AFB9DE27E1E3BD23C23A4453BD9ACE3262547EF835C3DAC4FD97F8461A14611DC9C27745132DED8E545C1D54C72F0469978520A9FB57DBA1EEA9BC3E660A909D838D718C397AA3B561A6F7901E0E82974856A7864104241D8627338B64F20077FFD558909A096C635DDB222852038EAAE642E869A40173D588F817D95DB2A6A0F077EA5EE63596A20F85BC3CB176D2F98D88D90219AA8701015F200E44454356434165494430303130347F4C12060904007F0007030102025305FC0F13FFFF5F25060105000901045F24060108000901045F3740313A81ED8734E7A8C45F16B55FB603E63027B7F44C2DE3A8E782552D35949DB221CA33BD41A01DA6A1288C7885714FC3A03FA45683B75D3884930EC6738AF8A0\n7F218201B67F4E82016E5F290100420E44454356434165494430303130327F4982011D060A04007F000702020202038120A9FB57DBA1EEA9BC3E660A909D838D726E3BF623D52620282013481D1F6E537782207D5A0975FC2C3057EEF67530417AFFE7FB8055C126DC5C6CE94A4B44F330B5D9832026DC5C6CE94A4B44F330B5D9BBD77CBF958416295CF7E1CE6BCCDC18FF8C07B68441048BD2AEB9CB7E57CB2C4B482FFC81B7AFB9DE27E1E3BD23C23A4453BD9ACE3262547EF835C3DAC4FD97F8461A14611DC9C27745132DED8E545C1D54C72F0469978520A9FB57DBA1EEA9BC3E660A909D838D718C397AA3B561A6F7901E0E82974856A78641048925419FC7F194922CFC6B8DD25AE6A19C1B59216E6CF06270E5D75CFD64205F55CF867BBFEFEEFD6E680E1FD197F18AB684484901362568EFC9ADB5C6018D728701015F200E44454356434165494430303130337F4C12060904007F0007030102025305FC0F13FFFF5F25060102010200035F24060105010200035F37404D6F08A86A4F18409F6685387DD3C6A7FF5D68EA4F7714A861BBB3BB721D05D3014ADF1763C9292F715D8E94EE9B3E1B73AB1382414EBF39DFB3B0FB6C09DBEB\n308202DA060A04007F00070301030101A10E0C0C442D547275737420476D6248A2181316687474703A2F2F7777772E642D74727573742E6E6574A3300C2E4C616E64204265726C696E2C20762E642E2053656E762E2046C3BC7220496E6E6572657320756E642053706F7274A42C132A68747470733A2F2F6569642D70726F642E636F6E6E6563742E76657277616C742D6265726C696E2E6465A58201F80C8201F44E616D652C20416E7363687269667420756E6420452D4D61696C2D4164726573736520646573204469656E737465616E626965746572733A0D0A4C616E64204265726C696E2C20762E642E2053656E762E2066C3BC7220496E6E6572657320756E642053706F72740D0A4B6C6F737465727374722E2034370D0A3130313739204265726C696E0D0A706F73747374656C6C654073656E696E6E73706F72742E6265726C696E2E64650D0A0D0A4765736368C3A46674737A7765636B3A0D0A0D0A48696E7765697320617566206469652066C3BC722064656E204469656E737465616E626965746572207A757374C3A46E646967656E205374656C6C656E2C20646965206469652045696E68616C74756E672064657220566F7273636872696674656E207A756D20446174656E73636875747A206B6F6E74726F6C6C696572656E3A0D0A4265726C696E65722042656175667472616774652066C3BC7220446174656E73636875747A20756E6420496E666F726D6174696F6E7366726569686569740D0A46726965647269636873747261C39F65203231390D0A3130393639204265726C696E0D0A3033302F3133382038392D300D0A6D61696C626F7840646174656E73636875747A2D6265726C696E2E64650D0A687474703A2F2F7777772E646174656E73636875747A2D6265726C696E2E6465A746314404200546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C0420774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94\n7F4C12060904007F0007030102025305000503FB04\n7F4C12060904007F00070301020253050000000000\n67177315060904007F00070301040253083230313830363035\n\n\n\n\n" paos 2018.06.05 15:01:55.020 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:36) : "ConnectionHandle" paos 2018.06.05 15:01:55.020 ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "CardApplication" paos 2018.06.05 15:01:55.020 ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "SlotHandle" paos 2018.06.05 15:01:55.020 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:36) : "DIDName" paos 2018.06.05 15:01:55.021 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:36) : "AuthenticationProtocolData" paos 2018.06.05 15:01:55.021 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate" paos 2018.06.05 15:01:55.021 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate" paos 2018.06.05 15:01:55.021 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate" paos 2018.06.05 15:01:55.021 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate" paos 2018.06.05 15:01:55.021 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "CertificateDescription" paos 2018.06.05 15:01:55.021 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "RequiredCHAT" paos 2018.06.05 15:01:55.021 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "OptionalCHAT" paos 2018.06.05 15:01:55.021 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "AuthenticatedAuxiliaryData" network 2018.06.05 15:01:55.021 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DID_AUTHENTICATE_EAC1 statema... 2018.06.05 15:01:55.021 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendDIDListResponse" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:55.022 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateExtractCvcsFromEac1InputType" statema... 2018.06.05 15:01:55.022 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateExtractCvcsFromEac1InputType" card 2018.06.05 15:01:55.022 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]) card 2018.06.05 15:01:55.022 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]) card 2018.06.05 15:01:55.022 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]) card 2018.06.05 15:01:55.022 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]) card 2018.06.05 15:01:55.022 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]) card 2018.06.05 15:01:55.022 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]) card 2018.06.05 15:01:55.022 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]) card 2018.06.05 15:01:55.023 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])) card 2018.06.05 15:01:55.023 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])) card 2018.06.05 15:01:55.023 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])) card 2018.06.05 15:01:55.023 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])) card 2018.06.05 15:01:55.023 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]) card 2018.06.05 15:01:55.023 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]) card 2018.06.05 15:01:55.023 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]) card 2018.06.05 15:01:55.023 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]) card 2018.06.05 15:01:55.024 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00001", chr="DETESTeID00001", valid=["2010-08-13","2013-08-13"]) card 2018.06.05 15:01:55.024 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00001", chr="DETESTeID00002", valid=["2010-09-21","2013-09-21"]) card 2018.06.05 15:01:55.024 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00002", chr="DETESTeID00004", valid=["2012-05-11","2015-05-11"]) card 2018.06.05 15:01:55.024 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00004", chr="DETESTeID00005", valid=["2015-05-04","2018-05-04"]) card 2018.06.05 15:01:55.024 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeIDCTL0401", chr="DECVCAeIDCTL0402", valid=["2016-03-01","2019-03-01"]) card 2018.06.05 15:01:55.024 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeIDCT00001", chr="DECVCAeIDCTL0401", valid=["2016-03-01","2019-03-01"]) card 2018.06.05 15:01:55.024 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeIDCT00001", chr="DECVCAeIDCT00001", valid=["2016-03-01","2019-03-01"]) card 2018.06.05 15:01:55.024 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])) statema... 2018.06.05 15:01:55.024 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateExtractCvcsFromEac1InputType" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:55.024 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StatePreVerification" statema... 2018.06.05 15:01:55.024 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StatePreVerification" default 2018.06.05 15:01:55.024 StatePreVerification::run(core/states/StatePreVerification.cpp:33) : Try to build a cvc chain for one of the known trust points card 2018.06.05 15:01:55.024 const(card/base/asn1/CVCertificateChainBuilder.cpp:109) : Get chain for root CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]) card 2018.06.05 15:01:55.024 const(card/base/asn1/CVCertificateChainBuilder.cpp:119) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])) default 2018.06.05 15:01:55.030 StatePreVerification::isValid(core/states/StatePreVerification.cpp:97) : Check certificate chain validity on "2018-06-05T15:01:53" default 2018.06.05 15:01:55.030 StatePreVerification::isValid(core/states/StatePreVerification.cpp:108) : CVC "DE000048700233" AT | valid from/to [ "2018-06-05" , "2018-06-06" ] default 2018.06.05 15:01:55.030 StatePreVerification::isValid(core/states/StatePreVerification.cpp:108) : CVC "DEDVeIDDTR101433" DV_no_f | valid from/to [ "2018-05-17" , "2018-08-15" ] default 2018.06.05 15:01:55.030 StatePreVerification::isValid(core/states/StatePreVerification.cpp:108) : CVC "DECVCAeID00104" CVCA | valid from/to [ "2015-09-14" , "2018-09-14" ] statema... 2018.06.05 15:01:55.038 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StatePreVerification" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:55.038 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateCertificateDescriptionCheck" statema... 2018.06.05 15:01:55.038 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateCertificateDescriptionCheck" network 2018.06.05 15:01:55.038 UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46) : SOP-Check( "https://eid-prod.connect.verwalt-berlin.de:443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= true statema... 2018.06.05 15:01:55.038 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateCertificateDescriptionCheck" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:55.038 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateCheckCertificates" statema... 2018.06.05 15:01:55.038 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateCheckCertificates" default 2018.06.05 15:01:55.038 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" default 2018.06.05 15:01:55.038 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "774af1694f2280b09d0d640948b22a77ea638f1157f517923c255bd2aae56b94" default 2018.06.05 15:01:55.038 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C") default 2018.06.05 15:01:55.039 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" default 2018.06.05 15:01:55.039 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "0546c2b01048cb77669003ab0743255f94582f010baa85308133f514e218ff3c" default 2018.06.05 15:01:55.039 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C") default 2018.06.05 15:01:55.039 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" default 2018.06.05 15:01:55.039 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "0546c2b01048cb77669003ab0743255f94582f010baa85308133f514e218ff3c" default 2018.06.05 15:01:55.039 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C") statema... 2018.06.05 15:01:55.039 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateCheckCertificates" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:55.039 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateEditAccessRights" card_pcsc 2018.06.05 15:01:55.113 PcscReader::updateCard(card/pcsc/PcscReader.cpp:194) : old state: "(0x20022) CHANGED PRESENT" | new state: "(0x20422) CHANGED PRESENT UNPOWERED" statema... 2018.06.05 15:01:56.256 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateEditAccessRights" statema... 2018.06.05 15:01:56.256 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateEditAccessRights" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:56.256 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSelectReader" statema... 2018.06.05 15:01:56.257 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSelectReader" statema... 2018.06.05 15:01:56.257 ...SelectReader::onReaderInfoChanged(core/states/StateSelectReader.cpp:71) : Select first found reader "REINER SCT cyberJack RFID basis 0" of type PCSC card 2018.06.05 15:01:56.257 ReaderManagerWorker::startScan(card/base/ReaderManagerWorker.cpp:114) : Start scan on plugin: governikus::PcscReaderManagerPlugIn card 2018.06.05 15:01:56.257 ReaderManagerWorker::startScan(card/base/ReaderManagerWorker.cpp:114) : Start scan on plugin: governikus::RemoteReaderManagerPlugIn statema... 2018.06.05 15:01:56.257 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSelectReader" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:56.257 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateConnectCard" statema... 2018.06.05 15:01:56.257 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateConnectCard" statema... 2018.06.05 15:01:56.257 StateConnectCard::run(core/states/StateConnectCard.cpp:24) : StateConnectCard::run() card_dr... 2018.06.05 15:01:56.260 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102" statema... 2018.06.05 15:01:56.260 StateConnectCard::onCardInserted(core/states/StateConnectCard.cpp:40) : Card has been inserted, trying to connect network 2018.06.05 15:01:56.261 ...ramHandlerImpl::DatagramHandlerImpl(network/DatagramHandlerImpl.cpp:57) : Bound on port: 24727 card_pcsc 2018.06.05 15:01:56.265 PcscCard::connect(card/pcsc/PcscCard.cpp:111) : SCardConnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" | cardHandle: 3926130688 | protocol: "SCARD_PROTOCOL_T1" card_pcsc 2018.06.05 15:01:56.265 PcscCard::connect(card/pcsc/PcscCard.cpp:118) : SCardBeginTransaction for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_dr... 2018.06.05 15:01:56.270 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102" statema... 2018.06.05 15:01:56.270 StateConnectCard::onCommandDone(core/states/StateConnectCard.cpp:49) : Card connection command completed statema... 2018.06.05 15:01:56.270 StateConnectCard::onCommandDone(core/states/StateConnectCard.cpp:57) : Card connection was successful statema... 2018.06.05 15:01:56.270 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateConnectCard" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:56.270 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateUpdateRetryCounter" statema... 2018.06.05 15:01:56.270 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateUpdateRetryCounter" default 2018.06.05 15:01:56.271 StateUpdateRetryCounter::run(core/states/StateUpdateRetryCounter.cpp:22) : StateUpdateRetryCounter::run() card_pcsc 2018.06.05 15:01:56.271 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4020c02011c" card_pcsc 2018.06.05 15:01:56.304 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:56.304 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000" card_pcsc 2018.06.05 15:01:56.304 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0022c1a412800a04007f0007020204020283010384010d" card_pcsc 2018.06.05 15:01:56.332 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:56.332 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000" card 2018.06.05 15:01:56.332 Reader::getRetryCounter(card/base/Reader.cpp:151) : StatusCode: SUCCESS support 2018.06.05 15:01:56.332 I Reader::updateRetryCounter(card/base/Reader.cpp:103) : retrieved retry counter: 3 , was: 3 , PIN deactivated: false card 2018.06.05 15:01:56.332 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK default 2018.06.05 15:01:56.332 ...r::onUpdateRetryCounterDone(core/states/StateUpdateRetryCounter.cpp:39) : StateUpdateRetryCounter::onUpdateRetryCounterDone() statema... 2018.06.05 15:01:56.332 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateUpdateRetryCounter" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:56.332 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateHandleRetryCounter" statema... 2018.06.05 15:01:56.332 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateHandleRetryCounter" default 2018.06.05 15:01:56.332 StateHandleRetryCounter::run(core/states/StateHandleRetryCounter.cpp:37) : PIN allowed statema... 2018.06.05 15:01:56.332 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateHandleRetryCounter" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:56.333 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateEstablishPacePin" card_pcsc 2018.06.05 15:01:56.614 PcscReader::updateCard(card/pcsc/PcscReader.cpp:194) : old state: "(0x20422) CHANGED PRESENT UNPOWERED" | new state: "(0x20122) CHANGED PRESENT INUSE" statema... 2018.06.05 15:01:58.632 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateEstablishPacePin" default 2018.06.05 15:01:58.632 AuthContext::encodeEffectiveChat(core/context/AuthContext.cpp:223) : Using effective chat: "7f4c12060904007f0007030102025305000503fb04" default 2018.06.05 15:01:58.632 StateEstablishPacePin::run(core/states/StateEstablishPacePin.cpp:38) : Establish connection using PIN support 2018.06.05 15:01:58.632 I ...ionWorker::establishPaceChannel(card/base/CardConnectionWorker.cpp:179) : Starting PACE for PACE_PIN card 2018.06.05 15:01:58.633 const(card/base/pace/PaceHandler.cpp:141) : Use ECDH with standardized domain parameters: "0.4.0.127.0.7.2.2.4.2.2" card 2018.06.05 15:01:58.633 ...urveFactory::createCurve(card/base/pace/ec/EllipticCurveFactory.cpp:41) : Create elliptic curve brainpoolP256r1 card_pcsc 2018.06.05 15:01:58.633 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4020c02011c" card_pcsc 2018.06.05 15:01:58.645 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:58.645 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000" card_pcsc 2018.06.05 15:01:58.645 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0022c1a427800a04007f0007020204020283010384010d7f4c12060904007f0007030102025305000503fb04" card_pcsc 2018.06.05 15:01:58.686 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:58.686 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000" card_pcsc 2018.06.05 15:01:58.686 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "10860000027c0000" card_pcsc 2018.06.05 15:01:58.741 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:58.741 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "7c1280101d17b027156768f8e11b3892ab4450029000" card_pcsc 2018.06.05 15:01:58.742 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "10860000457c438141045095ae46bbd75a3b04e3bc709fffcb741e16ee267f66964b60b9230904ba7e33565ebd948c3bbd3ec8d7726653e1e788f8a647c3211ae80cb671979c6b3e335900" card_pcsc 2018.06.05 15:01:58.969 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:58.970 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "7c438241048b12ac3afd13a24fa0999a072fe3d0b4a60124ee43fb59bd9078f76c8f7a1b991513d48037e8b76cec075f9e5a6253a2a525a0905315d8c928d3e080c59e79a09000" card_pcsc 2018.06.05 15:01:58.973 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "10860000457c43834104021c00743b6825a826fd1f217a66b3c83ecfaf74b5c653df50c1b196463d6ec71543dccbd8e139cd6022494f1ff1dfcf0c47af6e86f53857baf4724d9477429400" card_pcsc 2018.06.05 15:01:59.135 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:59.135 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "7c43844104903653e62ab456bfd17ed6ae240e5ad9251764d554d2bf460ea80030726f109d3d24668325d87d7962e9cf02b7d3c60238c71a069e03c0476845e9f1872f049e9000" card_pcsc 2018.06.05 15:01:59.137 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "008600000c7c0a85081132a9f20a1b4c1700" card_pcsc 2018.06.05 15:01:59.248 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:59.249 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "7c2a8608b288fa2e22642864870e4445435643416549443030313034880e44454356434165494430303130339000" default 2018.06.05 15:01:59.249 ...ynamicAuthenticationData(card/base/GeneralAuthenticateResponse.cpp:219) : mCarCurr "DECVCAeID00104" default 2018.06.05 15:01:59.249 ...ynamicAuthenticationData(card/base/GeneralAuthenticateResponse.cpp:220) : mCarPrev "DECVCAeID00103" card 2018.06.05 15:01:59.249 ...reement::performMutualAuthenticate(card/base/pace/KeyAgreement.cpp:170) : Successfully authenticated card 2018.06.05 15:01:59.249 PaceHandler::establishPaceChannel(card/base/pace/PaceHandler.cpp:93) : Pace channel established support 2018.06.05 15:01:59.249 I ...ionWorker::establishPaceChannel(card/base/CardConnectionWorker.cpp:206) : Finished PACE for PACE_PIN with result OK card 2018.06.05 15:01:59.249 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK statema... 2018.06.05 15:01:59.249 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateEstablishPacePin" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:59.249 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateDidAuthenticateEac1" statema... 2018.06.05 15:01:59.257 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateDidAuthenticateEac1" card_pcsc 2018.06.05 15:01:59.257 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c8400000d9701088e0843e7b18792e0fce900" card_pcsc 2018.06.05 15:01:59.292 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:59.292 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "871101168be941eacc35a6424b433ef3da4413990290008e080b8860512a726aa39000" card 2018.06.05 15:01:59.293 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK default 2018.06.05 15:01:59.293 AuthContext::encodeEffectiveChat(core/context/AuthContext.cpp:223) : Using effective chat: "7f4c12060904007f0007030102025305000503fb04" card 2018.06.05 15:01:59.293 const(card/base/asn1/CVCertificateChainBuilder.cpp:85) : Get chain for authority "DECVCAeID00104" card 2018.06.05 15:01:59.293 const(card/base/asn1/CVCertificateChainBuilder.cpp:96) : Found valid chain QVector(CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])) statema... 2018.06.05 15:01:59.293 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateDidAuthenticateEac1" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:59.293 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendDIDAuthenticateResponseEAC1" statema... 2018.06.05 15:01:59.293 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendDIDAuthenticateResponseEAC1" network 2018.06.05 15:01:59.294 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data: "\n \n \n urn:liberty:paos:2006-08\n \n http://www.projectliberty.org/2006/01/role/paos\n \n http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand\n \n \n \n \n http://www.projectliberty.org/2006/02/role/paos\n \n urn:uuid:dc3ea58a-be90-462c-bedb-2e3d52af0dd1\n \n \n \n \n http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok\n \n \n 7f4c12060904007f0007030102025305000503fb04\n 3181c1300d060804007f00070202020201023012060a04007f000702020302020201020201483012060a04007f0007020204020202010202010d301c060904007f000702020302300c060704007f0007010202010d020148302a060804007f0007020206161e687474703a2f2f6273692e62756e642e64652f6369662f6e70612e786d6c303e060804007f000702020831323012060a04007f00070202030202020102020149301c060904007f000702020302300c060704007f0007010202010d020149000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000\n 903653e62ab456bfd17ed6ae240e5ad9251764d554d2bf460ea80030726f109d\n b970753ad2e85e20\n \n \n \n\n" network 2018.06.05 15:01:59.295 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver")) network 2018.06.05 15:01:59.295 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 15:01:59.372 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server network 2018.06.05 15:01:59.372 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1" network 2018.06.05 15:01:59.372 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1" network 2018.06.05 15:01:59.372 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked" network 2018.06.05 15:01:59.372 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:01:58 GMT" network 2018.06.05 15:01:59.372 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data: "\n \n \n \n \n \n\nE80704007F00070302\n00\n\nPIN\n\n\n049E1AFEDB227F8456AA4ADE1083E61239F9B16361EE873A864DC305528A8019562618BB53D8068968B3097569F27D941C12C4B10639AF57926A690A988E8D9519\n5E9E3238FAC60B3BDA32CA1739BBAFAB301959FB6B9CDE4EBB5A1220C930EE2B1442C9DCF6EEFC84B86169DAB14380AA9219136C8940C056A91DD448E1FBC89B\n\n\n\n\n" paos 2018.06.05 15:01:59.373 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:37) : "ConnectionHandle" paos 2018.06.05 15:01:59.373 ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "CardApplication" paos 2018.06.05 15:01:59.373 ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "SlotHandle" paos 2018.06.05 15:01:59.373 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:37) : "DIDName" paos 2018.06.05 15:01:59.373 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:37) : "AuthenticationProtocolData" paos 2018.06.05 15:01:59.373 ...parseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:80) : "Certificates" paos 2018.06.05 15:01:59.373 W ...arseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:111) : Unknown element: "Certificates" paos 2018.06.05 15:01:59.373 ...parseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:80) : "EphemeralPublicKey" paos 2018.06.05 15:01:59.373 ...parseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:80) : "Signature" network 2018.06.05 15:01:59.373 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DID_AUTHENTICATE_EAC2 statema... 2018.06.05 15:01:59.373 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendDIDAuthenticateResponseEAC1" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:59.374 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateEACAdditionalInputType" statema... 2018.06.05 15:01:59.374 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateEACAdditionalInputType" statema... 2018.06.05 15:01:59.374 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateEACAdditionalInputType" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:59.374 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateProcessCertificatesFromEac2" statema... 2018.06.05 15:01:59.374 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateProcessCertificatesFromEac2" card 2018.06.05 15:01:59.374 const(card/base/asn1/CVCertificateChainBuilder.cpp:85) : Get chain for authority "DECVCAeID00104" card 2018.06.05 15:01:59.374 const(card/base/asn1/CVCertificateChainBuilder.cpp:96) : Found valid chain QVector(CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])) default 2018.06.05 15:01:59.374 ...catesFromEac2::run(core/states/StateProcessCertificatesFromEac2.cpp:26) : CVC chain already determined, skip further processing statema... 2018.06.05 15:01:59.374 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateProcessCertificatesFromEac2" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:01:59.374 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateDidAuthenticateEac2" statema... 2018.06.05 15:01:59.375 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateDidAuthenticateEac2" card 2018.06.05 15:01:59.376 const(card/base/asn1/CVCertificateChainBuilder.cpp:85) : Get chain for authority "DECVCAeID00104" card 2018.06.05 15:01:59.376 const(card/base/asn1/CVCertificateChainBuilder.cpp:96) : Found valid chain QVector(CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])) card 2018.06.05 15:01:59.376 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:125) : Performing TA MSE:Set DST card 2018.06.05 15:01:59.376 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:126) : Sending CAR "DECVCAeID00104" card_pcsc 2018.06.05 15:01:59.376 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2281b62d872101821d44460aed420846fe31cf903a4c830d5099a31ae4499a0676a14f9cb6d13b8e08059ab7dfc630883a00" card_pcsc 2018.06.05 15:01:59.402 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:59.403 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08d3dcdfd7219eeb6d9000" card 2018.06.05 15:01:59.403 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:144) : Performing TA PSO:Verify Certificate card 2018.06.05 15:01:59.403 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:145) : Sending certificate CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]) card_pcsc 2018.06.05 15:01:59.403 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "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" card_pcsc 2018.06.05 15:01:59.614 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:59.614 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e087b4a86db5c6f68359000" card 2018.06.05 15:01:59.614 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:125) : Performing TA MSE:Set DST card 2018.06.05 15:01:59.614 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:126) : Sending CAR "DEDVeIDDTR101433" card_pcsc 2018.06.05 15:01:59.614 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2281b62d872101bc2f4c476a6678b3bb8141adcc7efe16c95c8a52296c8ab0c0ca6ec6a473fa618e0831c46f4d39a6216100" card_pcsc 2018.06.05 15:01:59.648 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:59.648 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08a97b7d2f5aff3f369000" card 2018.06.05 15:01:59.648 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:144) : Performing TA PSO:Verify Certificate card 2018.06.05 15:01:59.648 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:145) : Sending certificate CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]) card_pcsc 2018.06.05 15:01:59.648 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "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" card_pcsc 2018.06.05 15:01:59.846 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:59.846 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08e69b0f536330ec439000" card 2018.06.05 15:01:59.846 ...nalAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:178) : Performing TA MSE:Set AT card_pcsc 2018.06.05 15:01:59.846 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2281a46d876101c4943fdfd59a3a35cbf0d6e84eaf4cc39c105c6f129cb433ee764d52fd1d5f025ccd884dfe9bc8db4b37771a6f32d10b87059c96b0ee7fd0f50a26a54256cb650d8262add3428e09ca0867e058550fa3e26b63ceaae224bc96dce48e910fb8108e08fa764cc0302b845600" card_pcsc 2018.06.05 15:01:59.902 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:01:59.902 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e088cfb7540acb8dc429000" card 2018.06.05 15:01:59.902 ...nalAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:194) : Performing TA External Authenticate card_pcsc 2018.06.05 15:01:59.902 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c8200005d875101bca5451d03fb4a0ba3205dcdac168f4aba779ec282c11270231cb8ed04a0e2cd519ecf512b511f0d3b7d2a0a4915cea05152b1f9305e646755ffe0ba9bc1b6d5173c31108b371b0a52b6c8f1a11891e68e081d3f35fd0aa1effb00" card_pcsc 2018.06.05 15:02:00.044 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:00.044 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0878796963fa87232f9000" card 2018.06.05 15:02:00.044 ...d::internalExecute(card/base/command/DidAuthenticateEAC2Command.cpp:82) : Performing Read EF.CardSecurity card_pcsc 2018.06.05 15:02:00.044 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d87110134054dfbb271b5652ac0902f10b4910b8e086fa14c533fd958db00" card_pcsc 2018.06.05 15:02:00.072 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:00.072 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0872edc7ff474681ae9000" card_pcsc 2018.06.05 15:02:00.072 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb000000d9701ff8e08ef09526d399ae4d400" card_pcsc 2018.06.05 15:02:00.101 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:00.101 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e101165491c5acaeb8494246be8e79cc143ed120b8f9e84ee8608fa21c717dd1effd37d9ae8e31fbd26f739133c0a433279469feded02d6a908c15472191f7c386e04ad444f33761dd0231c0b09a576ed03563aa9b4ecbf27c169b3a5998a98bfbda1b92a7eb93778fe43e8f27f7ca3ad3e17ef6548e3703a8812a6a8cac522dbe6704c9a0bffb49323afcbf25571e6170767752cd8126a029cd771c152d34c2dc6fafa4a2d35dd2a56a0bdbd8dd229a088958dcc55a2317978dc20d505510f65c06bf21c448dbb811de092661e9ad2f8df7b6926271f9190c084daf6aecde6ac208990290008e081511c2084cfb8f0f9000" card_pcsc 2018.06.05 15:02:00.101 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb000df0d9701ff8e081e6dcd8de57d895700" card_pcsc 2018.06.05 15:02:00.130 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:00.130 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e10110fb41abe5e63765358e8e9e5ea0d6f4c77cd3ace92e17f320a4a94c5715e47b279a3259fd49f311d91d3b0e7dd9be857b6199e9460530e0b035b80b2c6c737f89380defca7f7460977c908a18d6ef6e1bd3f65d6d629baf87200d2709e24c783266dc46e634d143e159a9d772723d1be2a52040c2fc67ff6578e9f11064c22735ab3bd05a5bb6d9e1fe9bd9a9a04398bf35d034dbe93850fce1895ec7b1a1bc87ebea98dc313fbd01f517fca72836788e0a4bd89ea3a22a1332c5fa51cfbc22b4d6c6a2877239827baf2136ba383be9511c759b573856a99b13365c8dea9d3d990290008e08acec4082437ff27f9000" card_pcsc 2018.06.05 15:02:00.130 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb001be0d9701ff8e08b0df66e289acbf7500" card_pcsc 2018.06.05 15:02:00.158 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:00.159 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e101e60d61931eeac56ed089d25ebb9f12affe96f57525920522c15cf5c31e3e987df5d414a53e69017171b7c9c3363111390109825a1b20540ea48c960e17363a4cab1ba5f2594c7d31073522ddbe851a4bcf95c008b4d84f48b43dc79e3a81a3e1efb6b2283c6616baa74eb57a95358e3e212d1140b78ba4cfa5aa77ed72df4857df92242be45da6659939d6e1dcf10762c3789c23569d8002ec4da2eea4db52d1599c23d3766044865908d6a26b0835fa3e2106e619d1c5f02b38be0dc4a919da988939f7a2d6303293cdffa8c1e325d43b6277ed2dfed97f3292268f97387c0a990290008e08fdf1bd01744c95a39000" card_pcsc 2018.06.05 15:02:00.159 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0029d0d9701ff8e08309cb52fef854fc100" card_pcsc 2018.06.05 15:02:00.187 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:00.187 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e10140e47f3b7bdf3b98e2aea9d94debaa1c9ea516668dd68d7ba44007a182c7f83aa47be2b1b92037db537f8ad3e561644b9722769daf7b53d98d018d4c37ced88221a364f2498bc7cfc59afc53b36b9611a2a5c35f9cef9db8236b1c054db52803c186029578463fbcf9eeae4d8d4c351b6470de8aaef7d25d0f95d3809294134f4bea402e01818e6d7f90f60647dcdfcfc2146272fdac3ffd047624feff6bfceee542289922c8670b7f7839d2f985bb3731dce3c4f7910b3ae991727351442bb3042b0e042a503de923c3deea094d1f7f12fb1dfd57c4d0c4a6189eb9bbd5e0a3990290008e08fa031495e4ec9b349000" card_pcsc 2018.06.05 15:02:00.188 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0037c0d9701ff8e08379e96732296be1100" card_pcsc 2018.06.05 15:02:00.216 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:00.217 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e101de51a6ddb0cd0d6e348d3eb57179fd9938fb7e376fad460b5f290fa1d2831c69ffe3185409b824dc37d5e211add634361a40d51177e48c64f0b856403657163a33880a83a06088f28d67c6f97ac04b89bdfc3cffcaf65ffddbd4bb9c2f657455cb8a8df88fa96ac8121d2680dce5548fd701aceb963744e9bf013280aec3e43f45a7eb5a77303d8959bac7297dfbbbac8f0a43d5691df2fe89f72d27af3a053e48c2d2d1c5bc20bd06994cfbdc3e50ae49834ce4f89724e56cf18d12a28cda8538177e3471aab03e3d0e025e9d828a654d41ab85d848da2cdf6735553c8372cd990290008e088330e1b4f628e1429000" card_pcsc 2018.06.05 15:02:00.217 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0045b0d9701ff8e086407fa9eba70b93f00" card_pcsc 2018.06.05 15:02:00.245 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:00.246 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e101adc90921449477dd1945548c0265c26b432a928299025a615c1eae53be1c9023759299ef76e02bed2338d06e34e78075d94bf2b3bc8c7c3ab87087d782c79321d081f337252333e65f932e21a3fa1b2ec1ed0ea0d9fdbb908226cc62c7e48036ad656c0171cb860ce217ede5f74d5eec2b8104b24f35f591715e587b24b632abb9a556edf1ebf8f9e4dca16d71bf3a4a2f2848f67cb4730101a2c6ccb37e9fa5b52184ae578306542bf2e940dfed2ea6a96096111fa2c523401acee84c18d0d91f5143da5226fc351693c8c8e2d2503759a46a37a62cb71c4ef259734c89619f990290008e080796f357aa9cb8cc9000" card_pcsc 2018.06.05 15:02:00.246 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0053a0d9701ff8e08dde51808a3670a1500" card_pcsc 2018.06.05 15:02:00.274 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:00.274 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e101d2e7172b0d435f2c7204e160009772db5e837181737bb5d2c9e95d47921c28e69ae4387cac592a624e64b6d4f04b01bf4fc1d988f0e64f66d505e64816a17dd05d30d8d1bc60de8ad9b730a03c1297d1d462a62e64ea9bf0d5bc6c188ddb9bec3743cbdc74c8c942189596a87e45130dc4a9b3990e691d23e125eddc42d4ce541e07ff4b7d442e3f80c65229287aceb79a26fc6bc23ad3430070ef33097704f6cefb9b8150c087117dc4cdbe7ef934483b157e96c705372cd5703abf18e3ec00377474b10141572da950960e54f676effdad6a8cd4489ccfc3ec73193468666d990290008e08cab6aa0cada662719000" card_pcsc 2018.06.05 15:02:00.275 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb006190d9701ff8e0871942f6ed7231e9000" card_pcsc 2018.06.05 15:02:00.300 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:00.301 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "87818101a271645a7a6d28d965a3f2a585f58b06e402f60d8c7cbce728016d0c97cc8fcf6828dcd99324ccd9a154ec850d1a08f9a1494831e1fd36e3b8ff0304eca67cec5d5ec27478613e2726a013264c915833ef26c6f19bc38c1ac28d4d8c922e6cdc0c0902e0e14fe76eb54bfd0effd9fb4fccd573c10736ee402a3df44b1788c225990262828e080474d697fd1dc4056282" card 2018.06.05 15:02:00.301 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.2" card 2018.06.05 15:02:00.301 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:67) : Parsed ChipAuthenticationInfo card 2018.06.05 15:02:00.301 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:61) : Parsed PACEInfo card 2018.06.05 15:02:00.301 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.5.2.3" card 2018.06.05 15:02:00.302 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.5.2.3" card 2018.06.05 15:02:00.302 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.5.2" card 2018.06.05 15:02:00.302 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.3.2" card 2018.06.05 15:02:00.302 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.6" card 2018.06.05 15:02:00.302 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.1.2" card 2018.06.05 15:02:00.302 ...::internalExecute(card/base/command/DidAuthenticateEAC2Command.cpp:106) : Chose ChipAuthenticationInfo(0): protocol "0.4.0.127.0.7.2.2.3.2.2" , keyId "48" card 2018.06.05 15:02:00.303 ...hipAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:221) : Performing CA MSE:Set AT card_pcsc 2018.06.05 15:02:00.303 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2241a41d871101a775e9c5405037634e666ec9329e57948e089a24ee99bb1e783c00" card_pcsc 2018.06.05 15:02:00.337 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:00.337 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0880c12d79ead8016a9000" card 2018.06.05 15:02:00.337 ...hipAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:237) : Performing CA General Authenticate card_pcsc 2018.06.05 15:02:00.337 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c8600006087510101672efbf421984de4f073339211bc7347be4845d2469697a33189bfc7671b2158130d199bb5fe1393d7379dabf9fe712fec93e8f8d0da138f586fac40a59bbecb823da11936b278a6db000cce6347539701008e08bd338166daafec1b00" card_pcsc 2018.06.05 15:02:00.471 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:00.471 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "87210131a71a3fd9fc92e16254f31369fea90f61f3a83ac83cff4c6b877bf6078fbd95990290008e0821b4e07ef7861a309000" card 2018.06.05 15:02:00.471 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK statema... 2018.06.05 15:02:00.472 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateDidAuthenticateEac2" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:02:00.472 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendDIDAuthenticateResponseEAC2" statema... 2018.06.05 15:02:00.472 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendDIDAuthenticateResponseEAC2" network 2018.06.05 15:02:00.473 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data: "\n \n \n urn:liberty:paos:2006-08\n \n http://www.projectliberty.org/2006/01/role/paos\n \n http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand\n \n \n \n \n http://www.projectliberty.org/2006/02/role/paos\n \n urn:uuid:af87b6f7-9684-4772-90ec-2c286bce75c4\n \n \n \n \n http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok\n \n \n 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\n 7b8e96d3560b48b2\n 3ce84d651c5b35cc\n \n \n \n\n" network 2018.06.05 15:02:00.473 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver")) network 2018.06.05 15:02:00.473 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 15:02:00.639 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server network 2018.06.05 15:02:00.640 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1" network 2018.06.05 15:02:00.640 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1" network 2018.06.05 15:02:00.640 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked" network 2018.06.05 15:02:00.640 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:02:00 GMT" network 2018.06.05 15:02:00.640 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data: "\n \n \n \n \n \n00\n\n0CA4040C1D8711018EDC7870E963ACDE19EA91F6B537B22B8E085A8F0B05CBA14A4100\n\n\n8C2080001D871101F08651936CD32CCD9FC06D9FEAA29E638E08305444AF21184F2500\n\n\n0C2241A41D871101C1F92B4D150913FCF75221195784FF758E08777E4438FE2F07C400\n9000\n\n\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n9000\n\n\n0C2241A41D871101974CA0410BCBBEB717BB73460B90963D8E088DC871EDD8196B8400\n9000\n\n\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n9000\n\n\n\n\n" paos 2018.06.05 15:02:00.640 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "SlotHandle" paos 2018.06.05 15:02:00.640 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:00.640 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:00.641 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:00.641 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:00.641 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:00.641 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:00.641 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode" paos 2018.06.05 15:02:00.641 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:00.641 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:00.641 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode" paos 2018.06.05 15:02:00.641 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:00.641 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:00.641 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode" paos 2018.06.05 15:02:00.641 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:00.641 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:00.641 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode" network 2018.06.05 15:02:00.641 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: TRANSMIT statema... 2018.06.05 15:02:00.642 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendDIDAuthenticateResponseEAC2" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:02:00.642 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateTransmit" statema... 2018.06.05 15:02:00.642 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateTransmit" card_pcsc 2018.06.05 15:02:00.643 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4040c1d8711018edc7870e963acde19ea91f6b537b22b8e085a8f0b05cba14a4100" card_pcsc 2018.06.05 15:02:00.668 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:00.668 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08cc6ee400ecd650029000" card_pcsc 2018.06.05 15:02:00.668 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "8c2080001d871101f08651936cd32ccd9fc06d9feaa29e638e08305444af21184f2500" card_pcsc 2018.06.05 15:02:00.693 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:00.693 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08d582c9464ed02c4e9000" card_pcsc 2018.06.05 15:02:00.693 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2241a41d871101c1f92b4d150913fcf75221195784ff758e08777e4438fe2f07c400" card_pcsc 2018.06.05 15:02:00.744 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:00.745 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0832e5258df69b0fa69000" card_pcsc 2018.06.05 15:02:00.745 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c8600000001428782013101eb9dc4b7a547ccbebdf48e4993efca48e00fbc00d37f18c1d81dedae2d37b1e596c7903d98e8f80b3092cd6389ae58eac5804bce5db01fd4fb74131e6b3a4df64ef981d9a3528b7ea0ac2d20531dff3ecd4d6024f43d4556927970755c876da5a5454efd546b4905c5cc77fddb01b6a28d1288cc644a9dd108b17a2428256ed139a6f4cf87766b866d20b7fb6cb257988aff4d7e454dac36ee474caf14005f1f9df4682b6f8d9225b72dc78e4893e2f2e649ae34b7b24011fb3a23b289ef6f1c7df8bae258f032e353d8ffe0a0ab9d744b2b49a116530e47d748a588a2da05090dc145d160190e5ba4ea697770910a44b372ff039fa7b6c9d940cdd46f8a6eaee5d245383c32a460a9be56a7838a64dba1579e4c0f10f2084b73b79a23566c72cdd4860135fd6947ac50146a9f478c2b9701248e085d3d0d3efa9201880000" card_pcsc 2018.06.05 15:02:00.888 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:00.888 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "873101c5fd58c62bbeae8a9e73280ea8755b902245bb62012bd81576ade95668c8e174d8687c3e849ce7a7f241d80fd3b62d49990290008e083ebf660fd38889799000" card_pcsc 2018.06.05 15:02:00.888 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2241a41d871101974ca0410bcbbeb717bb73460b90963d8e088dc871edd8196b8400" card_pcsc 2018.06.05 15:02:00.941 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:00.941 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08cefb066f2b6941b29000" card_pcsc 2018.06.05 15:02:00.941 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "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" card_pcsc 2018.06.05 15:02:01.085 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.085 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "873101e5973bcc6c94404ddc2fc272b707428288f2c648fe7a4c9f4a9f76773c8fd20f1b5795eb0df98441dbb03f49233a5a85990290008e082af7db87b8794de49000" card 2018.06.05 15:02:01.085 TransmitCommand::internalExecute(card/base/command/TransmitCommand.cpp:74) : transmit end card 2018.06.05 15:02:01.085 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK statema... 2018.06.05 15:02:01.085 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateTransmit" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:02:01.085 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendTransmitResponse" statema... 2018.06.05 15:02:01.085 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendTransmitResponse" network 2018.06.05 15:02:01.086 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data: "\n \n \n urn:liberty:paos:2006-08\n \n http://www.projectliberty.org/2006/01/role/paos\n \n http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand\n \n \n \n \n http://www.projectliberty.org/2006/02/role/paos\n \n urn:uuid:9aecd72b-7e4f-4bbe-92aa-a4ca3ead28af\n \n \n \n \n http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok\n \n 990290008e08cc6ee400ecd650029000\n 990290008e08d582c9464ed02c4e9000\n 990290008e0832e5258df69b0fa69000\n 873101c5fd58c62bbeae8a9e73280ea8755b902245bb62012bd81576ade95668c8e174d8687c3e849ce7a7f241d80fd3b62d49990290008e083ebf660fd38889799000\n 990290008e08cefb066f2b6941b29000\n 873101e5973bcc6c94404ddc2fc272b707428288f2c648fe7a4c9f4a9f76773c8fd20f1b5795eb0df98441dbb03f49233a5a85990290008e082af7db87b8794de49000\n \n \n\n" network 2018.06.05 15:02:01.086 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver")) network 2018.06.05 15:02:01.086 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 15:02:01.175 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server network 2018.06.05 15:02:01.175 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1" network 2018.06.05 15:02:01.175 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1" network 2018.06.05 15:02:01.175 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked" network 2018.06.05 15:02:01.175 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:02:00 GMT" network 2018.06.05 15:02:01.175 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data: "\n \n \n \n \n \n00\n\n0CA4020C1D871101CEA20EFDDB4183852841775F53D972B38E089BFA8F920540484100\n\n\n0CB0000000000E970200008E08EE714CBF7208A5F20000\n\n\n0CA4020C1D871101A7C333E97A9D7C7C8665E61A99E4A76A8E084B2A8ACCAA037CC800\n\n\n0CB0000000000E970200008E08705311EC633A41D80000\n\n\n0CA4020C1D871101B67186FDBA9B07A66BBAE9019931E61E8E08D35E694D6019F7C800\n\n\n0CB0000000000E970200008E082966825BDF92C49E0000\n\n\n0CA4020C1D8711013A076D986463BC211CFDDEB9E77675708E0847000562C8DE55AF00\n\n\n0CB0000000000E970200008E084C9FE7D09D14CF350000\n\n\n0CA4020C1D871101D3FD24962708F561705FA8DCD2C9FAC58E08F56B25EB93DE652600\n\n\n0CB0000000000E970200008E0850F74B32FE0BA5EE0000\n\n\n0CA4020C1D871101A4D5E1F5BFDE2D3A0E1E26B13C3BBAF08E087B14DA1B19D2A73C00\n\n\n0CB0000000000E970200008E0827B823C584AAFB0E0000\n\n\n0CA4020C1D87110164781FD5CAF72BC1C5343C4E64EF11A88E089EDA9EF500680A8A00\n\n\n0CB0000000000E970200008E08ADA0D07C243043A80000\n\n\n0CA4020C1D871101314E365996BBD9EC98E9E5C164C22C088E082FADF94E068550A800\n\n\n0CB0000000000E970200008E089900D78637D0FDFF0000\n\n\n0CA4020C1D8711014EC8D4F5A77B2AD20F46F45617ACB0C88E08E9D5D6C134C4432000\n\n\n0CB0000000000E970200008E085D8A034FD8B57F3F0000\n\n\n0CA4020C1D871101CD72782FFABE8BBC5420449C60D62B848E08EA41FB155EC2B14700\n\n\n0CB0000000000E970200008E08DFEFACBF137CA4F40000\n\n\n0CA4020C1D871101D5A12B7FAAFAA634B3F6D7F7E315ABBC8E08F7546E644B93DADF00\n\n\n0CB0000000000E970200008E08562160CEE15BE9BE0000\n\n\n\n\n" paos 2018.06.05 15:02:01.176 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "SlotHandle" paos 2018.06.05 15:02:01.176 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.176 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.176 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.176 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.176 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.176 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.176 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.176 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.176 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.176 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.176 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.176 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.177 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.177 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.177 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.177 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.177 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.177 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.177 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.177 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.177 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.177 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.177 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.177 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.177 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.177 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.177 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.177 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.178 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.178 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.178 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.178 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.178 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.178 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.178 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.178 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.178 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.178 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.178 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.178 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.178 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.178 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 15:02:01.178 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 15:02:01.178 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" network 2018.06.05 15:02:01.179 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: TRANSMIT statema... 2018.06.05 15:02:01.179 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendTransmitResponse" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:02:01.179 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateTransmit" statema... 2018.06.05 15:02:01.179 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateTransmit" card_pcsc 2018.06.05 15:02:01.179 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101cea20efddb4183852841775f53d972b38e089bfa8f920540484100" card_pcsc 2018.06.05 15:02:01.208 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.208 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08c65e297951cdcc7a9000" card_pcsc 2018.06.05 15:02:01.208 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08ee714cbf7208a5f20000" card_pcsc 2018.06.05 15:02:01.232 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.232 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8711016fe8e25d6eb6fcbe15d870ddbd1ee1b5990290008e0883d0f9c2a5b681e19000" card_pcsc 2018.06.05 15:02:01.233 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101a7c333e97a9d7c7c8665e61a99e4a76a8e084b2a8accaa037cc800" card_pcsc 2018.06.05 15:02:01.257 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.257 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e082278a2ad6b1020709000" card_pcsc 2018.06.05 15:02:01.258 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08705311ec633a41d80000" card_pcsc 2018.06.05 15:02:01.281 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.281 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8711013acf0837c4c8bf55a743c126e6f13828990290008e089c63c4642f98fc6a9000" card_pcsc 2018.06.05 15:02:01.282 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101b67186fdba9b07a66bbae9019931e61e8e08d35e694d6019f7c800" card_pcsc 2018.06.05 15:02:01.311 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.311 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e086123fc3f15b9e0759000" card_pcsc 2018.06.05 15:02:01.311 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e082966825bdf92c49e0000" card_pcsc 2018.06.05 15:02:01.335 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.336 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8721017c3ab20962756105b4d7c14e65b43f88bda6cbd85e0b2be3ae3157908e58e315990290008e085e585835bb14efed9000" card_pcsc 2018.06.05 15:02:01.336 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d8711013a076d986463bc211cfddeb9e77675708e0847000562c8de55af00" card_pcsc 2018.06.05 15:02:01.360 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.360 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0807bfa2846b414fed9000" card_pcsc 2018.06.05 15:02:01.361 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e084c9fe7d09d14cf350000" card_pcsc 2018.06.05 15:02:01.385 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.385 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "871101e1d8c2589c29fc9b027fa704e7867f16990290008e08198ee16589d8824d9000" card_pcsc 2018.06.05 15:02:01.385 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101d3fd24962708f561705fa8dcd2c9fac58e08f56b25eb93de652600" card_pcsc 2018.06.05 15:02:01.414 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.414 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0860b0ae4ef7768e1a9000" card_pcsc 2018.06.05 15:02:01.415 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e0850f74b32fe0ba5ee0000" card_pcsc 2018.06.05 15:02:01.439 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.439 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8711011f0b9ccf6cc950fcbd6b1f663881132b990290008e08772545cdd99fd1dd9000" card_pcsc 2018.06.05 15:02:01.439 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101a4d5e1f5bfde2d3a0e1e26b13c3bbaf08e087b14da1b19d2a73c00" card_pcsc 2018.06.05 15:02:01.464 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.464 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0855ec2916594692389000" card_pcsc 2018.06.05 15:02:01.464 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e0827b823c584aafb0e0000" card_pcsc 2018.06.05 15:02:01.489 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.489 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "871101c7660039d3d4d7bb07577545658d73de990290008e080127efba355568139000" card_pcsc 2018.06.05 15:02:01.489 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d87110164781fd5caf72bc1c5343c4e64ef11a88e089eda9ef500680a8a00" card_pcsc 2018.06.05 15:02:01.518 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.518 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e083bd7e9e733fa4f269000" card_pcsc 2018.06.05 15:02:01.518 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08ada0d07c243043a80000" card_pcsc 2018.06.05 15:02:01.542 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.542 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8711012980af56659c4e903cf49eedbfb1d9ff990290008e08760d05cc1ce6acbd9000" card_pcsc 2018.06.05 15:02:01.543 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101314e365996bbd9ec98e9e5c164c22c088e082fadf94e068550a800" card_pcsc 2018.06.05 15:02:01.568 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.568 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08f0a5d0ce2fbc5e8f9000" card_pcsc 2018.06.05 15:02:01.568 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e089900d78637d0fdff0000" card_pcsc 2018.06.05 15:02:01.593 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.593 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "872101a5e512f7f3a83a01436258ae5d9d4a5abe6e6e3a068079584c7cd110a96d7b57990290008e080ca24a9586397eb99000" card_pcsc 2018.06.05 15:02:01.593 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d8711014ec8d4f5a77b2ad20f46f45617acb0c88e08e9d5d6c134c4432000" card_pcsc 2018.06.05 15:02:01.611 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.611 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "99026a828e08890a19675db479316a82" card_pcsc 2018.06.05 15:02:01.611 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e085d8a034fd8b57f3f0000" card_pcsc 2018.06.05 15:02:01.636 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.637 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8721019c6a1cde9450687fdada4b136e68880abfbe2a6e7154a649774916da94b3a160990290008e089630d1e3905bfd249000" card_pcsc 2018.06.05 15:02:01.637 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101cd72782ffabe8bbc5420449c60d62b848e08ea41fb155ec2b14700" card_pcsc 2018.06.05 15:02:01.668 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.668 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08623dc1f5adee33069000" card_pcsc 2018.06.05 15:02:01.668 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08dfefacbf137ca4f40000" card_pcsc 2018.06.05 15:02:01.696 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.696 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8741017c82efcb7e6edc741208c116bdef3ce9dda1360eaebcfc84abaf7ad717603af2ed5d76a5842a4da1a45ce59e530832de61be3a269adcc1966143f054d42d25df990290008e08eb72599421eb049d9000" card_pcsc 2018.06.05 15:02:01.696 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101d5a12b7faafaa634b3f6d7f7e315abbc8e08f7546e644b93dadf00" card_pcsc 2018.06.05 15:02:01.714 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.714 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "99026a828e081325a83115f9dc766a82" card_pcsc 2018.06.05 15:02:01.714 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08562160cee15be9be0000" card_pcsc 2018.06.05 15:02:01.742 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.742 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "87410134c2bf3d0d27ff6ebdaf88820bb367c8045b7b1e2f315d5186b8f94efcd2319a65bf75ad10f6ebb5bb5d648666039cc64717cd198d7f58f4386bfac681266019990290008e08df189c96a643ee2b9000" card 2018.06.05 15:02:01.743 TransmitCommand::internalExecute(card/base/command/TransmitCommand.cpp:74) : transmit end card 2018.06.05 15:02:01.743 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK statema... 2018.06.05 15:02:01.743 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateTransmit" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:02:01.743 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendTransmitResponse" statema... 2018.06.05 15:02:01.743 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendTransmitResponse" network 2018.06.05 15:02:01.744 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data: "\n \n \n urn:liberty:paos:2006-08\n \n http://www.projectliberty.org/2006/01/role/paos\n \n http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand\n \n \n \n \n http://www.projectliberty.org/2006/02/role/paos\n \n urn:uuid:b9e9bba8-d11d-4993-b626-1175be000339\n \n \n \n \n http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok\n \n 990290008e08c65e297951cdcc7a9000\n 8711016fe8e25d6eb6fcbe15d870ddbd1ee1b5990290008e0883d0f9c2a5b681e19000\n 990290008e082278a2ad6b1020709000\n 8711013acf0837c4c8bf55a743c126e6f13828990290008e089c63c4642f98fc6a9000\n 990290008e086123fc3f15b9e0759000\n 8721017c3ab20962756105b4d7c14e65b43f88bda6cbd85e0b2be3ae3157908e58e315990290008e085e585835bb14efed9000\n 990290008e0807bfa2846b414fed9000\n 871101e1d8c2589c29fc9b027fa704e7867f16990290008e08198ee16589d8824d9000\n 990290008e0860b0ae4ef7768e1a9000\n 8711011f0b9ccf6cc950fcbd6b1f663881132b990290008e08772545cdd99fd1dd9000\n 990290008e0855ec2916594692389000\n 871101c7660039d3d4d7bb07577545658d73de990290008e080127efba355568139000\n 990290008e083bd7e9e733fa4f269000\n 8711012980af56659c4e903cf49eedbfb1d9ff990290008e08760d05cc1ce6acbd9000\n 990290008e08f0a5d0ce2fbc5e8f9000\n 872101a5e512f7f3a83a01436258ae5d9d4a5abe6e6e3a068079584c7cd110a96d7b57990290008e080ca24a9586397eb99000\n 99026a828e08890a19675db479316a82\n 8721019c6a1cde9450687fdada4b136e68880abfbe2a6e7154a649774916da94b3a160990290008e089630d1e3905bfd249000\n 990290008e08623dc1f5adee33069000\n 8741017c82efcb7e6edc741208c116bdef3ce9dda1360eaebcfc84abaf7ad717603af2ed5d76a5842a4da1a45ce59e530832de61be3a269adcc1966143f054d42d25df990290008e08eb72599421eb049d9000\n 99026a828e081325a83115f9dc766a82\n 87410134c2bf3d0d27ff6ebdaf88820bb367c8045b7b1e2f315d5186b8f94efcd2319a65bf75ad10f6ebb5bb5d648666039cc64717cd198d7f58f4386bfac681266019990290008e08df189c96a643ee2b9000\n \n \n\n" network 2018.06.05 15:02:01.744 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver")) network 2018.06.05 15:02:01.744 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 15:02:01.795 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server network 2018.06.05 15:02:01.795 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1" network 2018.06.05 15:02:01.795 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1" network 2018.06.05 15:02:01.795 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked" network 2018.06.05 15:02:01.795 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:02:01 GMT" network 2018.06.05 15:02:01.796 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data: "\n \n \n \n \n \n00\n\n\n\n" network 2018.06.05 15:02:01.796 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DISCONNECT statema... 2018.06.05 15:02:01.796 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendTransmitResponse" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:02:01.796 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendDisconnectResponse" statema... 2018.06.05 15:02:01.796 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendDisconnectResponse" network 2018.06.05 15:02:01.796 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data: "\n \n \n urn:liberty:paos:2006-08\n \n http://www.projectliberty.org/2006/01/role/paos\n \n http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand\n \n \n \n \n http://www.projectliberty.org/2006/02/role/paos\n \n urn:uuid:a8d2cd6e-c83f-4645-bb1c-a5e7447d0988\n \n \n \n \n http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok\n \n \n \n\n" network 2018.06.05 15:02:01.796 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver")) network 2018.06.05 15:02:01.796 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 15:02:01.838 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server network 2018.06.05 15:02:01.838 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1" network 2018.06.05 15:02:01.838 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1" network 2018.06.05 15:02:01.838 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked" network 2018.06.05 15:02:01.838 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 13:02:01 GMT" network 2018.06.05 15:02:01.838 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data: "\n \n \n \n \n \n\nhttp://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok\n\n\n\n\n" network 2018.06.05 15:02:01.838 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: STARTPAOS_RESPONSE statema... 2018.06.05 15:02:01.838 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendDisconnectResponse" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:02:01.838 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateStartPaosResponse" statema... 2018.06.05 15:02:01.838 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateStartPaosResponse" statema... 2018.06.05 15:02:01.839 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateStartPaosResponse" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:02:01.839 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateUpdateRetryCounter" statema... 2018.06.05 15:02:01.839 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateUpdateRetryCounter" default 2018.06.05 15:02:01.839 StateUpdateRetryCounter::run(core/states/StateUpdateRetryCounter.cpp:22) : StateUpdateRetryCounter::run() card_pcsc 2018.06.05 15:02:01.839 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4020c02011c" card_pcsc 2018.06.05 15:02:01.846 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.846 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "6a82" card_pcsc 2018.06.05 15:02:01.846 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0022c1a412800a04007f0007020204020283010384010d" card_pcsc 2018.06.05 15:02:01.872 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.872 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000" card 2018.06.05 15:02:01.872 Reader::getRetryCounter(card/base/Reader.cpp:151) : StatusCode: SUCCESS support 2018.06.05 15:02:01.872 I Reader::updateRetryCounter(card/base/Reader.cpp:103) : retrieved retry counter: 3 , was: 3 , PIN deactivated: false card 2018.06.05 15:02:01.872 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK default 2018.06.05 15:02:01.872 ...r::onUpdateRetryCounterDone(core/states/StateUpdateRetryCounter.cpp:39) : StateUpdateRetryCounter::onUpdateRetryCounterDone() statema... 2018.06.05 15:02:01.872 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateUpdateRetryCounter" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:02:01.872 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateCleanUpReaderManager" statema... 2018.06.05 15:02:01.872 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateCleanUpReaderManager" default 2018.06.05 15:02:01.872 ...CleanUpReaderManager::run(core/states/StateCleanUpReaderManager.cpp:24) : Going to disconnect card connection card 2018.06.05 15:02:01.872 ReaderManagerWorker::stopScan(card/base/ReaderManagerWorker.cpp:130) : Stop scan on plugin: governikus::PcscReaderManagerPlugIn default 2018.06.05 15:02:01.872 ...CleanUpReaderManager::run(core/states/StateCleanUpReaderManager.cpp:28) : Going to disconnect readers card 2018.06.05 15:02:01.872 ReaderManagerWorker::stopScan(card/base/ReaderManagerWorker.cpp:130) : Stop scan on plugin: governikus::RemoteReaderManagerPlugIn statema... 2018.06.05 15:02:01.872 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateCleanUpReaderManager" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:02:01.872 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateCheckRefreshAddress" statema... 2018.06.05 15:02:01.874 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateCheckRefreshAddress" default 2018.06.05 15:02:01.889 StateCheckRefreshAddress::run(core/states/StateCheckRefreshAddress.cpp:80) : Current URL: "https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=cbd5ac4bf2b50fb720032320c0b7b59290646fa" default 2018.06.05 15:02:01.889 StateCheckRefreshAddress::run(core/states/StateCheckRefreshAddress.cpp:82) : SubjectUrl: "https://eid-prod.connect.verwalt-berlin.de" network 2018.06.05 15:02:01.889 UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46) : SOP-Check( "https://eid-prod.verwalt-berlin.de:8443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= false default 2018.06.05 15:02:01.889 StateCheckRefreshAddress::run(core/states/StateCheckRefreshAddress.cpp:91) : SOP-Check failed, start process default 2018.06.05 15:02:01.889 ...shAddress::sendGetRequest(core/states/StateCheckRefreshAddress.cpp:133) : Send GET request to URL: "https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=cbd5ac4bf2b50fb720032320c0b7b59290646fa" network 2018.06.05 15:02:01.889 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8443, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=cbd5ac4bf2b50fb720032320c0b7b59290646fa")) network 2018.06.05 15:02:01.889 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 15:02:01.892 ...amHandlerImpl::~DatagramHandlerImpl(network/DatagramHandlerImpl.cpp:70) : Shutdown socket card_pcsc 2018.06.05 15:02:01.895 PcscCard::disconnect(card/pcsc/PcscCard.cpp:143) : SCardEndTransaction for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 15:02:01.958 PcscCard::disconnect(card/pcsc/PcscCard.cpp:148) : SCardDisconnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" network 2018.06.05 15:02:02.064 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig" network 2018.06.05 15:02:02.064 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors network 2018.06.05 15:02:02.064 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-SHA384, bits=256, proto=TLSv1.2) network 2018.06.05 15:02:02.064 I (:0) : Used session protocol: "TlsV1_2" network 2018.06.05 15:02:02.064 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384) network 2018.06.05 15:02:02.064 I (:0) : Used peer certificate: QSslCertificate("3", "3c:3f:e6:1c:7c:28:28:d9", "Kfl3PTkdwoi1P7sQWG1dvQ==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.verwalt-berlin.de")), QDateTime(2017-10-16 13:01:51.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-10-21 23:59:59.000 UTC Qt::TimeSpec(UTC))) network 2018.06.05 15:02:02.065 I ...dress::onSslHandshakeDone(core/states/StateCheckRefreshAddress.cpp:162) : Handshake of tls connection done! default 2018.06.05 15:02:02.065 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048 default 2018.06.05 15:02:02.065 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000 default 2018.06.05 15:02:02.065 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" default 2018.06.05 15:02:02.065 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "0546c2b01048cb77669003ab0743255f94582f010baa85308133f514e218ff3c" default 2018.06.05 15:02:02.065 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C") default 2018.06.05 15:02:02.065 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" for URL origin QUrl("https://eid-prod.verwalt-berlin.de:8443") default 2018.06.05 15:02:02.065 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384 default 2018.06.05 15:02:02.065 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224 card_pcsc 2018.06.05 15:02:02.110 PcscReader::updateCard(card/pcsc/PcscReader.cpp:194) : old state: "(0x20122) CHANGED PRESENT INUSE" | new state: "(0x20022) CHANGED PRESENT" default 2018.06.05 15:02:02.203 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:212) : Status Code: 303 | redirect URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1omGhJc1NIlWCSRfv1R3j7bZe%2B%2FYtXzKIMIJ9%2BPhftyDP%2F357Luf9mJZX%2BPwy1f4Z%2BjrT8WQjflrqH756nviN%2Brrn3%2F905r0HTJ9d4p1Goe1%2BOleNKzffx%2F95et7Gb6Pyfpavw9JX6zft%2By7yxj6d%2BRn6Pu0jNuYjd3Xn%2Fhi3V5Dsv32onrbpvU7CBav%2FNs9Jf85G4ehyLaf760cSbd9S4ulew0%2F5wXIvoulKhZtHLYxLFLwh2inyIrXXrjFsnfF9ue1WH%2FsX8l%2FgcgUzlCa%2BpZlJPkNS2nkGw0hybciz8uUJoqUQMqvPyn8L1%2FzIi2T7H4EQWV2z0TxbymFlN8gEk1wNCuIMsPvmcNfdPbGX77%2Bd1qgJVKW6DcYSpBvGJXR31KUzL4RCEyTEAohJVTci9b1XSjDuiXD9stXBIKpbxDxDcI9GP0OId8h%2BGeCwuKvPwV%2FMfttqK9%2FGPn7b4uXv7fw%2F27gZF2L5YdRv%2F76V2P%2BixH%2FBP6G1R%2FC%2F4qnuyXbe%2F2nv9yYFz8FSfcu%2FvcX3%2Brdi7%2B77yy7zf8V%2FPWPl0zf%2F0Hsd2HIls%2B0FTnzl53%2BR8r96bz98m%2FC%2BGRL%2FpDz48HvHnU71HEcPx%2Foz%2BNSgQgEwSCEgbez3jP%2B68YlvyGEyiJJioxC7l9GJUVRkCRNwkWGUCmZoujXn7zPdKv%2Bf5QndEVfDNsN3N%2Fv7AbCKLZ6zH9iumpcXlvd%2F1%2FISooVRm6nTbMfdszX71rxUYZy%2FEPDfP03MiAQon%2Fol6%2Bv6r%2F%2BaSdFfgv5XWcMh1AExnIMhfGMxrPbZTMcT9AMxm9bpNT%2FFx2WNfkG%2Fzf%2Bjwr8pswTh%2BgfeP31D%2FfDY8tXlmzFr4ai8BfPccziVsyhsEylcIxtHLwdqdoYK%2FWePRhb0FmbOap4PLmLUdnqEbBM5DGtIxo29WMuH9i28kU4Yi5%2BqmsSYid%2FMY%2FfJ2Ye26pd1p9T2gi%2BwSoSA%2FsCVxu6GzhC%2BGL%2FtoZntN%2FXrN4XBgqkRyO8DI75bQFzHLEPiQ9PpLsktLdMVveYw5sUwd9x%2BICeUGDal1AbLCVx7iy5SorytqAyTuR%2BicOutaUOiuVxi%2Frgk0rdW%2B%2BdzmCxJ%2B8JqOEJx%2BMSYONSDkMc7zHln8f%2Bqv6Xf6f%2Ff6L%2Bl3%2Bn%2F3%2Bi%2Fpd%2Fp%2F%2B%2FVV9RWKX5AVQ71%2B1Log%2BIvdEWGcbkvjA2xdzuwXKVdruEwCDmx0qVZM8L2S1BnqEOzaSj0vE%2FCMYpeJ5g8Mt8VoMejGDC2ZV%2FbVhjKS54NswXWdWvSCAcUgkkLrMvzS6u5OR92jYbRx8NwV0JvoiCp5yYPSXSgf1g9vSTowXQuDH6LEz9kyKbhqr78OVdgWEaz5ZRBBvIiMqSJQWypmf7IeO9cos69hqv4SN3DFiFe5%2B%2B3UKPtxsNqes0yb7UnICPTJzjWDt%2BoVQLx72Qd89zJGepw0BEtUMkB5x0%2BchYdQxCoQ3kGJSQusjICyRmAWEr39CCxsLiPa3Yc4DDyjM%2B4hes0KYqj5ENwAVG3RbfEodYwKIkEEj5k%2BOF3%2BCpH7ErRfEYfLYYAyb9ofCMzbDjOR4S%2F%2Fvxkh1D%2BMI0DGMw6w%2Fvz%2FnjRuBQhJb%2FZ7TW39D6AdBiPULGBy4%2BGZ0l1eWpAedaGxJKFYIvTlOXM05SiwQSw4M%2BptLvS8iDWwFbOZGR38uspg6ZSaXglKkC1E%2BHiJyGqOCNad5ocFWj8Xgj43ukqy8YChB025fNUx7oih%2FaaSgJEGc23mZGIx9nqT5ltiiXgBx2HIja1%2FZOB971YhbQLF2jwUOm8g3pwaj4Qr%2FN6xC33IwNSIWRZ%2FkUNNWufSrJAT9m8762%2FO08AUI4ziwG6hOkiZxTqUr2JGmtxsONiEI3URZY3l%2BKbR5f4diR91b2%2FuV%2BAHV8FcZGo1nv6HRryBHGaBrUj6zhayWIWO%2BGUGEbsaDc0lJUx99qSW8X3onclywviYCMnO745Zc%2FgX%2BE0r%2BPnn8d%2FD2%2B%2FpjyR%2Br4Iy1xr6kult%2Bf%2Fpanfh%2F4Lb%2F%2Fqqgpl6z81hWV8uqiajqKdKy9AtAAypaf4TptjOlv6dB0AeRJRNLH8UauVSXOTt9Rz563yP5EOdG4%2BMP9FNT%2BbLNLemkRrc5NYCHj4Apy26CgKZmNLM4vYY%2FM1ZFhZXqKByoGJHsV2h4Rk7VD9ExXnvmQp8%2FTt0wIlIZBC8tYljfBGFOJ6Do6%2F2RPTV9YGvtMTLRICNu8wustpA8HcXqTmMMZMvoN3OJjer4Y1%2FrI6id0WehpQsCjRKrrqe7soqhGuYO96g0PgW0alEfMKwxPowttXK30Ku41BGW0ZHWbD%2FoYeVgmMWs7iUtlnu2QN1rSa2UlhE6nWLsQlSaTsyO9PrIEj2b7B1T%2FYup%2FGPoDrH9kNDdu%2F88APqaKHjP1iOGV7WV1CT6Fzeb5C0AVjUvx1hFkamNo3eS1BNarvpvuWJpERZPQXhfVE47EJr9reV%2FcoYa05ey9TEXdCngzIW3XuZdIVUhgNxGo0BidjPlUNEP%2B2F388%2BBoT7qNZTX1KZC47H6UQJM9%2FxAfE6mhsT7FnnJHFX4lF76nYsCaXD8tSJfZZkK7ameTL2oZHq3zvpwu4XWFXl5v29aYPG0e0PpcZ%2BQjlItsPcMm6Ci5hjpjvaatp65NKoB25qieuQGkaCCmNqPmTrHKia6h0Zez0ImNyysD61OAO4R%2B%2BUZFKlpUVesdDGN9k9n8gD%2B4pqN%2B%2BhAbrY%2B6g4TcApMlx4tnB1C3XW7PA%2BwjVim8Rk1JjVgT34e3lkQkccLGAH0oLUFP4pM2fYkUTsKTRxF%2B7RXpLXNT8PlmHOGD5%2BjPnknqqge7KuPN%2BjnKcnyHuvd4hYLD%2BMfEP%2Fi0aUxlnKfyzW1jh6jp3iiSYD6A%2Bn2NF7sB5fy0zkyeRm8x3irt%2Bwoz9tpsiVRp4XRb2D1jb6CPrA%2BQkL046N92Jk2PPisjiFr4zXm8lqbxYQUje2qi65TEx9eypfEAHow5l%2F6T18agSQGfpbo8ArIXQ34u1ICf49G2uypMJpcVG0KXx5Gw%2FqR7DZs3K1NYnsuXXkV76XR1ZqH0llcfHAUlu2ppuezOC9zUh4mPdManoJCvF1d1rE8VH2jgzx5JpxNYmw%2BdohrwLuPm0WLnY%2FAoyh%2BrzHyMXblg44hlAkbEiKcqKuCSDMFGYzLxAB1U2lCu3Xp81oLIkfJKz3Ij97r71Lyu3mCfd%2Fatn6WlWx9OUxaZDODAQBYmxJPepcUFK4WdFV3Xk7bxrA3b9R7Y5O%2Fqna1L9CMAdJKpioe%2FN2eKmc3zGWGIacHbrfequYLdawD3THMzQ6cNXO%2FgoJSYy2n69alsYZRln41lFvC1bN36wa4cE6cVZus2GmRVx3bSIIqCEK7AR0RL21p4JUJGInx9LqNqDbhtNDzj5b65QDDfgNUQ6isciEcsr1W%2FPDbUDd7Fi9Zo%2BjWBui2cITlIueA6L15VcijVLY8OP1NYFnQExvK8bGWPCPIrdMH4rUOZGIjK6Pj1MUfJZQGZK6rdmqDOjGxg%2FcmEqNsZsqRJnu4c9o0tchMfg%2FwSQacGkDcCX1DkDNo7sq3AmOvi6fYsMT%2BCjNLWfFIzJS6R5YWlSGm6iGLE4Z0w3NU5rcknujJsOWiTpYaU56dYEGrKilGhdJP7Nm82hmcdahoh7iYC2NcSDUu25ui1JcvDOsWfYCJS9dIVnFBeYVi1aDigT3zpGonQcH9GC%2BOEAZ3tWDQ0jXfxXKwM1io0dJuxwKUtc1g%2BuzMPAvlNIAIiU7erH064Fu8Uig9P3t605nY2XRRj72TQ9oPWBGmTOikxTXUl7ye10O3oY7JBo2COLTBHMCgVvgy39wFeJik4oCKdVkjlvCRDX9XkWAGJN1haWrGgFea1UwkMRuoKGHEeW3WRgfkKTxm32iwxiTfKfHQq2rUkzdaOQhFkG4OaCI83e5PZjTQvaO%2FX%2FcQep6MYSPVY%2BkIrurFFxL032QTQ2Lw8BCVzaucO885LWYPhIa%2FDefupJgRc5Yy5thX4VS%2BuhcT9IwOkT4DTpjJAdzn08UhOLY69lBV1HCDB6X1fsEHokkRvwcD0KZL%2BakM6985FqBgE6vOo8BvYE%2BEtu%2FNJz31MZZI8dzR%2Fogmtr3ceat4M6%2Bawvpl18FJkpVRopIR1dmw9iYcvwCum%2BVG1vh5bpMgdQQcM5hF5uEoasKqsNk%2BSHySpeSZ%2F8WOTUqi59YAKB4zlpu6rLMuluGO7GG0T%2FYkg63gO8eqnb9C69GybnsBxwmJTeEmP7zWAhviaWJiNtLX%2BKFyOsciFWAoZQ0jrcgUpIdDXDIQSPw5CqlWqQufwMkcRlbjSxQpBks73cZ6eIbRMDESpu4H1N6fAX3U8SXxaJTkpNp95pAkIq12aDtqwBZo7%2FP2IcymvCdLMvVXAGPEMuJ5YYXvLZRIfGkZOjTsyBjfpaQA1qq0GqN%2BAQ%2FTdUvMkl8ZbleY%2BvlI2A4qpudVp0rIDKYNZlKLYU9QSzV7ndymJluFdlN4xQ1Le5qcEw1FjVrhIZsApniz0GtibgnKF5%2BvN8py5FeNn1cx01vc11ABMD2It4ROX7vvdkhWN6qgUPcsYlXptVe86ZvnEGntiDmxfkk3Ne6i9vPHNDTEUOsFYBd4j0tlCeJmGpFsZnZl%2Br7YqhGuiiDJvQE%2BYR7PV73BDkV1dWVM9nzLRTuiBgjiJ05NVYQsKd490Z4M4Cww8Jug64WCCE20VGSCG9UFo%2FjTIMeK%2B%2BiQMHC1FUN622LqZJOmXz3BE%2BNeWdKPHQAoz9zwXEIUlZPGOOV0ZoHo6T2j3ICBiLq5tMgJLn5%2FpYT2x%2FHKZhH551jQr6va%2BFu1lNzQ%2FcNzZBe%2B9skHTyAqMSQt7N8oPHW%2FgM7E0bKFxhH2Yj1UZinIbpXKNpYW58IH2zBct1pWJpXyTK1YDlfXwNO8eJ00PLXBnynf8CgAni4SyDcyAbTFRPh93hblCgb5wx1s%2FdXdHmzpdGJibJjJnzqOUFt4GYfolczF3RsSR509T56f6tNjVPIscUo8zEmprXZ448RCDNiL0M6zJp03me8YvpnlNuRQeT9KjsSoKk9Xo54VJu903cF9ZALlFdISoZsq%2F6CTS1vZmA0HmTNpjm%2FQPHTm49%2By09kls6mHgK%2Fnm8iWDNjASGck4nQx87JQsj9yQBnNzUyiSMQ6Y8i07P2eJm2%2Bwqrt674qDRVbMZ7L6nBwqswuABGQAaEbVl4AomqcKvugo8vTzuek3tS1YFNgsOsa02YN2blX9RD%2BYLMikx4iubMAZcvfarKM4FlicBCWnG2FM81W26Rl1Syw22b3vPiOVILjIfaDGVlyyWSmfB4jSZ14R5bZ9w8SRE0j8qSxq44uP4YmeWVi6IfJpFYujWJwQZ7DcifdU8%2BuJ0PXY%2By8EAm2RFu3eu4y%2BUSdp2boLm9vXIr4mY0ngEU1C6RBAd7M3lOyJkAsCeEdOZHq7z8Kbbp5l3PXVcDZxVr%2FvLrn1jNVO8bIonfok06NGWRuzMTYLH0YkEduiJBFAIjGTioDoU9JAsISQbcoKJFCrJ4NW%2BUQ8qcYz59klqHtTsmJEFMYiKm2tFwdWXYrsoE7tZr591h2xk9H7wHH1eTcdXIXI7AqyyBD0mMMer9nXkKSoPSM01AiGySSrPCXCbDmm3Lr%2ByMjcCKiLNpA7GpxBOSVhYENpLSxRm6B1Cg3jrLAlTrHqfG7eXp%2Fmo9Us0BAeoloPGMLiB1UrCR3hR640Jk25wJjVtX%2BEIXIzn5xF4BesfzY3nB8kKlbVG0KFqb9AOwM6nPLVmnDuiOm0Pjm2slgCnJyU8BnnvqzniXCkZ2FqpSRLBInVTgk%2FlLoeqE08kbf%2FKTDomh5a2yOr9znHvEPog0U1li9LslRyxJWNl0fwL%2FX9OuRrSaJ3NDhTwn1sDX2thMFygliPRgqoVXPCYDdD6RQH8mjoVLokuCO%2Fpb26af%2Foi3PknaxWFFIw1v3zwp2OTA6IOn3sgAeyo4lgGNlcf0nd0i%2Fledbra3otTD2u9VG1Bc%2BUnxcD%2BXQr75%2FYfgmtUUs4H4o0ZprjHMf005TwRX3iLlLdBW0J3hlghzdAXxWRHe9zO5DkEEyNeSfvAvI3LfDyyXYt%2BcGNrK4D%2FLsL4zTweceK7gxhMQMzcuYa6ILjHcwEuo9HgeQCr5tSEi1LqHbaCzs5l7ClClSQxVgJ0wlREZM67Wl%2Bxhdxd2ETwM39rGsvZztSlc%2BLSG0w387dPhRs3S9VdngzBTVnva08Hufq0u%2BtCxAh9pXj8k4ZqihXLoIypZZdYC8QMwscj6%2BzSUaxz%2FxssrLxZA0MpfYwzJQUvlvStA67MwAuA3EdbapgbOFFxDr%2FqEgROQNtq0eIdQLuTgLUKnbYgiRJClGIev5YbB38PgNyAaYrZ40kqZiAMevPaFF0DemgvZgh8dGW%2BdhK3hwpGVr2NKN15dnCCKspkJ3FGLrV1UPrV2W1iuQVl54K3mQH%2FSAVzvjWvAy4JLLiyjiKQGfec2nJkX2SSj6M3gXX08qipBY6NBlbjUm2Q5SRO7sa2247diQG3HbakAB2HHuElnofF%2F%2BU2GBd9yeCO9ETtVxfQlT%2FDpof7PUKYhcwSLJ4bss2B3hwFWgmMPX%2BKFAq5VtY7UD08fTYgGoh6RjgMgOQkCFgeZyG83152LStP9otZgKL56OLyeEoi%2FbmcmTF2g2wSZKovKm3eITbrjdWx8DuQxpb9toQcnw0iPICwn3PObDK86HKo6HiriQbw1cSwFKgBDSj0Pu0WMnxGHMOys%2Faxawn9%2BDuFgzTJHFL9sJka9MWjyM6r2%2BEIYoXSy4sKlSISuzGodxEqd%2BCAMHuV%2BWQKUq%2B%2F0kgyCHENn%2BvQtD4YacEtZG3BRJzzDjrd3tTOuWGfxfxDi%2FZY7H1m5RpTMx96ACU3tsgHsjEbkEKZhB%2B4LqOXFAaFib3OCuxyaR9fPd7M%2FZGkHXVnGIthCieDAGZf58OVufdraJ2c2SaUdG19IlzRaCEziXVQ%2F2BnVcuAe%2B9JFuYvj2po7lKjnipoXfJoY4Ma3eJatNXgK13cUKHrly7U9uAujkbRng6GPcAzDTmDlGCWprRzSDlOcZh9EGi%2BHQM7xJv531pgMRtGqSPILqwHyvmTjUEkBz3nQsXgP3dTEZtzDx4UUkI7NlEawicPpFWKPVW5BqQ5jQmQIbSpgEfA3sJrtnIYMwr9R2%2FS%2FHjlek2WzAlbFBN%2FYxmii13w%2Fdu19b5d9nQ11LnFvAYr8%2FoVblYNeuME0LGtk1%2FoazcKo7nLjcTfWxV10%2F2iAUbGt%2BtdM9m3duLjaOI72a0qe1rNn%2BGD%2FER6fC4mNkxADo%2FpZCX7718Ns%2B6HNbn4dX6UMazDSISLUFWA42rJsa56KuVrj7oqwqlmQdzPzBlS7mb95%2FnpSAEVXfZBQx4i%2BkhcHWSvJJ7Y233bdLWOlT80TWnLlnFIqaX4gtzFq%2BxdbH0kVoz%2F8gonRFRRJ11SA0eUf2Sgo0Y3Mf12VD4RBH7LhHLafCYbXLe1FDkYI9ZfNI9WI5tkMcd0F%2FF3JoaPhPgSUcDvRKqY%2Bq4W9ApKat42lX8%2FnFlAJT9t7PybxF1Lnxm1tGTgPWwTcjgzRkR6alI4ktzb2%2BQ%2B2Rp4jcYLESeEjPMf1RJAQqZ82KHoiiFLkCQH1NeUm06edss7uWpkZFBprz7MmTANni%2BNVaZy7GK7uuCDBxrxTAcbY5W1cxPCLOw6C58SPqhDNHdBKnL8MliRoCl%2BA6lJLrcTXqXjDUes0ZI9MGZ3P2mfH8uoOvf%2FUsxIG1yNcWXKGfEy%2FzhWCH%2BacH0Va6IwqNWNuyPanFFHZtqC8idEfC715483pzZ6TI1EhwVAt47gRWIgFkHJijm%2BdEhqn6kb3pKX8X2Li98sYatBFeGovV8rwitlwUkDMlgJ2zngWKfVuvtEJhUQHgEkFZLp5tfCK5pFpMzZtcOCfRRwvD10axKF6yNu%2BPpNb863Er1%2FGWZomw5ETEW8rLSC00eON8COlqwb3uw8qCqCgxQNnh4J97NJaE3xehpMdBgC8t05D80KYPNcF%2FIZVY4g%2BvQPC0KG4VIa9UZwkdy2W6laTo77LAP5RTGYdH6l7eZhS3XsLsb5OvZyQGCkEm%2BAp%2FKinB6bVytT1n0TgCKGoHOyT2eYEIUOLUC6NWzJPS4r4u4XvJTA7RnWq7bNKDvaqAa6JtFPKEjOHNkU5UlAMxl7gmJbRQMqK4ehJFXl0zda1kIRoH1l60YJVmZfjbyivV6PqeaU0HQxJEWB4LAUveGIAXvDUY0x0ZvrZW121%2FG2idVV7OTuL%2FPsbfVzxzGrySQ%2BUW0RFQAD02PvRXPuaPl83g3BdsujsE4xwD3X%2BJoR9juHfnLP7Bw51PabgVDJHN9DyFILEuglxvNUepujsScPS9vchSSYcv7PqD9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=G3Q%2BjzFaEwmal2YdOPC%2FnOr%2B60CpKL%2BgfE15Zqb9HPkaFGMGvJnJXTTJZnq%2Fk39%2BdxYr%2B%2BGxURMn%0AvQiCxIoQJALN06iIEMPVr6Ihvp%2BYBCmTxfJenbiJpr1eUUQL4fC7qmZ8xWWbuX4z882omXpcpwyJ%0A7KBZaimyq%2FRkTy4QazvrfldEuPj5x0DpDkKOVoxjZQIUn5155U%2FS1Wyb%2BUNnAoSx4vELycvxs8zj%0A1C4O189P9kDa3VkJd7CwF%2B7neTofd1L5jQBqB1JeaSgFyNhMLZ0FcUSymVM1wNbeLuvbfcSpFhCC%0AWbzr3rlL8O%2BSs1nMZcebHBrYOz7xiuhIWl8mcA%3D%3D") network 2018.06.05 15:02:02.204 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Server": "Apache-Coyote/1.1" network 2018.06.05 15:02:02.204 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Location": "https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1omGhJc1NIlWCSRfv1R3j7bZe%2B%2FYtXzKIMIJ9%2BPhftyDP%2F357Luf9mJZX%2BPwy1f4Z%2BjrT8WQjflrqH756nviN%2Brrn3%2F905r0HTJ9d4p1Goe1%2BOleNKzffx%2F95et7Gb6Pyfpavw9JX6zft%2By7yxj6d%2BRn6Pu0jNuYjd3Xn%2Fhi3V5Dsv32onrbpvU7CBav%2FNs9Jf85G4ehyLaf760cSbd9S4ulew0%2F5wXIvoulKhZtHLYxLFLwh2inyIrXXrjFsnfF9ue1WH%2FsX8l%2FgcgUzlCa%2BpZlJPkNS2nkGw0hybciz8uUJoqUQMqvPyn8L1%2FzIi2T7H4EQWV2z0TxbymFlN8gEk1wNCuIMsPvmcNfdPbGX77%2Bd1qgJVKW6DcYSpBvGJXR31KUzL4RCEyTEAohJVTci9b1XSjDuiXD9stXBIKpbxDxDcI9GP0OId8h%2BGeCwuKvPwV%2FMfttqK9%2FGPn7b4uXv7fw%2F27gZF2L5YdRv%2F76V2P%2BixH%2FBP6G1R%2FC%2F4qnuyXbe%2F2nv9yYFz8FSfcu%2FvcX3%2Brdi7%2B77yy7zf8V%2FPWPl0zf%2F0Hsd2HIls%2B0FTnzl53%2BR8r96bz98m%2FC%2BGRL%2FpDz48HvHnU71HEcPx%2Foz%2BNSgQgEwSCEgbez3jP%2B68YlvyGEyiJJioxC7l9GJUVRkCRNwkWGUCmZoujXn7zPdKv%2Bf5QndEVfDNsN3N%2Fv7AbCKLZ6zH9iumpcXlvd%2F1%2FISooVRm6nTbMfdszX71rxUYZy%2FEPDfP03MiAQon%2Fol6%2Bv6r%2F%2BaSdFfgv5XWcMh1AExnIMhfGMxrPbZTMcT9AMxm9bpNT%2FFx2WNfkG%2Fzf%2Bjwr8pswTh%2BgfeP31D%2FfDY8tXlmzFr4ai8BfPccziVsyhsEylcIxtHLwdqdoYK%2FWePRhb0FmbOap4PLmLUdnqEbBM5DGtIxo29WMuH9i28kU4Yi5%2BqmsSYid%2FMY%2FfJ2Ye26pd1p9T2gi%2BwSoSA%2FsCVxu6GzhC%2BGL%2FtoZntN%2FXrN4XBgqkRyO8DI75bQFzHLEPiQ9PpLsktLdMVveYw5sUwd9x%2BICeUGDal1AbLCVx7iy5SorytqAyTuR%2BicOutaUOiuVxi%2Frgk0rdW%2B%2BdzmCxJ%2B8JqOEJx%2BMSYONSDkMc7zHln8f%2Bqv6Xf6f%2Ff6L%2Bl3%2Bn%2F3%2Bi%2Fpd%2Fp%2F%2B%2FVV9RWKX5AVQ71%2B1Log%2BIvdEWGcbkvjA2xdzuwXKVdruEwCDmx0qVZM8L2S1BnqEOzaSj0vE%2FCMYpeJ5g8Mt8VoMejGDC2ZV%2FbVhjKS54NswXWdWvSCAcUgkkLrMvzS6u5OR92jYbRx8NwV0JvoiCp5yYPSXSgf1g9vSTowXQuDH6LEz9kyKbhqr78OVdgWEaz5ZRBBvIiMqSJQWypmf7IeO9cos69hqv4SN3DFiFe5%2B%2B3UKPtxsNqes0yb7UnICPTJzjWDt%2BoVQLx72Qd89zJGepw0BEtUMkB5x0%2BchYdQxCoQ3kGJSQusjICyRmAWEr39CCxsLiPa3Yc4DDyjM%2B4hes0KYqj5ENwAVG3RbfEodYwKIkEEj5k%2BOF3%2BCpH7ErRfEYfLYYAyb9ofCMzbDjOR4S%2F%2Fvxkh1D%2BMI0DGMw6w%2Fvz%2FnjRuBQhJb%2FZ7TW39D6AdBiPULGBy4%2BGZ0l1eWpAedaGxJKFYIvTlOXM05SiwQSw4M%2BptLvS8iDWwFbOZGR38uspg6ZSaXglKkC1E%2BHiJyGqOCNad5ocFWj8Xgj43ukqy8YChB025fNUx7oih%2FaaSgJEGc23mZGIx9nqT5ltiiXgBx2HIja1%2FZOB971YhbQLF2jwUOm8g3pwaj4Qr%2FN6xC33IwNSIWRZ%2FkUNNWufSrJAT9m8762%2FO08AUI4ziwG6hOkiZxTqUr2JGmtxsONiEI3URZY3l%2BKbR5f4diR91b2%2FuV%2BAHV8FcZGo1nv6HRryBHGaBrUj6zhayWIWO%2BGUGEbsaDc0lJUx99qSW8X3onclywviYCMnO745Zc%2FgX%2BE0r%2BPnn8d%2FD2%2B%2FpjyR%2Br4Iy1xr6kult%2Bf%2Fpanfh%2F4Lb%2F%2Fqqgpl6z81hWV8uqiajqKdKy9AtAAypaf4TptjOlv6dB0AeRJRNLH8UauVSXOTt9Rz563yP5EOdG4%2BMP9FNT%2BbLNLemkRrc5NYCHj4Apy26CgKZmNLM4vYY%2FM1ZFhZXqKByoGJHsV2h4Rk7VD9ExXnvmQp8%2FTt0wIlIZBC8tYljfBGFOJ6Do6%2F2RPTV9YGvtMTLRICNu8wustpA8HcXqTmMMZMvoN3OJjer4Y1%2FrI6id0WehpQsCjRKrrqe7soqhGuYO96g0PgW0alEfMKwxPowttXK30Ku41BGW0ZHWbD%2FoYeVgmMWs7iUtlnu2QN1rSa2UlhE6nWLsQlSaTsyO9PrIEj2b7B1T%2FYup%2FGPoDrH9kNDdu%2F88APqaKHjP1iOGV7WV1CT6Fzeb5C0AVjUvx1hFkamNo3eS1BNarvpvuWJpERZPQXhfVE47EJr9reV%2FcoYa05ey9TEXdCngzIW3XuZdIVUhgNxGo0BidjPlUNEP%2B2F388%2BBoT7qNZTX1KZC47H6UQJM9%2FxAfE6mhsT7FnnJHFX4lF76nYsCaXD8tSJfZZkK7ameTL2oZHq3zvpwu4XWFXl5v29aYPG0e0PpcZ%2BQjlItsPcMm6Ci5hjpjvaatp65NKoB25qieuQGkaCCmNqPmTrHKia6h0Zez0ImNyysD61OAO4R%2B%2BUZFKlpUVesdDGN9k9n8gD%2B4pqN%2B%2BhAbrY%2B6g4TcApMlx4tnB1C3XW7PA%2BwjVim8Rk1JjVgT34e3lkQkccLGAH0oLUFP4pM2fYkUTsKTRxF%2B7RXpLXNT8PlmHOGD5%2BjPnknqqge7KuPN%2BjnKcnyHuvd4hYLD%2BMfEP%2Fi0aUxlnKfyzW1jh6jp3iiSYD6A%2Bn2NF7sB5fy0zkyeRm8x3irt%2Bwoz9tpsiVRp4XRb2D1jb6CPrA%2BQkL046N92Jk2PPisjiFr4zXm8lqbxYQUje2qi65TEx9eypfEAHow5l%2F6T18agSQGfpbo8ArIXQ34u1ICf49G2uypMJpcVG0KXx5Gw%2FqR7DZs3K1NYnsuXXkV76XR1ZqH0llcfHAUlu2ppuezOC9zUh4mPdManoJCvF1d1rE8VH2jgzx5JpxNYmw%2BdohrwLuPm0WLnY%2FAoyh%2BrzHyMXblg44hlAkbEiKcqKuCSDMFGYzLxAB1U2lCu3Xp81oLIkfJKz3Ij97r71Lyu3mCfd%2Fatn6WlWx9OUxaZDODAQBYmxJPepcUFK4WdFV3Xk7bxrA3b9R7Y5O%2Fqna1L9CMAdJKpioe%2FN2eKmc3zGWGIacHbrfequYLdawD3THMzQ6cNXO%2FgoJSYy2n69alsYZRln41lFvC1bN36wa4cE6cVZus2GmRVx3bSIIqCEK7AR0RL21p4JUJGInx9LqNqDbhtNDzj5b65QDDfgNUQ6isciEcsr1W%2FPDbUDd7Fi9Zo%2BjWBui2cITlIueA6L15VcijVLY8OP1NYFnQExvK8bGWPCPIrdMH4rUOZGIjK6Pj1MUfJZQGZK6rdmqDOjGxg%2FcmEqNsZsqRJnu4c9o0tchMfg%2FwSQacGkDcCX1DkDNo7sq3AmOvi6fYsMT%2BCjNLWfFIzJS6R5YWlSGm6iGLE4Z0w3NU5rcknujJsOWiTpYaU56dYEGrKilGhdJP7Nm82hmcdahoh7iYC2NcSDUu25ui1JcvDOsWfYCJS9dIVnFBeYVi1aDigT3zpGonQcH9GC%2BOEAZ3tWDQ0jXfxXKwM1io0dJuxwKUtc1g%2BuzMPAvlNIAIiU7erH064Fu8Uig9P3t605nY2XRRj72TQ9oPWBGmTOikxTXUl7ye10O3oY7JBo2COLTBHMCgVvgy39wFeJik4oCKdVkjlvCRDX9XkWAGJN1haWrGgFea1UwkMRuoKGHEeW3WRgfkKTxm32iwxiTfKfHQq2rUkzdaOQhFkG4OaCI83e5PZjTQvaO%2FX%2FcQep6MYSPVY%2BkIrurFFxL032QTQ2Lw8BCVzaucO885LWYPhIa%2FDefupJgRc5Yy5thX4VS%2BuhcT9IwOkT4DTpjJAdzn08UhOLY69lBV1HCDB6X1fsEHokkRvwcD0KZL%2BakM6985FqBgE6vOo8BvYE%2BEtu%2FNJz31MZZI8dzR%2Fogmtr3ceat4M6%2Bawvpl18FJkpVRopIR1dmw9iYcvwCum%2BVG1vh5bpMgdQQcM5hF5uEoasKqsNk%2BSHySpeSZ%2F8WOTUqi59YAKB4zlpu6rLMuluGO7GG0T%2FYkg63gO8eqnb9C69GybnsBxwmJTeEmP7zWAhviaWJiNtLX%2BKFyOsciFWAoZQ0jrcgUpIdDXDIQSPw5CqlWqQufwMkcRlbjSxQpBks73cZ6eIbRMDESpu4H1N6fAX3U8SXxaJTkpNp95pAkIq12aDtqwBZo7%2FP2IcymvCdLMvVXAGPEMuJ5YYXvLZRIfGkZOjTsyBjfpaQA1qq0GqN%2BAQ%2FTdUvMkl8ZbleY%2BvlI2A4qpudVp0rIDKYNZlKLYU9QSzV7ndymJluFdlN4xQ1Le5qcEw1FjVrhIZsApniz0GtibgnKF5%2BvN8py5FeNn1cx01vc11ABMD2It4ROX7vvdkhWN6qgUPcsYlXptVe86ZvnEGntiDmxfkk3Ne6i9vPHNDTEUOsFYBd4j0tlCeJmGpFsZnZl%2Br7YqhGuiiDJvQE%2BYR7PV73BDkV1dWVM9nzLRTuiBgjiJ05NVYQsKd490Z4M4Cww8Jug64WCCE20VGSCG9UFo%2FjTIMeK%2B%2BiQMHC1FUN622LqZJOmXz3BE%2BNeWdKPHQAoz9zwXEIUlZPGOOV0ZoHo6T2j3ICBiLq5tMgJLn5%2FpYT2x%2FHKZhH551jQr6va%2BFu1lNzQ%2FcNzZBe%2B9skHTyAqMSQt7N8oPHW%2FgM7E0bKFxhH2Yj1UZinIbpXKNpYW58IH2zBct1pWJpXyTK1YDlfXwNO8eJ00PLXBnynf8CgAni4SyDcyAbTFRPh93hblCgb5wx1s%2FdXdHmzpdGJibJjJnzqOUFt4GYfolczF3RsSR509T56f6tNjVPIscUo8zEmprXZ448RCDNiL0M6zJp03me8YvpnlNuRQeT9KjsSoKk9Xo54VJu903cF9ZALlFdISoZsq%2F6CTS1vZmA0HmTNpjm%2FQPHTm49%2By09kls6mHgK%2Fnm8iWDNjASGck4nQx87JQsj9yQBnNzUyiSMQ6Y8i07P2eJm2%2Bwqrt674qDRVbMZ7L6nBwqswuABGQAaEbVl4AomqcKvugo8vTzuek3tS1YFNgsOsa02YN2blX9RD%2BYLMikx4iubMAZcvfarKM4FlicBCWnG2FM81W26Rl1Syw22b3vPiOVILjIfaDGVlyyWSmfB4jSZ14R5bZ9w8SRE0j8qSxq44uP4YmeWVi6IfJpFYujWJwQZ7DcifdU8%2BuJ0PXY%2By8EAm2RFu3eu4y%2BUSdp2boLm9vXIr4mY0ngEU1C6RBAd7M3lOyJkAsCeEdOZHq7z8Kbbp5l3PXVcDZxVr%2FvLrn1jNVO8bIonfok06NGWRuzMTYLH0YkEduiJBFAIjGTioDoU9JAsISQbcoKJFCrJ4NW%2BUQ8qcYz59klqHtTsmJEFMYiKm2tFwdWXYrsoE7tZr591h2xk9H7wHH1eTcdXIXI7AqyyBD0mMMer9nXkKSoPSM01AiGySSrPCXCbDmm3Lr%2ByMjcCKiLNpA7GpxBOSVhYENpLSxRm6B1Cg3jrLAlTrHqfG7eXp%2Fmo9Us0BAeoloPGMLiB1UrCR3hR640Jk25wJjVtX%2BEIXIzn5xF4BesfzY3nB8kKlbVG0KFqb9AOwM6nPLVmnDuiOm0Pjm2slgCnJyU8BnnvqzniXCkZ2FqpSRLBInVTgk%2FlLoeqE08kbf%2FKTDomh5a2yOr9znHvEPog0U1li9LslRyxJWNl0fwL%2FX9OuRrSaJ3NDhTwn1sDX2thMFygliPRgqoVXPCYDdD6RQH8mjoVLokuCO%2Fpb26af%2Foi3PknaxWFFIw1v3zwp2OTA6IOn3sgAeyo4lgGNlcf0nd0i%2Fledbra3otTD2u9VG1Bc%2BUnxcD%2BXQr75%2FYfgmtUUs4H4o0ZprjHMf005TwRX3iLlLdBW0J3hlghzdAXxWRHe9zO5DkEEyNeSfvAvI3LfDyyXYt%2BcGNrK4D%2FLsL4zTweceK7gxhMQMzcuYa6ILjHcwEuo9HgeQCr5tSEi1LqHbaCzs5l7ClClSQxVgJ0wlREZM67Wl%2Bxhdxd2ETwM39rGsvZztSlc%2BLSG0w387dPhRs3S9VdngzBTVnva08Hufq0u%2BtCxAh9pXj8k4ZqihXLoIypZZdYC8QMwscj6%2BzSUaxz%2FxssrLxZA0MpfYwzJQUvlvStA67MwAuA3EdbapgbOFFxDr%2FqEgROQNtq0eIdQLuTgLUKnbYgiRJClGIev5YbB38PgNyAaYrZ40kqZiAMevPaFF0DemgvZgh8dGW%2BdhK3hwpGVr2NKN15dnCCKspkJ3FGLrV1UPrV2W1iuQVl54K3mQH%2FSAVzvjWvAy4JLLiyjiKQGfec2nJkX2SSj6M3gXX08qipBY6NBlbjUm2Q5SRO7sa2247diQG3HbakAB2HHuElnofF%2F%2BU2GBd9yeCO9ETtVxfQlT%2FDpof7PUKYhcwSLJ4bss2B3hwFWgmMPX%2BKFAq5VtY7UD08fTYgGoh6RjgMgOQkCFgeZyG83152LStP9otZgKL56OLyeEoi%2FbmcmTF2g2wSZKovKm3eITbrjdWx8DuQxpb9toQcnw0iPICwn3PObDK86HKo6HiriQbw1cSwFKgBDSj0Pu0WMnxGHMOys%2Faxawn9%2BDuFgzTJHFL9sJka9MWjyM6r2%2BEIYoXSy4sKlSISuzGodxEqd%2BCAMHuV%2BWQKUq%2B%2F0kgyCHENn%2BvQtD4YacEtZG3BRJzzDjrd3tTOuWGfxfxDi%2FZY7H1m5RpTMx96ACU3tsgHsjEbkEKZhB%2B4LqOXFAaFib3OCuxyaR9fPd7M%2FZGkHXVnGIthCieDAGZf58OVufdraJ2c2SaUdG19IlzRaCEziXVQ%2F2BnVcuAe%2B9JFuYvj2po7lKjnipoXfJoY4Ma3eJatNXgK13cUKHrly7U9uAujkbRng6GPcAzDTmDlGCWprRzSDlOcZh9EGi%2BHQM7xJv531pgMRtGqSPILqwHyvmTjUEkBz3nQsXgP3dTEZtzDx4UUkI7NlEawicPpFWKPVW5BqQ5jQmQIbSpgEfA3sJrtnIYMwr9R2%2FS%2FHjlek2WzAlbFBN%2FYxmii13w%2Fdu19b5d9nQ11LnFvAYr8%2FoVblYNeuME0LGtk1%2FoazcKo7nLjcTfWxV10%2F2iAUbGt%2BtdM9m3duLjaOI72a0qe1rNn%2BGD%2FER6fC4mNkxADo%2FpZCX7718Ns%2B6HNbn4dX6UMazDSISLUFWA42rJsa56KuVrj7oqwqlmQdzPzBlS7mb95%2FnpSAEVXfZBQx4i%2BkhcHWSvJJ7Y233bdLWOlT80TWnLlnFIqaX4gtzFq%2BxdbH0kVoz%2F8gonRFRRJ11SA0eUf2Sgo0Y3Mf12VD4RBH7LhHLafCYbXLe1FDkYI9ZfNI9WI5tkMcd0F%2FF3JoaPhPgSUcDvRKqY%2Bq4W9ApKat42lX8%2FnFlAJT9t7PybxF1Lnxm1tGTgPWwTcjgzRkR6alI4ktzb2%2BQ%2B2Rp4jcYLESeEjPMf1RJAQqZ82KHoiiFLkCQH1NeUm06edss7uWpkZFBprz7MmTANni%2BNVaZy7GK7uuCDBxrxTAcbY5W1cxPCLOw6C58SPqhDNHdBKnL8MliRoCl%2BA6lJLrcTXqXjDUes0ZI9MGZ3P2mfH8uoOvf%2FUsxIG1yNcWXKGfEy%2FzhWCH%2BacH0Va6IwqNWNuyPanFFHZtqC8idEfC715483pzZ6TI1EhwVAt47gRWIgFkHJijm%2BdEhqn6kb3pKX8X2Li98sYatBFeGovV8rwitlwUkDMlgJ2zngWKfVuvtEJhUQHgEkFZLp5tfCK5pFpMzZtcOCfRRwvD10axKF6yNu%2BPpNb863Er1%2FGWZomw5ETEW8rLSC00eON8COlqwb3uw8qCqCgxQNnh4J97NJaE3xehpMdBgC8t05D80KYPNcF%2FIZVY4g%2BvQPC0KG4VIa9UZwkdy2W6laTo77LAP5RTGYdH6l7eZhS3XsLsb5OvZyQGCkEm%2BAp%2FKinB6bVytT1n0TgCKGoHOyT2eYEIUOLUC6NWzJPS4r4u4XvJTA7RnWq7bNKDvaqAa6JtFPKEjOHNkU5UlAMxl7gmJbRQMqK4ehJFXl0zda1kIRoH1l60YJVmZfjbyivV6PqeaU0HQxJEWB4LAUveGIAXvDUY0x0ZvrZW121%2FG2idVV7OTuL%2FPsbfVzxzGrySQ%2BUW0RFQAD02PvRXPuaPl83g3BdsujsE4xwD3X%2BJoR9juHfnLP7Bw51PabgVDJHN9DyFILEuglxvNUepujsScPS9vchSSYcv7PqD9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=G3Q%2BjzFaEwmal2YdOPC%2FnOr%2B60CpKL%2BgfE15Zqb9HPkaFGMGvJnJXTTJZnq%2Fk39%2BdxYr%2B%2BGxURMn%0AvQiCxIoQJALN06iIEMPVr6Ihvp%2BYBCmTxfJenbiJpr1eUUQL4fC7qmZ8xWWbuX4z882omXpcpwyJ%0A7KBZaimyq%2FRkTy4QazvrfldEuPj5x0DpDkKOVoxjZQIUn5155U%2FS1Wyb%2BUNnAoSx4vELycvxs8zj%0A1C4O189P9kDa3VkJd7CwF%2B7neTofd1L5jQBqB1JeaSgFyNhMLZ0FcUSymVM1wNbeLuvbfcSpFhCC%0AWbzr3rlL8O%2BSs1nMZcebHBrYOz7xiuhIWl8mcA%3D%3D" network 2018.06.05 15:02:02.204 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Cache-Control": "no-cache, no-store" network 2018.06.05 15:02:02.204 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Pragma": "no-cache" network 2018.06.05 15:02:02.204 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Content-Length": "0" network 2018.06.05 15:02:02.204 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Date": "Tue, 05 Jun 2018 13:02:01 GMT" network 2018.06.05 15:02:02.205 UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46) : SOP-Check( "https://eid-prod.verwalt-berlin.de:8443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= false default 2018.06.05 15:02:02.205 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:291) : SOP-Check failed, continue process default 2018.06.05 15:02:02.205 ...shAddress::sendGetRequest(core/states/StateCheckRefreshAddress.cpp:133) : Send GET request to URL: "https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1omGhJc1NIlWCSRfv1R3j7bZe%2B%2FYtXzKIMIJ9%2BPhftyDP%2F357Luf9mJZX%2BPwy1f4Z%2BjrT8WQjflrqH756nviN%2Brrn3%2F905r0HTJ9d4p1Goe1%2BOleNKzffx%2F95et7Gb6Pyfpavw9JX6zft%2By7yxj6d%2BRn6Pu0jNuYjd3Xn%2Fhi3V5Dsv32onrbpvU7CBav%2FNs9Jf85G4ehyLaf760cSbd9S4ulew0%2F5wXIvoulKhZtHLYxLFLwh2inyIrXXrjFsnfF9ue1WH%2FsX8l%2FgcgUzlCa%2BpZlJPkNS2nkGw0hybciz8uUJoqUQMqvPyn8L1%2FzIi2T7H4EQWV2z0TxbymFlN8gEk1wNCuIMsPvmcNfdPbGX77%2Bd1qgJVKW6DcYSpBvGJXR31KUzL4RCEyTEAohJVTci9b1XSjDuiXD9stXBIKpbxDxDcI9GP0OId8h%2BGeCwuKvPwV%2FMfttqK9%2FGPn7b4uXv7fw%2F27gZF2L5YdRv%2F76V2P%2BixH%2FBP6G1R%2FC%2F4qnuyXbe%2F2nv9yYFz8FSfcu%2FvcX3%2Brdi7%2B77yy7zf8V%2FPWPl0zf%2F0Hsd2HIls%2B0FTnzl53%2BR8r96bz98m%2FC%2BGRL%2FpDz48HvHnU71HEcPx%2Foz%2BNSgQgEwSCEgbez3jP%2B68YlvyGEyiJJioxC7l9GJUVRkCRNwkWGUCmZoujXn7zPdKv%2Bf5QndEVfDNsN3N%2Fv7AbCKLZ6zH9iumpcXlvd%2F1%2FISooVRm6nTbMfdszX71rxUYZy%2FEPDfP03MiAQon%2Fol6%2Bv6r%2F%2BaSdFfgv5XWcMh1AExnIMhfGMxrPbZTMcT9AMxm9bpNT%2FFx2WNfkG%2Fzf%2Bjwr8pswTh%2BgfeP31D%2FfDY8tXlmzFr4ai8BfPccziVsyhsEylcIxtHLwdqdoYK%2FWePRhb0FmbOap4PLmLUdnqEbBM5DGtIxo29WMuH9i28kU4Yi5%2BqmsSYid%2FMY%2FfJ2Ye26pd1p9T2gi%2BwSoSA%2FsCVxu6GzhC%2BGL%2FtoZntN%2FXrN4XBgqkRyO8DI75bQFzHLEPiQ9PpLsktLdMVveYw5sUwd9x%2BICeUGDal1AbLCVx7iy5SorytqAyTuR%2BicOutaUOiuVxi%2Frgk0rdW%2B%2BdzmCxJ%2B8JqOEJx%2BMSYONSDkMc7zHln8f%2Bqv6Xf6f%2Ff6L%2Bl3%2Bn%2F3%2Bi%2Fpd%2Fp%2F%2B%2FVV9RWKX5AVQ71%2B1Log%2BIvdEWGcbkvjA2xdzuwXKVdruEwCDmx0qVZM8L2S1BnqEOzaSj0vE%2FCMYpeJ5g8Mt8VoMejGDC2ZV%2FbVhjKS54NswXWdWvSCAcUgkkLrMvzS6u5OR92jYbRx8NwV0JvoiCp5yYPSXSgf1g9vSTowXQuDH6LEz9kyKbhqr78OVdgWEaz5ZRBBvIiMqSJQWypmf7IeO9cos69hqv4SN3DFiFe5%2B%2B3UKPtxsNqes0yb7UnICPTJzjWDt%2BoVQLx72Qd89zJGepw0BEtUMkB5x0%2BchYdQxCoQ3kGJSQusjICyRmAWEr39CCxsLiPa3Yc4DDyjM%2B4hes0KYqj5ENwAVG3RbfEodYwKIkEEj5k%2BOF3%2BCpH7ErRfEYfLYYAyb9ofCMzbDjOR4S%2F%2Fvxkh1D%2BMI0DGMw6w%2Fvz%2FnjRuBQhJb%2FZ7TW39D6AdBiPULGBy4%2BGZ0l1eWpAedaGxJKFYIvTlOXM05SiwQSw4M%2BptLvS8iDWwFbOZGR38uspg6ZSaXglKkC1E%2BHiJyGqOCNad5ocFWj8Xgj43ukqy8YChB025fNUx7oih%2FaaSgJEGc23mZGIx9nqT5ltiiXgBx2HIja1%2FZOB971YhbQLF2jwUOm8g3pwaj4Qr%2FN6xC33IwNSIWRZ%2FkUNNWufSrJAT9m8762%2FO08AUI4ziwG6hOkiZxTqUr2JGmtxsONiEI3URZY3l%2BKbR5f4diR91b2%2FuV%2BAHV8FcZGo1nv6HRryBHGaBrUj6zhayWIWO%2BGUGEbsaDc0lJUx99qSW8X3onclywviYCMnO745Zc%2FgX%2BE0r%2BPnn8d%2FD2%2B%2FpjyR%2Br4Iy1xr6kult%2Bf%2Fpanfh%2F4Lb%2F%2Fqqgpl6z81hWV8uqiajqKdKy9AtAAypaf4TptjOlv6dB0AeRJRNLH8UauVSXOTt9Rz563yP5EOdG4%2BMP9FNT%2BbLNLemkRrc5NYCHj4Apy26CgKZmNLM4vYY%2FM1ZFhZXqKByoGJHsV2h4Rk7VD9ExXnvmQp8%2FTt0wIlIZBC8tYljfBGFOJ6Do6%2F2RPTV9YGvtMTLRICNu8wustpA8HcXqTmMMZMvoN3OJjer4Y1%2FrI6id0WehpQsCjRKrrqe7soqhGuYO96g0PgW0alEfMKwxPowttXK30Ku41BGW0ZHWbD%2FoYeVgmMWs7iUtlnu2QN1rSa2UlhE6nWLsQlSaTsyO9PrIEj2b7B1T%2FYup%2FGPoDrH9kNDdu%2F88APqaKHjP1iOGV7WV1CT6Fzeb5C0AVjUvx1hFkamNo3eS1BNarvpvuWJpERZPQXhfVE47EJr9reV%2FcoYa05ey9TEXdCngzIW3XuZdIVUhgNxGo0BidjPlUNEP%2B2F388%2BBoT7qNZTX1KZC47H6UQJM9%2FxAfE6mhsT7FnnJHFX4lF76nYsCaXD8tSJfZZkK7ameTL2oZHq3zvpwu4XWFXl5v29aYPG0e0PpcZ%2BQjlItsPcMm6Ci5hjpjvaatp65NKoB25qieuQGkaCCmNqPmTrHKia6h0Zez0ImNyysD61OAO4R%2B%2BUZFKlpUVesdDGN9k9n8gD%2B4pqN%2B%2BhAbrY%2B6g4TcApMlx4tnB1C3XW7PA%2BwjVim8Rk1JjVgT34e3lkQkccLGAH0oLUFP4pM2fYkUTsKTRxF%2B7RXpLXNT8PlmHOGD5%2BjPnknqqge7KuPN%2BjnKcnyHuvd4hYLD%2BMfEP%2Fi0aUxlnKfyzW1jh6jp3iiSYD6A%2Bn2NF7sB5fy0zkyeRm8x3irt%2Bwoz9tpsiVRp4XRb2D1jb6CPrA%2BQkL046N92Jk2PPisjiFr4zXm8lqbxYQUje2qi65TEx9eypfEAHow5l%2F6T18agSQGfpbo8ArIXQ34u1ICf49G2uypMJpcVG0KXx5Gw%2FqR7DZs3K1NYnsuXXkV76XR1ZqH0llcfHAUlu2ppuezOC9zUh4mPdManoJCvF1d1rE8VH2jgzx5JpxNYmw%2BdohrwLuPm0WLnY%2FAoyh%2BrzHyMXblg44hlAkbEiKcqKuCSDMFGYzLxAB1U2lCu3Xp81oLIkfJKz3Ij97r71Lyu3mCfd%2Fatn6WlWx9OUxaZDODAQBYmxJPepcUFK4WdFV3Xk7bxrA3b9R7Y5O%2Fqna1L9CMAdJKpioe%2FN2eKmc3zGWGIacHbrfequYLdawD3THMzQ6cNXO%2FgoJSYy2n69alsYZRln41lFvC1bN36wa4cE6cVZus2GmRVx3bSIIqCEK7AR0RL21p4JUJGInx9LqNqDbhtNDzj5b65QDDfgNUQ6isciEcsr1W%2FPDbUDd7Fi9Zo%2BjWBui2cITlIueA6L15VcijVLY8OP1NYFnQExvK8bGWPCPIrdMH4rUOZGIjK6Pj1MUfJZQGZK6rdmqDOjGxg%2FcmEqNsZsqRJnu4c9o0tchMfg%2FwSQacGkDcCX1DkDNo7sq3AmOvi6fYsMT%2BCjNLWfFIzJS6R5YWlSGm6iGLE4Z0w3NU5rcknujJsOWiTpYaU56dYEGrKilGhdJP7Nm82hmcdahoh7iYC2NcSDUu25ui1JcvDOsWfYCJS9dIVnFBeYVi1aDigT3zpGonQcH9GC%2BOEAZ3tWDQ0jXfxXKwM1io0dJuxwKUtc1g%2BuzMPAvlNIAIiU7erH064Fu8Uig9P3t605nY2XRRj72TQ9oPWBGmTOikxTXUl7ye10O3oY7JBo2COLTBHMCgVvgy39wFeJik4oCKdVkjlvCRDX9XkWAGJN1haWrGgFea1UwkMRuoKGHEeW3WRgfkKTxm32iwxiTfKfHQq2rUkzdaOQhFkG4OaCI83e5PZjTQvaO%2FX%2FcQep6MYSPVY%2BkIrurFFxL032QTQ2Lw8BCVzaucO885LWYPhIa%2FDefupJgRc5Yy5thX4VS%2BuhcT9IwOkT4DTpjJAdzn08UhOLY69lBV1HCDB6X1fsEHokkRvwcD0KZL%2BakM6985FqBgE6vOo8BvYE%2BEtu%2FNJz31MZZI8dzR%2Fogmtr3ceat4M6%2Bawvpl18FJkpVRopIR1dmw9iYcvwCum%2BVG1vh5bpMgdQQcM5hF5uEoasKqsNk%2BSHySpeSZ%2F8WOTUqi59YAKB4zlpu6rLMuluGO7GG0T%2FYkg63gO8eqnb9C69GybnsBxwmJTeEmP7zWAhviaWJiNtLX%2BKFyOsciFWAoZQ0jrcgUpIdDXDIQSPw5CqlWqQufwMkcRlbjSxQpBks73cZ6eIbRMDESpu4H1N6fAX3U8SXxaJTkpNp95pAkIq12aDtqwBZo7%2FP2IcymvCdLMvVXAGPEMuJ5YYXvLZRIfGkZOjTsyBjfpaQA1qq0GqN%2BAQ%2FTdUvMkl8ZbleY%2BvlI2A4qpudVp0rIDKYNZlKLYU9QSzV7ndymJluFdlN4xQ1Le5qcEw1FjVrhIZsApniz0GtibgnKF5%2BvN8py5FeNn1cx01vc11ABMD2It4ROX7vvdkhWN6qgUPcsYlXptVe86ZvnEGntiDmxfkk3Ne6i9vPHNDTEUOsFYBd4j0tlCeJmGpFsZnZl%2Br7YqhGuiiDJvQE%2BYR7PV73BDkV1dWVM9nzLRTuiBgjiJ05NVYQsKd490Z4M4Cww8Jug64WCCE20VGSCG9UFo%2FjTIMeK%2B%2BiQMHC1FUN622LqZJOmXz3BE%2BNeWdKPHQAoz9zwXEIUlZPGOOV0ZoHo6T2j3ICBiLq5tMgJLn5%2FpYT2x%2FHKZhH551jQr6va%2BFu1lNzQ%2FcNzZBe%2B9skHTyAqMSQt7N8oPHW%2FgM7E0bKFxhH2Yj1UZinIbpXKNpYW58IH2zBct1pWJpXyTK1YDlfXwNO8eJ00PLXBnynf8CgAni4SyDcyAbTFRPh93hblCgb5wx1s%2FdXdHmzpdGJibJjJnzqOUFt4GYfolczF3RsSR509T56f6tNjVPIscUo8zEmprXZ448RCDNiL0M6zJp03me8YvpnlNuRQeT9KjsSoKk9Xo54VJu903cF9ZALlFdISoZsq%2F6CTS1vZmA0HmTNpjm%2FQPHTm49%2By09kls6mHgK%2Fnm8iWDNjASGck4nQx87JQsj9yQBnNzUyiSMQ6Y8i07P2eJm2%2Bwqrt674qDRVbMZ7L6nBwqswuABGQAaEbVl4AomqcKvugo8vTzuek3tS1YFNgsOsa02YN2blX9RD%2BYLMikx4iubMAZcvfarKM4FlicBCWnG2FM81W26Rl1Syw22b3vPiOVILjIfaDGVlyyWSmfB4jSZ14R5bZ9w8SRE0j8qSxq44uP4YmeWVi6IfJpFYujWJwQZ7DcifdU8%2BuJ0PXY%2By8EAm2RFu3eu4y%2BUSdp2boLm9vXIr4mY0ngEU1C6RBAd7M3lOyJkAsCeEdOZHq7z8Kbbp5l3PXVcDZxVr%2FvLrn1jNVO8bIonfok06NGWRuzMTYLH0YkEduiJBFAIjGTioDoU9JAsISQbcoKJFCrJ4NW%2BUQ8qcYz59klqHtTsmJEFMYiKm2tFwdWXYrsoE7tZr591h2xk9H7wHH1eTcdXIXI7AqyyBD0mMMer9nXkKSoPSM01AiGySSrPCXCbDmm3Lr%2ByMjcCKiLNpA7GpxBOSVhYENpLSxRm6B1Cg3jrLAlTrHqfG7eXp%2Fmo9Us0BAeoloPGMLiB1UrCR3hR640Jk25wJjVtX%2BEIXIzn5xF4BesfzY3nB8kKlbVG0KFqb9AOwM6nPLVmnDuiOm0Pjm2slgCnJyU8BnnvqzniXCkZ2FqpSRLBInVTgk%2FlLoeqE08kbf%2FKTDomh5a2yOr9znHvEPog0U1li9LslRyxJWNl0fwL%2FX9OuRrSaJ3NDhTwn1sDX2thMFygliPRgqoVXPCYDdD6RQH8mjoVLokuCO%2Fpb26af%2Foi3PknaxWFFIw1v3zwp2OTA6IOn3sgAeyo4lgGNlcf0nd0i%2Fledbra3otTD2u9VG1Bc%2BUnxcD%2BXQr75%2FYfgmtUUs4H4o0ZprjHMf005TwRX3iLlLdBW0J3hlghzdAXxWRHe9zO5DkEEyNeSfvAvI3LfDyyXYt%2BcGNrK4D%2FLsL4zTweceK7gxhMQMzcuYa6ILjHcwEuo9HgeQCr5tSEi1LqHbaCzs5l7ClClSQxVgJ0wlREZM67Wl%2Bxhdxd2ETwM39rGsvZztSlc%2BLSG0w387dPhRs3S9VdngzBTVnva08Hufq0u%2BtCxAh9pXj8k4ZqihXLoIypZZdYC8QMwscj6%2BzSUaxz%2FxssrLxZA0MpfYwzJQUvlvStA67MwAuA3EdbapgbOFFxDr%2FqEgROQNtq0eIdQLuTgLUKnbYgiRJClGIev5YbB38PgNyAaYrZ40kqZiAMevPaFF0DemgvZgh8dGW%2BdhK3hwpGVr2NKN15dnCCKspkJ3FGLrV1UPrV2W1iuQVl54K3mQH%2FSAVzvjWvAy4JLLiyjiKQGfec2nJkX2SSj6M3gXX08qipBY6NBlbjUm2Q5SRO7sa2247diQG3HbakAB2HHuElnofF%2F%2BU2GBd9yeCO9ETtVxfQlT%2FDpof7PUKYhcwSLJ4bss2B3hwFWgmMPX%2BKFAq5VtY7UD08fTYgGoh6RjgMgOQkCFgeZyG83152LStP9otZgKL56OLyeEoi%2FbmcmTF2g2wSZKovKm3eITbrjdWx8DuQxpb9toQcnw0iPICwn3PObDK86HKo6HiriQbw1cSwFKgBDSj0Pu0WMnxGHMOys%2Faxawn9%2BDuFgzTJHFL9sJka9MWjyM6r2%2BEIYoXSy4sKlSISuzGodxEqd%2BCAMHuV%2BWQKUq%2B%2F0kgyCHENn%2BvQtD4YacEtZG3BRJzzDjrd3tTOuWGfxfxDi%2FZY7H1m5RpTMx96ACU3tsgHsjEbkEKZhB%2B4LqOXFAaFib3OCuxyaR9fPd7M%2FZGkHXVnGIthCieDAGZf58OVufdraJ2c2SaUdG19IlzRaCEziXVQ%2F2BnVcuAe%2B9JFuYvj2po7lKjnipoXfJoY4Ma3eJatNXgK13cUKHrly7U9uAujkbRng6GPcAzDTmDlGCWprRzSDlOcZh9EGi%2BHQM7xJv531pgMRtGqSPILqwHyvmTjUEkBz3nQsXgP3dTEZtzDx4UUkI7NlEawicPpFWKPVW5BqQ5jQmQIbSpgEfA3sJrtnIYMwr9R2%2FS%2FHjlek2WzAlbFBN%2FYxmii13w%2Fdu19b5d9nQ11LnFvAYr8%2FoVblYNeuME0LGtk1%2FoazcKo7nLjcTfWxV10%2F2iAUbGt%2BtdM9m3duLjaOI72a0qe1rNn%2BGD%2FER6fC4mNkxADo%2FpZCX7718Ns%2B6HNbn4dX6UMazDSISLUFWA42rJsa56KuVrj7oqwqlmQdzPzBlS7mb95%2FnpSAEVXfZBQx4i%2BkhcHWSvJJ7Y233bdLWOlT80TWnLlnFIqaX4gtzFq%2BxdbH0kVoz%2F8gonRFRRJ11SA0eUf2Sgo0Y3Mf12VD4RBH7LhHLafCYbXLe1FDkYI9ZfNI9WI5tkMcd0F%2FF3JoaPhPgSUcDvRKqY%2Bq4W9ApKat42lX8%2FnFlAJT9t7PybxF1Lnxm1tGTgPWwTcjgzRkR6alI4ktzb2%2BQ%2B2Rp4jcYLESeEjPMf1RJAQqZ82KHoiiFLkCQH1NeUm06edss7uWpkZFBprz7MmTANni%2BNVaZy7GK7uuCDBxrxTAcbY5W1cxPCLOw6C58SPqhDNHdBKnL8MliRoCl%2BA6lJLrcTXqXjDUes0ZI9MGZ3P2mfH8uoOvf%2FUsxIG1yNcWXKGfEy%2FzhWCH%2BacH0Va6IwqNWNuyPanFFHZtqC8idEfC715483pzZ6TI1EhwVAt47gRWIgFkHJijm%2BdEhqn6kb3pKX8X2Li98sYatBFeGovV8rwitlwUkDMlgJ2zngWKfVuvtEJhUQHgEkFZLp5tfCK5pFpMzZtcOCfRRwvD10axKF6yNu%2BPpNb863Er1%2FGWZomw5ETEW8rLSC00eON8COlqwb3uw8qCqCgxQNnh4J97NJaE3xehpMdBgC8t05D80KYPNcF%2FIZVY4g%2BvQPC0KG4VIa9UZwkdy2W6laTo77LAP5RTGYdH6l7eZhS3XsLsb5OvZyQGCkEm%2BAp%2FKinB6bVytT1n0TgCKGoHOyT2eYEIUOLUC6NWzJPS4r4u4XvJTA7RnWq7bNKDvaqAa6JtFPKEjOHNkU5UlAMxl7gmJbRQMqK4ehJFXl0zda1kIRoH1l60YJVmZfjbyivV6PqeaU0HQxJEWB4LAUveGIAXvDUY0x0ZvrZW121%2FG2idVV7OTuL%2FPsbfVzxzGrySQ%2BUW0RFQAD02PvRXPuaPl83g3BdsujsE4xwD3X%2BJoR9juHfnLP7Bw51PabgVDJHN9DyFILEuglxvNUepujsScPS9vchSSYcv7PqD9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=G3Q%2BjzFaEwmal2YdOPC%2FnOr%2B60CpKL%2BgfE15Zqb9HPkaFGMGvJnJXTTJZnq%2Fk39%2BdxYr%2B%2BGxURMn%0AvQiCxIoQJALN06iIEMPVr6Ihvp%2BYBCmTxfJenbiJpr1eUUQL4fC7qmZ8xWWbuX4z882omXpcpwyJ%0A7KBZaimyq%2FRkTy4QazvrfldEuPj5x0DpDkKOVoxjZQIUn5155U%2FS1Wyb%2BUNnAoSx4vELycvxs8zj%0A1C4O189P9kDa3VkJd7CwF%2B7neTofd1L5jQBqB1JeaSgFyNhMLZ0FcUSymVM1wNbeLuvbfcSpFhCC%0AWbzr3rlL8O%2BSs1nMZcebHBrYOz7xiuhIWl8mcA%3D%3D" network 2018.06.05 15:02:02.205 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "eid-prod.connect.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1omGhJc1NIlWCSRfv1R3j7bZe%2B%2FYtXzKIMIJ9%2BPhftyDP%2F357Luf9mJZX%2BPwy1f4Z%2BjrT8WQjflrqH756nviN%2Brrn3%2F905r0HTJ9d4p1Goe1%2BOleNKzffx%2F95et7Gb6Pyfpavw9JX6zft%2By7yxj6d%2BRn6Pu0jNuYjd3Xn%2Fhi3V5Dsv32onrbpvU7CBav%2FNs9Jf85G4ehyLaf760cSbd9S4ulew0%2F5wXIvoulKhZtHLYxLFLwh2inyIrXXrjFsnfF9ue1WH%2FsX8l%2FgcgUzlCa%2BpZlJPkNS2nkGw0hybciz8uUJoqUQMqvPyn8L1%2FzIi2T7H4EQWV2z0TxbymFlN8gEk1wNCuIMsPvmcNfdPbGX77%2Bd1qgJVKW6DcYSpBvGJXR31KUzL4RCEyTEAohJVTci9b1XSjDuiXD9stXBIKpbxDxDcI9GP0OId8h%2BGeCwuKvPwV%2FMfttqK9%2FGPn7b4uXv7fw%2F27gZF2L5YdRv%2F76V2P%2BixH%2FBP6G1R%2FC%2F4qnuyXbe%2F2nv9yYFz8FSfcu%2FvcX3%2Brdi7%2B77yy7zf8V%2FPWPl0zf%2F0Hsd2HIls%2B0FTnzl53%2BR8r96bz98m%2FC%2BGRL%2FpDz48HvHnU71HEcPx%2Foz%2BNSgQgEwSCEgbez3jP%2B68YlvyGEyiJJioxC7l9GJUVRkCRNwkWGUCmZoujXn7zPdKv%2Bf5QndEVfDNsN3N%2Fv7AbCKLZ6zH9iumpcXlvd%2F1%2FISooVRm6nTbMfdszX71rxUYZy%2FEPDfP03MiAQon%2Fol6%2Bv6r%2F%2BaSdFfgv5XWcMh1AExnIMhfGMxrPbZTMcT9AMxm9bpNT%2FFx2WNfkG%2Fzf%2Bjwr8pswTh%2BgfeP31D%2FfDY8tXlmzFr4ai8BfPccziVsyhsEylcIxtHLwdqdoYK%2FWePRhb0FmbOap4PLmLUdnqEbBM5DGtIxo29WMuH9i28kU4Yi5%2BqmsSYid%2FMY%2FfJ2Ye26pd1p9T2gi%2BwSoSA%2FsCVxu6GzhC%2BGL%2FtoZntN%2FXrN4XBgqkRyO8DI75bQFzHLEPiQ9PpLsktLdMVveYw5sUwd9x%2BICeUGDal1AbLCVx7iy5SorytqAyTuR%2BicOutaUOiuVxi%2Frgk0rdW%2B%2BdzmCxJ%2B8JqOEJx%2BMSYONSDkMc7zHln8f%2Bqv6Xf6f%2Ff6L%2Bl3%2Bn%2F3%2Bi%2Fpd%2Fp%2F%2B%2FVV9RWKX5AVQ71%2B1Log%2BIvdEWGcbkvjA2xdzuwXKVdruEwCDmx0qVZM8L2S1BnqEOzaSj0vE%2FCMYpeJ5g8Mt8VoMejGDC2ZV%2FbVhjKS54NswXWdWvSCAcUgkkLrMvzS6u5OR92jYbRx8NwV0JvoiCp5yYPSXSgf1g9vSTowXQuDH6LEz9kyKbhqr78OVdgWEaz5ZRBBvIiMqSJQWypmf7IeO9cos69hqv4SN3DFiFe5%2B%2B3UKPtxsNqes0yb7UnICPTJzjWDt%2BoVQLx72Qd89zJGepw0BEtUMkB5x0%2BchYdQxCoQ3kGJSQusjICyRmAWEr39CCxsLiPa3Yc4DDyjM%2B4hes0KYqj5ENwAVG3RbfEodYwKIkEEj5k%2BOF3%2BCpH7ErRfEYfLYYAyb9ofCMzbDjOR4S%2F%2Fvxkh1D%2BMI0DGMw6w%2Fvz%2FnjRuBQhJb%2FZ7TW39D6AdBiPULGBy4%2BGZ0l1eWpAedaGxJKFYIvTlOXM05SiwQSw4M%2BptLvS8iDWwFbOZGR38uspg6ZSaXglKkC1E%2BHiJyGqOCNad5ocFWj8Xgj43ukqy8YChB025fNUx7oih%2FaaSgJEGc23mZGIx9nqT5ltiiXgBx2HIja1%2FZOB971YhbQLF2jwUOm8g3pwaj4Qr%2FN6xC33IwNSIWRZ%2FkUNNWufSrJAT9m8762%2FO08AUI4ziwG6hOkiZxTqUr2JGmtxsONiEI3URZY3l%2BKbR5f4diR91b2%2FuV%2BAHV8FcZGo1nv6HRryBHGaBrUj6zhayWIWO%2BGUGEbsaDc0lJUx99qSW8X3onclywviYCMnO745Zc%2FgX%2BE0r%2BPnn8d%2FD2%2B%2FpjyR%2Br4Iy1xr6kult%2Bf%2Fpanfh%2F4Lb%2F%2Fqqgpl6z81hWV8uqiajqKdKy9AtAAypaf4TptjOlv6dB0AeRJRNLH8UauVSXOTt9Rz563yP5EOdG4%2BMP9FNT%2BbLNLemkRrc5NYCHj4Apy26CgKZmNLM4vYY%2FM1ZFhZXqKByoGJHsV2h4Rk7VD9ExXnvmQp8%2FTt0wIlIZBC8tYljfBGFOJ6Do6%2F2RPTV9YGvtMTLRICNu8wustpA8HcXqTmMMZMvoN3OJjer4Y1%2FrI6id0WehpQsCjRKrrqe7soqhGuYO96g0PgW0alEfMKwxPowttXK30Ku41BGW0ZHWbD%2FoYeVgmMWs7iUtlnu2QN1rSa2UlhE6nWLsQlSaTsyO9PrIEj2b7B1T%2FYup%2FGPoDrH9kNDdu%2F88APqaKHjP1iOGV7WV1CT6Fzeb5C0AVjUvx1hFkamNo3eS1BNarvpvuWJpERZPQXhfVE47EJr9reV%2FcoYa05ey9TEXdCngzIW3XuZdIVUhgNxGo0BidjPlUNEP%2B2F388%2BBoT7qNZTX1KZC47H6UQJM9%2FxAfE6mhsT7FnnJHFX4lF76nYsCaXD8tSJfZZkK7ameTL2oZHq3zvpwu4XWFXl5v29aYPG0e0PpcZ%2BQjlItsPcMm6Ci5hjpjvaatp65NKoB25qieuQGkaCCmNqPmTrHKia6h0Zez0ImNyysD61OAO4R%2B%2BUZFKlpUVesdDGN9k9n8gD%2B4pqN%2B%2BhAbrY%2B6g4TcApMlx4tnB1C3XW7PA%2BwjVim8Rk1JjVgT34e3lkQkccLGAH0oLUFP4pM2fYkUTsKTRxF%2B7RXpLXNT8PlmHOGD5%2BjPnknqqge7KuPN%2BjnKcnyHuvd4hYLD%2BMfEP%2Fi0aUxlnKfyzW1jh6jp3iiSYD6A%2Bn2NF7sB5fy0zkyeRm8x3irt%2Bwoz9tpsiVRp4XRb2D1jb6CPrA%2BQkL046N92Jk2PPisjiFr4zXm8lqbxYQUje2qi65TEx9eypfEAHow5l%2F6T18agSQGfpbo8ArIXQ34u1ICf49G2uypMJpcVG0KXx5Gw%2FqR7DZs3K1NYnsuXXkV76XR1ZqH0llcfHAUlu2ppuezOC9zUh4mPdManoJCvF1d1rE8VH2jgzx5JpxNYmw%2BdohrwLuPm0WLnY%2FAoyh%2BrzHyMXblg44hlAkbEiKcqKuCSDMFGYzLxAB1U2lCu3Xp81oLIkfJKz3Ij97r71Lyu3mCfd%2Fatn6WlWx9OUxaZDODAQBYmxJPepcUFK4WdFV3Xk7bxrA3b9R7Y5O%2Fqna1L9CMAdJKpioe%2FN2eKmc3zGWGIacHbrfequYLdawD3THMzQ6cNXO%2FgoJSYy2n69alsYZRln41lFvC1bN36wa4cE6cVZus2GmRVx3bSIIqCEK7AR0RL21p4JUJGInx9LqNqDbhtNDzj5b65QDDfgNUQ6isciEcsr1W%2FPDbUDd7Fi9Zo%2BjWBui2cITlIueA6L15VcijVLY8OP1NYFnQExvK8bGWPCPIrdMH4rUOZGIjK6Pj1MUfJZQGZK6rdmqDOjGxg%2FcmEqNsZsqRJnu4c9o0tchMfg%2FwSQacGkDcCX1DkDNo7sq3AmOvi6fYsMT%2BCjNLWfFIzJS6R5YWlSGm6iGLE4Z0w3NU5rcknujJsOWiTpYaU56dYEGrKilGhdJP7Nm82hmcdahoh7iYC2NcSDUu25ui1JcvDOsWfYCJS9dIVnFBeYVi1aDigT3zpGonQcH9GC%2BOEAZ3tWDQ0jXfxXKwM1io0dJuxwKUtc1g%2BuzMPAvlNIAIiU7erH064Fu8Uig9P3t605nY2XRRj72TQ9oPWBGmTOikxTXUl7ye10O3oY7JBo2COLTBHMCgVvgy39wFeJik4oCKdVkjlvCRDX9XkWAGJN1haWrGgFea1UwkMRuoKGHEeW3WRgfkKTxm32iwxiTfKfHQq2rUkzdaOQhFkG4OaCI83e5PZjTQvaO%2FX%2FcQep6MYSPVY%2BkIrurFFxL032QTQ2Lw8BCVzaucO885LWYPhIa%2FDefupJgRc5Yy5thX4VS%2BuhcT9IwOkT4DTpjJAdzn08UhOLY69lBV1HCDB6X1fsEHokkRvwcD0KZL%2BakM6985FqBgE6vOo8BvYE%2BEtu%2FNJz31MZZI8dzR%2Fogmtr3ceat4M6%2Bawvpl18FJkpVRopIR1dmw9iYcvwCum%2BVG1vh5bpMgdQQcM5hF5uEoasKqsNk%2BSHySpeSZ%2F8WOTUqi59YAKB4zlpu6rLMuluGO7GG0T%2FYkg63gO8eqnb9C69GybnsBxwmJTeEmP7zWAhviaWJiNtLX%2BKFyOsciFWAoZQ0jrcgUpIdDXDIQSPw5CqlWqQufwMkcRlbjSxQpBks73cZ6eIbRMDESpu4H1N6fAX3U8SXxaJTkpNp95pAkIq12aDtqwBZo7%2FP2IcymvCdLMvVXAGPEMuJ5YYXvLZRIfGkZOjTsyBjfpaQA1qq0GqN%2BAQ%2FTdUvMkl8ZbleY%2BvlI2A4qpudVp0rIDKYNZlKLYU9QSzV7ndymJluFdlN4xQ1Le5qcEw1FjVrhIZsApniz0GtibgnKF5%2BvN8py5FeNn1cx01vc11ABMD2It4ROX7vvdkhWN6qgUPcsYlXptVe86ZvnEGntiDmxfkk3Ne6i9vPHNDTEUOsFYBd4j0tlCeJmGpFsZnZl%2Br7YqhGuiiDJvQE%2BYR7PV73BDkV1dWVM9nzLRTuiBgjiJ05NVYQsKd490Z4M4Cww8Jug64WCCE20VGSCG9UFo%2FjTIMeK%2B%2BiQMHC1FUN622LqZJOmXz3BE%2BNeWdKPHQAoz9zwXEIUlZPGOOV0ZoHo6T2j3ICBiLq5tMgJLn5%2FpYT2x%2FHKZhH551jQr6va%2BFu1lNzQ%2FcNzZBe%2B9skHTyAqMSQt7N8oPHW%2FgM7E0bKFxhH2Yj1UZinIbpXKNpYW58IH2zBct1pWJpXyTK1YDlfXwNO8eJ00PLXBnynf8CgAni4SyDcyAbTFRPh93hblCgb5wx1s%2FdXdHmzpdGJibJjJnzqOUFt4GYfolczF3RsSR509T56f6tNjVPIscUo8zEmprXZ448RCDNiL0M6zJp03me8YvpnlNuRQeT9KjsSoKk9Xo54VJu903cF9ZALlFdISoZsq%2F6CTS1vZmA0HmTNpjm%2FQPHTm49%2By09kls6mHgK%2Fnm8iWDNjASGck4nQx87JQsj9yQBnNzUyiSMQ6Y8i07P2eJm2%2Bwqrt674qDRVbMZ7L6nBwqswuABGQAaEbVl4AomqcKvugo8vTzuek3tS1YFNgsOsa02YN2blX9RD%2BYLMikx4iubMAZcvfarKM4FlicBCWnG2FM81W26Rl1Syw22b3vPiOVILjIfaDGVlyyWSmfB4jSZ14R5bZ9w8SRE0j8qSxq44uP4YmeWVi6IfJpFYujWJwQZ7DcifdU8%2BuJ0PXY%2By8EAm2RFu3eu4y%2BUSdp2boLm9vXIr4mY0ngEU1C6RBAd7M3lOyJkAsCeEdOZHq7z8Kbbp5l3PXVcDZxVr%2FvLrn1jNVO8bIonfok06NGWRuzMTYLH0YkEduiJBFAIjGTioDoU9JAsISQbcoKJFCrJ4NW%2BUQ8qcYz59klqHtTsmJEFMYiKm2tFwdWXYrsoE7tZr591h2xk9H7wHH1eTcdXIXI7AqyyBD0mMMer9nXkKSoPSM01AiGySSrPCXCbDmm3Lr%2ByMjcCKiLNpA7GpxBOSVhYENpLSxRm6B1Cg3jrLAlTrHqfG7eXp%2Fmo9Us0BAeoloPGMLiB1UrCR3hR640Jk25wJjVtX%2BEIXIzn5xF4BesfzY3nB8kKlbVG0KFqb9AOwM6nPLVmnDuiOm0Pjm2slgCnJyU8BnnvqzniXCkZ2FqpSRLBInVTgk%2FlLoeqE08kbf%2FKTDomh5a2yOr9znHvEPog0U1li9LslRyxJWNl0fwL%2FX9OuRrSaJ3NDhTwn1sDX2thMFygliPRgqoVXPCYDdD6RQH8mjoVLokuCO%2Fpb26af%2Foi3PknaxWFFIw1v3zwp2OTA6IOn3sgAeyo4lgGNlcf0nd0i%2Fledbra3otTD2u9VG1Bc%2BUnxcD%2BXQr75%2FYfgmtUUs4H4o0ZprjHMf005TwRX3iLlLdBW0J3hlghzdAXxWRHe9zO5DkEEyNeSfvAvI3LfDyyXYt%2BcGNrK4D%2FLsL4zTweceK7gxhMQMzcuYa6ILjHcwEuo9HgeQCr5tSEi1LqHbaCzs5l7ClClSQxVgJ0wlREZM67Wl%2Bxhdxd2ETwM39rGsvZztSlc%2BLSG0w387dPhRs3S9VdngzBTVnva08Hufq0u%2BtCxAh9pXj8k4ZqihXLoIypZZdYC8QMwscj6%2BzSUaxz%2FxssrLxZA0MpfYwzJQUvlvStA67MwAuA3EdbapgbOFFxDr%2FqEgROQNtq0eIdQLuTgLUKnbYgiRJClGIev5YbB38PgNyAaYrZ40kqZiAMevPaFF0DemgvZgh8dGW%2BdhK3hwpGVr2NKN15dnCCKspkJ3FGLrV1UPrV2W1iuQVl54K3mQH%2FSAVzvjWvAy4JLLiyjiKQGfec2nJkX2SSj6M3gXX08qipBY6NBlbjUm2Q5SRO7sa2247diQG3HbakAB2HHuElnofF%2F%2BU2GBd9yeCO9ETtVxfQlT%2FDpof7PUKYhcwSLJ4bss2B3hwFWgmMPX%2BKFAq5VtY7UD08fTYgGoh6RjgMgOQkCFgeZyG83152LStP9otZgKL56OLyeEoi%2FbmcmTF2g2wSZKovKm3eITbrjdWx8DuQxpb9toQcnw0iPICwn3PObDK86HKo6HiriQbw1cSwFKgBDSj0Pu0WMnxGHMOys%2Faxawn9%2BDuFgzTJHFL9sJka9MWjyM6r2%2BEIYoXSy4sKlSISuzGodxEqd%2BCAMHuV%2BWQKUq%2B%2F0kgyCHENn%2BvQtD4YacEtZG3BRJzzDjrd3tTOuWGfxfxDi%2FZY7H1m5RpTMx96ACU3tsgHsjEbkEKZhB%2B4LqOXFAaFib3OCuxyaR9fPd7M%2FZGkHXVnGIthCieDAGZf58OVufdraJ2c2SaUdG19IlzRaCEziXVQ%2F2BnVcuAe%2B9JFuYvj2po7lKjnipoXfJoY4Ma3eJatNXgK13cUKHrly7U9uAujkbRng6GPcAzDTmDlGCWprRzSDlOcZh9EGi%2BHQM7xJv531pgMRtGqSPILqwHyvmTjUEkBz3nQsXgP3dTEZtzDx4UUkI7NlEawicPpFWKPVW5BqQ5jQmQIbSpgEfA3sJrtnIYMwr9R2%2FS%2FHjlek2WzAlbFBN%2FYxmii13w%2Fdu19b5d9nQ11LnFvAYr8%2FoVblYNeuME0LGtk1%2FoazcKo7nLjcTfWxV10%2F2iAUbGt%2BtdM9m3duLjaOI72a0qe1rNn%2BGD%2FER6fC4mNkxADo%2FpZCX7718Ns%2B6HNbn4dX6UMazDSISLUFWA42rJsa56KuVrj7oqwqlmQdzPzBlS7mb95%2FnpSAEVXfZBQx4i%2BkhcHWSvJJ7Y233bdLWOlT80TWnLlnFIqaX4gtzFq%2BxdbH0kVoz%2F8gonRFRRJ11SA0eUf2Sgo0Y3Mf12VD4RBH7LhHLafCYbXLe1FDkYI9ZfNI9WI5tkMcd0F%2FF3JoaPhPgSUcDvRKqY%2Bq4W9ApKat42lX8%2FnFlAJT9t7PybxF1Lnxm1tGTgPWwTcjgzRkR6alI4ktzb2%2BQ%2B2Rp4jcYLESeEjPMf1RJAQqZ82KHoiiFLkCQH1NeUm06edss7uWpkZFBprz7MmTANni%2BNVaZy7GK7uuCDBxrxTAcbY5W1cxPCLOw6C58SPqhDNHdBKnL8MliRoCl%2BA6lJLrcTXqXjDUes0ZI9MGZ3P2mfH8uoOvf%2FUsxIG1yNcWXKGfEy%2FzhWCH%2BacH0Va6IwqNWNuyPanFFHZtqC8idEfC715483pzZ6TI1EhwVAt47gRWIgFkHJijm%2BdEhqn6kb3pKX8X2Li98sYatBFeGovV8rwitlwUkDMlgJ2zngWKfVuvtEJhUQHgEkFZLp5tfCK5pFpMzZtcOCfRRwvD10axKF6yNu%2BPpNb863Er1%2FGWZomw5ETEW8rLSC00eON8COlqwb3uw8qCqCgxQNnh4J97NJaE3xehpMdBgC8t05D80KYPNcF%2FIZVY4g%2BvQPC0KG4VIa9UZwkdy2W6laTo77LAP5RTGYdH6l7eZhS3XsLsb5OvZyQGCkEm%2BAp%2FKinB6bVytT1n0TgCKGoHOyT2eYEIUOLUC6NWzJPS4r4u4XvJTA7RnWq7bNKDvaqAa6JtFPKEjOHNkU5UlAMxl7gmJbRQMqK4ehJFXl0zda1kIRoH1l60YJVmZfjbyivV6PqeaU0HQxJEWB4LAUveGIAXvDUY0x0ZvrZW121%2FG2idVV7OTuL%2FPsbfVzxzGrySQ%2BUW0RFQAD02PvRXPuaPl83g3BdsujsE4xwD3X%2BJoR9juHfnLP7Bw51PabgVDJHN9DyFILEuglxvNUepujsScPS9vchSSYcv7PqD9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528203713565&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=G3Q%2BjzFaEwmal2YdOPC%2FnOr%2B60CpKL%2BgfE15Zqb9HPkaFGMGvJnJXTTJZnq%2Fk39%2BdxYr%2B%2BGxURMn%0AvQiCxIoQJALN06iIEMPVr6Ihvp%2BYBCmTxfJenbiJpr1eUUQL4fC7qmZ8xWWbuX4z882omXpcpwyJ%0A7KBZaimyq%2FRkTy4QazvrfldEuPj5x0DpDkKOVoxjZQIUn5155U%2FS1Wyb%2BUNnAoSx4vELycvxs8zj%0A1C4O189P9kDa3VkJd7CwF%2B7neTofd1L5jQBqB1JeaSgFyNhMLZ0FcUSymVM1wNbeLuvbfcSpFhCC%0AWbzr3rlL8O%2BSs1nMZcebHBrYOz7xiuhIWl8mcA%3D%3D")) network 2018.06.05 15:02:02.205 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 15:02:02.324 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig" network 2018.06.05 15:02:02.324 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors network 2018.06.05 15:02:02.324 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-GCM-SHA384, bits=256, proto=TLSv1.2) network 2018.06.05 15:02:02.324 I (:0) : Used session protocol: "TlsV1_2" network 2018.06.05 15:02:02.324 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384) network 2018.06.05 15:02:02.324 I (:0) : Used peer certificate: QSslCertificate("3", "e7:08:a6:d2:a3:00:be:42", "7d4jrw+Ie/197bX/lQTapw==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.connect.verwalt-berlin.de")), QDateTime(2016-07-20 04:59:12.000 UTC Qt::TimeSpec(UTC)), QDateTime(2019-07-25 23:59:59.000 UTC Qt::TimeSpec(UTC))) network 2018.06.05 15:02:02.324 I ...dress::onSslHandshakeDone(core/states/StateCheckRefreshAddress.cpp:162) : Handshake of tls connection done! default 2018.06.05 15:02:02.324 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048 default 2018.06.05 15:02:02.325 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000 default 2018.06.05 15:02:02.325 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" default 2018.06.05 15:02:02.325 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "774af1694f2280b09d0d640948b22a77ea638f1157f517923c255bd2aae56b94" default 2018.06.05 15:02:02.325 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C") default 2018.06.05 15:02:02.325 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" for URL origin QUrl("https://eid-prod.connect.verwalt-berlin.de:443") default 2018.06.05 15:02:02.325 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384 default 2018.06.05 15:02:02.325 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224 default 2018.06.05 15:02:02.421 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:212) : Status Code: 303 | redirect URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f") network 2018.06.05 15:02:02.422 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Location": "https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f" network 2018.06.05 15:02:02.422 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Cache-Control": "no-cache, no-store" network 2018.06.05 15:02:02.422 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Pragma": "no-cache" network 2018.06.05 15:02:02.422 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Content-Length": "0" network 2018.06.05 15:02:02.422 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Date": "Tue, 05 Jun 2018 13:02:02 GMT" network 2018.06.05 15:02:02.422 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Set-Cookie": "TS015f2d62=01d33437f96092ea00ce1bf9d1a67ceedbea601dcce261a9ef510cb657ac22bddf92e81c9ab4b7a5a7c393d2a6ab8a1b11950e9724; Path=/" network 2018.06.05 15:02:02.422 UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46) : SOP-Check( "https://eid-prod.connect.verwalt-berlin.de:443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= true default 2018.06.05 15:02:02.422 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:285) : SOP-Check succeeded, abort process default 2018.06.05 15:02:02.422 ...s::fetchServerCertificate(core/states/StateCheckRefreshAddress.cpp:321) : Fetch TLS certificate for URL QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f") network 2018.06.05 15:02:02.423 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "eid-prod.connect.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f")) network 2018.06.05 15:02:02.424 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 15:02:02.541 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig" network 2018.06.05 15:02:02.541 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors network 2018.06.05 15:02:02.541 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-GCM-SHA384, bits=256, proto=TLSv1.2) network 2018.06.05 15:02:02.541 I (:0) : Used session protocol: "TlsV1_2" network 2018.06.05 15:02:02.541 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384) network 2018.06.05 15:02:02.541 I (:0) : Used peer certificate: QSslCertificate("3", "e7:08:a6:d2:a3:00:be:42", "7d4jrw+Ie/197bX/lQTapw==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.connect.verwalt-berlin.de")), QDateTime(2016-07-20 04:59:12.000 UTC Qt::TimeSpec(UTC)), QDateTime(2019-07-25 23:59:59.000 UTC Qt::TimeSpec(UTC))) network 2018.06.05 15:02:02.541 I ...FetchingServerCertificate(core/states/StateCheckRefreshAddress.cpp:340) : Handshake of tls connection done! default 2018.06.05 15:02:02.541 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048 default 2018.06.05 15:02:02.542 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000 default 2018.06.05 15:02:02.542 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" default 2018.06.05 15:02:02.542 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "774af1694f2280b09d0d640948b22a77ea638f1157f517923c255bd2aae56b94" default 2018.06.05 15:02:02.542 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C") default 2018.06.05 15:02:02.542 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" for URL origin QUrl("https://eid-prod.connect.verwalt-berlin.de:443") default 2018.06.05 15:02:02.542 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384 default 2018.06.05 15:02:02.542 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224 default 2018.06.05 15:02:02.542 ...freshAddress::doneSuccess(core/states/StateCheckRefreshAddress.cpp:359) : Determined RefreshUrl: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f") statema... 2018.06.05 15:02:02.542 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateCheckRefreshAddress" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:02:02.542 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateWriteHistory" statema... 2018.06.05 15:02:02.543 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateWriteHistory" statema... 2018.06.05 15:02:02.628 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateWriteHistory" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:02:02.628 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateRedirectBrowser" statema... 2018.06.05 15:02:02.628 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateRedirectBrowser" activation 2018.06.05 15:02:02.628 ...sendRedirect(activation/webservice/WebserviceActivationContext.cpp:126) : Redirect URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f&ResultMajor=ok") activation 2018.06.05 15:02:02.628 ...sendRedirect(activation/webservice/WebserviceActivationContext.cpp:135) : Redirecting now to URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=07b1c398-cc77-4b92-902a-eddfb96eb62f&ResultMajor=ok") statema... 2018.06.05 15:02:02.628 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateRedirectBrowser" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 15:02:02.628 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "FinalState" card_dr... 2018.06.05 15:02:02.631 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102" statema... 2018.06.05 15:02:04.587 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "FinalState" statema... 2018.06.05 15:02:04.587 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "FinalState" with status: No_Error | "Es ist kein Fehler aufgetreten." default 2018.06.05 15:02:04.610 AppController::onWorkflowFinished(core/controller/AppController.cpp:144) : governikus::AuthController done support 2018.06.05 15:02:04.612 I AppController::onWorkflowFinished(core/controller/AppController.cpp:150) : Finished workflow AUTH card_pcsc 2018.06.05 15:02:12.112 PcscReader::updateCard(card/pcsc/PcscReader.cpp:194) : old state: "(0x20022) CHANGED PRESENT" | new state: "(0x20422) CHANGED PRESENT UNPOWERED" network 2018.06.05 17:03:02.250 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Host": "127.0.0.1:24727" network 2018.06.05 17:03:02.250 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0" network 2018.06.05 17:03:02.251 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" network 2018.06.05 17:03:02.251 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Accept-Language": "de,en-US;q=0.7,en;q=0.3" network 2018.06.05 17:03:02.251 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Accept-Encoding": "gzip, deflate" network 2018.06.05 17:03:02.251 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Connection": "keep-alive" network 2018.06.05 17:03:02.251 HttpRequest::insertHeader(network/HttpRequest.cpp:196) : Header | "Upgrade-Insecure-Requests": "1" network 2018.06.05 17:03:02.251 HttpRequest::onHeadersComplete(network/HttpRequest.cpp:153) : "GET" | QUrl("/eID-Client?tcTokenURL=https%3A%2F%2Feid-prod.connect.verwalt-berlin.de%2FBuergerKontoWeb%2FSAMLRequestServlet%3FsessionId%3D516d12bb-0894-4d35-b041-ca094178cf3e") network 2018.06.05 17:03:02.251 HttpRequest::onHeadersComplete(network/HttpRequest.cpp:154) : Header completed network 2018.06.05 17:03:02.251 HttpRequest::onMessageComplete(network/HttpRequest.cpp:144) : Message completed activation 2018.06.05 17:03:02.251 ...onNewRequest(activation/webservice/WebserviceActivationHandler.cpp:101) : Request type: authentication default 2018.06.05 17:03:02.251 ...troller::onAuthenticationRequest(core/controller/AppController.cpp:258) : authentication requested card 2018.06.05 17:03:02.251 W ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:42) : No valid chains could be built card 2018.06.05 17:03:02.251 W ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:42) : No valid chains could be built support 2018.06.05 17:03:02.251 I EnumAction::Action](core/controller/AppController.cpp:399) : Starting new workflow AUTH default 2018.06.05 17:03:02.252 EnumAction::Action](core/controller/AppController.cpp:405) : Start governikus::AuthController statema... 2018.06.05 17:03:02.281 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateProcessing" statema... 2018.06.05 17:03:02.281 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateProcessing" statema... 2018.06.05 17:03:02.282 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateProcessing" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:02.282 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateParseTcTokenUrl" statema... 2018.06.05 17:03:02.282 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateParseTcTokenUrl" statema... 2018.06.05 17:03:02.282 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateParseTcTokenUrl" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:02.282 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateGetTcToken" statema... 2018.06.05 17:03:02.282 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateGetTcToken" default 2018.06.05 17:03:02.282 StateGetTcToken::run(core/states/StateGetTcToken.cpp:42) : Got TC Token URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLRequestServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e") network 2018.06.05 17:03:02.283 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "eid-prod.connect.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLRequestServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e")) network 2018.06.05 17:03:02.283 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 17:03:02.494 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig" network 2018.06.05 17:03:02.494 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors network 2018.06.05 17:03:02.495 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-GCM-SHA384, bits=256, proto=TLSv1.2) network 2018.06.05 17:03:02.495 I (:0) : Used session protocol: "TlsV1_2" network 2018.06.05 17:03:02.495 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384) network 2018.06.05 17:03:02.495 I (:0) : Used peer certificate: QSslCertificate("3", "e7:08:a6:d2:a3:00:be:42", "7d4jrw+Ie/197bX/lQTapw==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.connect.verwalt-berlin.de")), QDateTime(2016-07-20 04:59:12.000 UTC Qt::TimeSpec(UTC)), QDateTime(2019-07-25 23:59:59.000 UTC Qt::TimeSpec(UTC))) network 2018.06.05 17:03:02.495 I StateGetTcToken::onSslHandshakeDone(core/states/StateGetTcToken.cpp:110) : Handshake of tls connection done! default 2018.06.05 17:03:02.495 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048 default 2018.06.05 17:03:02.495 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000 default 2018.06.05 17:03:02.495 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384 default 2018.06.05 17:03:02.495 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224 default 2018.06.05 17:03:02.495 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" for URL origin QUrl("https://eid-prod.connect.verwalt-berlin.de:443") default 2018.06.05 17:03:02.553 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:139) : Status Code: 303 | RedirectUrl: QUrl("https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?SAMLRequest=nZLRbtsgFIZfxeIeG2wcOyhOlM6bZK2bpqTtpN1YGJ%2BklpxDBtjb3r6kS6VNq3ox7hAc%2Fu%2FwndXm52mMZrBuMFgRHjMSAWrTD3isyP3dB1qSzXrl1GlMz3I7%2BUfcwfcJnI9CITr5%2B6Qik0VplBucRHUCJ72W%2B%2B2nW5nGTJ6t8UabkURb58D6EPXOoJtOYPdg50HD%2Fe62Io%2Fen51MEhh6Gkr6WBtE0D4OeD%2FU6GkHdhww7iG5mcAewX406M1X6JJL1A40DDNcXhzBbxy4S09NX%2BV80fO06ygrl4KKPstpxwSnWrGl4EWpDxmQqA49DagucK%2Bg%2FIMgSyGy5GjmVk0e0CfK%2FUJNoqauSFsUiwwAUqqhZ1SEXNot%2BZKmqswLdlimWRESG%2BcmaNB5hb4iKeMlZQvK8jueS5ZJlsacsW8k%2BmLNPPRgP4ePrUj9noUlyqLdAzaI9b5V4wi1ChQHGMO99uFwQ1lQyeOQuRBlSkWWCkGihxfPwQq5WpXPGPZPnW%2FbVC8Oyfr%2FWVbJ8%2BBcw9fX7d8Ttn4C&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=CnE9h9OqiiS41tdzbTAu6cIEUSRe3OZLQUUp341OS%2FAwW9ejKR3fM35EjqtxORgwz9ZFUqHa6RU4n2Fie64pJghHKV7287a3Lm%2F7QP6tk%2FhAn507LmQvIQpX5EAA3W7vlxKvaiYRXKW4YTqIJuXi17Esir5K9UynSKr273ULn1P2xvjCxhAAVoYaeO420tIYSxpA5LXqnu7kYf79ltajj2%2FaS47uWFeLyb9o%2FXkAMILwVhHROMapEp7z8cx%2B9jH5ItuYy3YOZn2bBBVjXMW3peWbEKqB7q5eNv%2BxV4wyAJCZxX4SwnX4rQ6gIQPDexWQMEBRfDKcEwQmljgjJ61qow%3D%3D") network 2018.06.05 17:03:02.553 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Cache-Control": "no-cache, no-store" network 2018.06.05 17:03:02.553 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Pragma": "no-cache" network 2018.06.05 17:03:02.553 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Location": "https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?SAMLRequest=nZLRbtsgFIZfxeIeG2wcOyhOlM6bZK2bpqTtpN1YGJ%2BklpxDBtjb3r6kS6VNq3ox7hAc%2Fu%2FwndXm52mMZrBuMFgRHjMSAWrTD3isyP3dB1qSzXrl1GlMz3I7%2BUfcwfcJnI9CITr5%2B6Qik0VplBucRHUCJ72W%2B%2B2nW5nGTJ6t8UabkURb58D6EPXOoJtOYPdg50HD%2Fe62Io%2Fen51MEhh6Gkr6WBtE0D4OeD%2FU6GkHdhww7iG5mcAewX406M1X6JJL1A40DDNcXhzBbxy4S09NX%2BV80fO06ygrl4KKPstpxwSnWrGl4EWpDxmQqA49DagucK%2Bg%2FIMgSyGy5GjmVk0e0CfK%2FUJNoqauSFsUiwwAUqqhZ1SEXNot%2BZKmqswLdlimWRESG%2BcmaNB5hb4iKeMlZQvK8jueS5ZJlsacsW8k%2BmLNPPRgP4ePrUj9noUlyqLdAzaI9b5V4wi1ChQHGMO99uFwQ1lQyeOQuRBlSkWWCkGihxfPwQq5WpXPGPZPnW%2FbVC8Oyfr%2FWVbJ8%2BBcw9fX7d8Ttn4C&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=CnE9h9OqiiS41tdzbTAu6cIEUSRe3OZLQUUp341OS%2FAwW9ejKR3fM35EjqtxORgwz9ZFUqHa6RU4n2Fie64pJghHKV7287a3Lm%2F7QP6tk%2FhAn507LmQvIQpX5EAA3W7vlxKvaiYRXKW4YTqIJuXi17Esir5K9UynSKr273ULn1P2xvjCxhAAVoYaeO420tIYSxpA5LXqnu7kYf79ltajj2%2FaS47uWFeLyb9o%2FXkAMILwVhHROMapEp7z8cx%2B9jH5ItuYy3YOZn2bBBVjXMW3peWbEKqB7q5eNv%2BxV4wyAJCZxX4SwnX4rQ6gIQPDexWQMEBRfDKcEwQmljgjJ61qow%3D%3D" network 2018.06.05 17:03:02.553 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Content-Type": "text/html" network 2018.06.05 17:03:02.553 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Content-Length": "0" network 2018.06.05 17:03:02.553 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Date": "Tue, 05 Jun 2018 15:03:01 GMT" network 2018.06.05 17:03:02.553 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Set-Cookie": "TS015f2d62=01d33437f99f830f21e1cdc71a11b77fe6b9aeedcd7b0848b7009167cacf04fac5c3cce811437943cfe8a82a6647be80f47766aece; Path=/" network 2018.06.05 17:03:02.553 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8443, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?SAMLRequest=nZLRbtsgFIZfxeIeG2wcOyhOlM6bZK2bpqTtpN1YGJ%2BklpxDBtjb3r6kS6VNq3ox7hAc%2Fu%2FwndXm52mMZrBuMFgRHjMSAWrTD3isyP3dB1qSzXrl1GlMz3I7%2BUfcwfcJnI9CITr5%2B6Qik0VplBucRHUCJ72W%2B%2B2nW5nGTJ6t8UabkURb58D6EPXOoJtOYPdg50HD%2Fe62Io%2Fen51MEhh6Gkr6WBtE0D4OeD%2FU6GkHdhww7iG5mcAewX406M1X6JJL1A40DDNcXhzBbxy4S09NX%2BV80fO06ygrl4KKPstpxwSnWrGl4EWpDxmQqA49DagucK%2Bg%2FIMgSyGy5GjmVk0e0CfK%2FUJNoqauSFsUiwwAUqqhZ1SEXNot%2BZKmqswLdlimWRESG%2BcmaNB5hb4iKeMlZQvK8jueS5ZJlsacsW8k%2BmLNPPRgP4ePrUj9noUlyqLdAzaI9b5V4wi1ChQHGMO99uFwQ1lQyeOQuRBlSkWWCkGihxfPwQq5WpXPGPZPnW%2FbVC8Oyfr%2FWVbJ8%2BBcw9fX7d8Ttn4C&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=CnE9h9OqiiS41tdzbTAu6cIEUSRe3OZLQUUp341OS%2FAwW9ejKR3fM35EjqtxORgwz9ZFUqHa6RU4n2Fie64pJghHKV7287a3Lm%2F7QP6tk%2FhAn507LmQvIQpX5EAA3W7vlxKvaiYRXKW4YTqIJuXi17Esir5K9UynSKr273ULn1P2xvjCxhAAVoYaeO420tIYSxpA5LXqnu7kYf79ltajj2%2FaS47uWFeLyb9o%2FXkAMILwVhHROMapEp7z8cx%2B9jH5ItuYy3YOZn2bBBVjXMW3peWbEKqB7q5eNv%2BxV4wyAJCZxX4SwnX4rQ6gIQPDexWQMEBRfDKcEwQmljgjJ61qow%3D%3D")) network 2018.06.05 17:03:02.554 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 17:03:02.810 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig" network 2018.06.05 17:03:02.810 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors network 2018.06.05 17:03:02.810 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-SHA384, bits=256, proto=TLSv1.2) network 2018.06.05 17:03:02.810 I (:0) : Used session protocol: "TlsV1_2" network 2018.06.05 17:03:02.810 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384) network 2018.06.05 17:03:02.810 I (:0) : Used peer certificate: QSslCertificate("3", "3c:3f:e6:1c:7c:28:28:d9", "Kfl3PTkdwoi1P7sQWG1dvQ==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.verwalt-berlin.de")), QDateTime(2017-10-16 13:01:51.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-10-21 23:59:59.000 UTC Qt::TimeSpec(UTC))) network 2018.06.05 17:03:02.810 I StateGetTcToken::onSslHandshakeDone(core/states/StateGetTcToken.cpp:110) : Handshake of tls connection done! default 2018.06.05 17:03:02.810 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048 default 2018.06.05 17:03:02.810 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000 default 2018.06.05 17:03:02.811 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384 default 2018.06.05 17:03:02.811 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224 default 2018.06.05 17:03:02.811 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" for URL origin QUrl("https://eid-prod.verwalt-berlin.de:8443") default 2018.06.05 17:03:02.987 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:139) : Status Code: 303 | RedirectUrl: QUrl("https://eid-prod.verwalt-berlin.de:8443/ecardpaos/startauthentication?RestrictedId=true&idProviderUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8443%2Fgov_autent%2Fasync&IssuingState=true&FamilyNames=true&ArtisticName=true&PlaceOfBirth=true&AcademicTitle=true&PlaceOfResidence=true&Signature=Zeb2W0YvAHdKS2VViQ4a1jZkG%2FGjSpcgAnH7fwYvWr0OyRwdxLArXR%2BsInIsPECtwSyOdf9QBw3f%0AOyFWKXHrVacDZ6vIccWeWAFcFzWSljEANLlKT71vtWfBC02iYq3hMc2bxOk2tA3MY39EDQTi19Kb%0Ay4J4GC19dk79%2BzvsjPPnxPR0%2FseJN7GINJQxIW3H5jcknAarLJVJCmn0PTkRa%2B%2BmWdPOJDtTbbUR%0AWc0DE84EpODCacXyQk72l3FuDL239zcgusF3NtrskB7jdjhmkNVYN0lI1SPwyHYCg7UbXV7EQ5bM%0AjP5LMH2Ljf4I6lyQcurylODDYbO09IXppCmfzw%3D%3D&Nationality=true&DateOfBirth=true&GivenNames=true&requestID=1ae20737a5f5e3dad602d47ee10111f5610d1845&receiverUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8445%2Fecardpaos%2Fpaosreceiver&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%2Frsa-sha256&DocumentType=true&ResidencePermitI=true") network 2018.06.05 17:03:02.988 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Server": "Apache-Coyote/1.1" network 2018.06.05 17:03:02.988 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Location": "https://eid-prod.verwalt-berlin.de:8443/ecardpaos/startauthentication?RestrictedId=true&idProviderUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8443%2Fgov_autent%2Fasync&IssuingState=true&FamilyNames=true&ArtisticName=true&PlaceOfBirth=true&AcademicTitle=true&PlaceOfResidence=true&Signature=Zeb2W0YvAHdKS2VViQ4a1jZkG%2FGjSpcgAnH7fwYvWr0OyRwdxLArXR%2BsInIsPECtwSyOdf9QBw3f%0AOyFWKXHrVacDZ6vIccWeWAFcFzWSljEANLlKT71vtWfBC02iYq3hMc2bxOk2tA3MY39EDQTi19Kb%0Ay4J4GC19dk79%2BzvsjPPnxPR0%2FseJN7GINJQxIW3H5jcknAarLJVJCmn0PTkRa%2B%2BmWdPOJDtTbbUR%0AWc0DE84EpODCacXyQk72l3FuDL239zcgusF3NtrskB7jdjhmkNVYN0lI1SPwyHYCg7UbXV7EQ5bM%0AjP5LMH2Ljf4I6lyQcurylODDYbO09IXppCmfzw%3D%3D&Nationality=true&DateOfBirth=true&GivenNames=true&requestID=1ae20737a5f5e3dad602d47ee10111f5610d1845&receiverUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8445%2Fecardpaos%2Fpaosreceiver&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%2Frsa-sha256&DocumentType=true&ResidencePermitI=true" network 2018.06.05 17:03:02.988 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Cache-Control": "no-cache, no-store" network 2018.06.05 17:03:02.988 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Pragma": "no-cache" network 2018.06.05 17:03:02.988 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Content-Length": "0" network 2018.06.05 17:03:02.988 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Date": "Tue, 05 Jun 2018 15:03:02 GMT" network 2018.06.05 17:03:02.988 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8443, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8443/ecardpaos/startauthentication?RestrictedId=true&idProviderUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8443%2Fgov_autent%2Fasync&IssuingState=true&FamilyNames=true&ArtisticName=true&PlaceOfBirth=true&AcademicTitle=true&PlaceOfResidence=true&Signature=Zeb2W0YvAHdKS2VViQ4a1jZkG%2FGjSpcgAnH7fwYvWr0OyRwdxLArXR%2BsInIsPECtwSyOdf9QBw3f%0AOyFWKXHrVacDZ6vIccWeWAFcFzWSljEANLlKT71vtWfBC02iYq3hMc2bxOk2tA3MY39EDQTi19Kb%0Ay4J4GC19dk79%2BzvsjPPnxPR0%2FseJN7GINJQxIW3H5jcknAarLJVJCmn0PTkRa%2B%2BmWdPOJDtTbbUR%0AWc0DE84EpODCacXyQk72l3FuDL239zcgusF3NtrskB7jdjhmkNVYN0lI1SPwyHYCg7UbXV7EQ5bM%0AjP5LMH2Ljf4I6lyQcurylODDYbO09IXppCmfzw%3D%3D&Nationality=true&DateOfBirth=true&GivenNames=true&requestID=1ae20737a5f5e3dad602d47ee10111f5610d1845&receiverUrl=https%3A%2F%2Feid-prod.verwalt-berlin.de%3A8445%2Fecardpaos%2Fpaosreceiver&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%2Frsa-sha256&DocumentType=true&ResidencePermitI=true")) network 2018.06.05 17:03:02.988 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) default 2018.06.05 17:03:03.033 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:139) : Status Code: 200 | RedirectUrl: QUrl("") network 2018.06.05 17:03:03.033 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Server": "Apache-Coyote/1.1" network 2018.06.05 17:03:03.033 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Content-Length": "640" network 2018.06.05 17:03:03.033 StateGetTcToken::onNetworkReply(core/states/StateGetTcToken.cpp:142) : Header | "Date": "Tue, 05 Jun 2018 15:03:02 GMT" default 2018.06.05 17:03:03.033 TcToken::parse(core/TcToken.cpp:39) : Parsing TcToken: default 2018.06.05 17:03:03.033 TcToken::parse(core/TcToken.cpp:40) : "\nhttps://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver\n1ae20737a5f5e3dad602d47ee10111f5610d1845\nhttps://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=1ae20737a5f5e3dad602d47ee10111f5610d1845\nurn:liberty:paos:2006-08\nurn:ietf:rfc:4279\n\n3C0DA83E8AC57AD17B225E06D57494B2A80EA78CCA1B0D16028F95842DE23DC28F2DB96D154AF240935C86B51D2BE863EFF5E81B7BBFB5FF62A2F85C41CF56C6\n\n\n" statema... 2018.06.05 17:03:03.034 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateGetTcToken" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:03.034 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateStartPaos" statema... 2018.06.05 17:03:03.034 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateStartPaos" statema... 2018.06.05 17:03:03.034 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateStartPaos" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:03.034 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendStartPaos" statema... 2018.06.05 17:03:03.035 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendStartPaos" network 2018.06.05 17:03:03.035 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data: "\n \n \n urn:liberty:paos:2006-08\n \n http://www.projectliberty.org/2006/01/role/paos\n \n http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand\n \n \n \n \n http://www.projectliberty.org/2006/02/role/paos\n \n urn:uuid:ac05ad57-94e8-4ac0-ab3e-c5a3696a759a\n \n \n \n 1ae20737a5f5e3dad602d47ee10111f5610d1845\n \n e80704007f00070302\n 00\n \n \n AusweisApp2\n 1\n 14\n 0\n \n \n 1\n 1\n 5\n \n \n \n\n" network 2018.06.05 17:03:03.035 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver")) network 2018.06.05 17:03:03.035 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 17:03:03.144 ...dKeyAuthenticationRequired(core/states/StateGenericSendReceive.cpp:141) : pre-shared key authentication requested: "Hint" network 2018.06.05 17:03:03.200 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig" network 2018.06.05 17:03:03.200 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors network 2018.06.05 17:03:03.200 I (:0) : Used session cipher QSslCipher(name=RSA-PSK-AES256-CBC-SHA, bits=256, proto=SSLv3) network 2018.06.05 17:03:03.200 I (:0) : Used session protocol: "TlsV1_2" network 2018.06.05 17:03:03.200 I (:0) : Used ephemeral server key: network 2018.06.05 17:03:03.200 I (:0) : Used peer certificate: QSslCertificate("3", "3c:3f:e6:1c:7c:28:28:d9", "Kfl3PTkdwoi1P7sQWG1dvQ==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.verwalt-berlin.de")), QDateTime(2017-10-16 13:01:51.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-10-21 23:59:59.000 UTC Qt::TimeSpec(UTC))) network 2018.06.05 17:03:03.200 I ...eceive::onSslHandshakeDone(core/states/StateGenericSendReceive.cpp:115) : Handshake of tls connection done! default 2018.06.05 17:03:03.200 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048 default 2018.06.05 17:03:03.200 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000 default 2018.06.05 17:03:03.201 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" for URL origin QUrl("https://eid-prod.verwalt-berlin.de:8445") network 2018.06.05 17:03:03.242 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server network 2018.06.05 17:03:03.242 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1" network 2018.06.05 17:03:03.242 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1" network 2018.06.05 17:03:03.242 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked" network 2018.06.05 17:03:03.242 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:02 GMT" network 2018.06.05 17:03:03.242 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data: "\n \n \n \n \n \n\n\n" network 2018.06.05 17:03:03.242 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: INITIALIZE_FRAMEWORK statema... 2018.06.05 17:03:03.242 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendStartPaos" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:03.242 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateInitializeFramework" statema... 2018.06.05 17:03:03.242 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateInitializeFramework" statema... 2018.06.05 17:03:03.242 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateInitializeFramework" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:03.242 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendInitializeFrameworkResponse" statema... 2018.06.05 17:03:03.243 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendInitializeFrameworkResponse" network 2018.06.05 17:03:03.243 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data: "\n \n \n urn:liberty:paos:2006-08\n \n http://www.projectliberty.org/2006/01/role/paos\n \n http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand\n \n \n \n \n http://www.projectliberty.org/2006/02/role/paos\n \n urn:uuid:276ae287-3cce-4cfb-9b08-98197a79f49c\n \n \n \n \n http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok\n \n \n 1\n 1\n 5\n \n \n \n\n" network 2018.06.05 17:03:03.243 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver")) network 2018.06.05 17:03:03.243 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 17:03:03.284 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server network 2018.06.05 17:03:03.284 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1" network 2018.06.05 17:03:03.284 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1" network 2018.06.05 17:03:03.284 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked" network 2018.06.05 17:03:03.285 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:02 GMT" network 2018.06.05 17:03:03.285 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data: "\n \n \n \n \n \n\nE80704007F00070302\n00\n\n\n\n\n" network 2018.06.05 17:03:03.285 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DID_LIST statema... 2018.06.05 17:03:03.285 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendInitializeFrameworkResponse" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:03.285 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateDidList" statema... 2018.06.05 17:03:03.285 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateDidList" statema... 2018.06.05 17:03:03.285 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateDidList" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:03.285 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendDIDListResponse" statema... 2018.06.05 17:03:03.285 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendDIDListResponse" network 2018.06.05 17:03:03.286 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data: "\n \n \n urn:liberty:paos:2006-08\n \n http://www.projectliberty.org/2006/01/role/paos\n \n http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand\n \n \n \n \n http://www.projectliberty.org/2006/02/role/paos\n \n urn:uuid:f2994bbc-3012-4c23-9676-7f34d1b50623\n \n \n \n \n http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok\n \n \n PIN\n \n \n \n\n" network 2018.06.05 17:03:03.286 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver")) network 2018.06.05 17:03:03.286 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 17:03:03.368 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server network 2018.06.05 17:03:03.368 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1" network 2018.06.05 17:03:03.368 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1" network 2018.06.05 17:03:03.368 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked" network 2018.06.05 17:03:03.368 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:02 GMT" network 2018.06.05 17:03:03.368 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data: "\n \n \n \n \n \n\nE80704007F00070302\n00\n\nPIN\n\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n7F2181E77F4E81A05F290100420E44454356434165494430303130347F494F060A04007F00070202020203864104623D7CEBFF7918590B4D5C53D507DCF1EE3AE9E20A5E62AFEB8DBFC958F7EFFB4CCF7952FDA2B3F6254E9DC34FE5ECD1E084D4C23658319EC5BBE5A009D1E0EC5F2010444544566549444454523130313433337F4C12060904007F0007030102025305400513FF975F25060108000501075F24060108000801055F374054483CEF8791A094D40343B753FA83689C2B56256BB8428C56DDCDAB94709CAE8107DE8649DC37F7D130D75E36936CD85DAC818D1297C348BA408DA179A20CE4\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n7F4C12060904007F0007030102025305000503FB04\n7F4C12060904007F00070301020253050000000000\n67177315060904007F00070301040253083230313830363035\n\n\n\n\n" paos 2018.06.05 17:03:03.369 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:36) : "ConnectionHandle" paos 2018.06.05 17:03:03.369 ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "CardApplication" paos 2018.06.05 17:03:03.369 ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "SlotHandle" paos 2018.06.05 17:03:03.369 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:36) : "DIDName" paos 2018.06.05 17:03:03.369 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:36) : "AuthenticationProtocolData" paos 2018.06.05 17:03:03.369 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate" paos 2018.06.05 17:03:03.369 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate" paos 2018.06.05 17:03:03.369 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate" paos 2018.06.05 17:03:03.369 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "Certificate" paos 2018.06.05 17:03:03.370 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "CertificateDescription" paos 2018.06.05 17:03:03.370 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "RequiredCHAT" paos 2018.06.05 17:03:03.370 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "OptionalCHAT" paos 2018.06.05 17:03:03.370 ...parseEac1InputType(core/paos/retrieve/DidAuthenticateEac1Parser.cpp:79) : "AuthenticatedAuxiliaryData" network 2018.06.05 17:03:03.370 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DID_AUTHENTICATE_EAC1 statema... 2018.06.05 17:03:03.370 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendDIDListResponse" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:03.370 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateExtractCvcsFromEac1InputType" statema... 2018.06.05 17:03:03.370 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateExtractCvcsFromEac1InputType" card 2018.06.05 17:03:03.370 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]) card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]) card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]) card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]) card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]) card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]) card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]) card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])) card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])) card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])) card 2018.06.05 17:03:03.371 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])) card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]) card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]) card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]) card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]) card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00001", chr="DETESTeID00001", valid=["2010-08-13","2013-08-13"]) card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00001", chr="DETESTeID00002", valid=["2010-09-21","2013-09-21"]) card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00002", chr="DETESTeID00004", valid=["2012-05-11","2015-05-11"]) card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DETESTeID00004", chr="DETESTeID00005", valid=["2015-05-04","2018-05-04"]) card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeIDCTL0401", chr="DECVCAeIDCTL0402", valid=["2016-03-01","2019-03-01"]) card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeIDCT00001", chr="DECVCAeIDCTL0401", valid=["2016-03-01","2019-03-01"]) card 2018.06.05 17:03:03.372 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:37) : CVC in pool CVC(type=CVCA, car="DECVCAeIDCT00001", chr="DECVCAeIDCT00001", valid=["2016-03-01","2019-03-01"]) card 2018.06.05 17:03:03.373 ...ertificateChainBuilder(card/base/asn1/CVCertificateChainBuilder.cpp:48) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])) statema... 2018.06.05 17:03:03.373 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateExtractCvcsFromEac1InputType" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:03.373 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StatePreVerification" statema... 2018.06.05 17:03:03.373 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StatePreVerification" default 2018.06.05 17:03:03.373 StatePreVerification::run(core/states/StatePreVerification.cpp:33) : Try to build a cvc chain for one of the known trust points card 2018.06.05 17:03:03.373 const(card/base/asn1/CVCertificateChainBuilder.cpp:109) : Get chain for root CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]) card 2018.06.05 17:03:03.373 const(card/base/asn1/CVCertificateChainBuilder.cpp:119) : Found valid chain QVector(CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00102", valid=["2010-10-18","2013-10-18"]), CVC(type=CVCA, car="DECVCAeID00102", chr="DECVCAeID00103", valid=["2012-12-03","2015-12-03"]), CVC(type=CVCA, car="DECVCAeID00103", chr="DECVCAeID00104", valid=["2015-09-14","2018-09-14"]), CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])) default 2018.06.05 17:03:03.379 StatePreVerification::isValid(core/states/StatePreVerification.cpp:97) : Check certificate chain validity on "2018-06-05T17:03:02" default 2018.06.05 17:03:03.379 StatePreVerification::isValid(core/states/StatePreVerification.cpp:108) : CVC "DE000048700233" AT | valid from/to [ "2018-06-05" , "2018-06-06" ] default 2018.06.05 17:03:03.379 StatePreVerification::isValid(core/states/StatePreVerification.cpp:108) : CVC "DEDVeIDDTR101433" DV_no_f | valid from/to [ "2018-05-17" , "2018-08-15" ] default 2018.06.05 17:03:03.379 StatePreVerification::isValid(core/states/StatePreVerification.cpp:108) : CVC "DECVCAeID00104" CVCA | valid from/to [ "2015-09-14" , "2018-09-14" ] statema... 2018.06.05 17:03:03.387 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StatePreVerification" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:03.387 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateCertificateDescriptionCheck" statema... 2018.06.05 17:03:03.387 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateCertificateDescriptionCheck" network 2018.06.05 17:03:03.387 UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46) : SOP-Check( "https://eid-prod.connect.verwalt-berlin.de:443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= true statema... 2018.06.05 17:03:03.387 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateCertificateDescriptionCheck" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:03.387 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateCheckCertificates" statema... 2018.06.05 17:03:03.387 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateCheckCertificates" default 2018.06.05 17:03:03.388 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" default 2018.06.05 17:03:03.388 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "774af1694f2280b09d0d640948b22a77ea638f1157f517923c255bd2aae56b94" default 2018.06.05 17:03:03.388 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C") default 2018.06.05 17:03:03.388 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" default 2018.06.05 17:03:03.388 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "0546c2b01048cb77669003ab0743255f94582f010baa85308133f514e218ff3c" default 2018.06.05 17:03:03.388 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C") default 2018.06.05 17:03:03.388 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" default 2018.06.05 17:03:03.388 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "0546c2b01048cb77669003ab0743255f94582f010baa85308133f514e218ff3c" default 2018.06.05 17:03:03.388 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C") statema... 2018.06.05 17:03:03.388 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateCheckCertificates" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:03.388 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateEditAccessRights" statema... 2018.06.05 17:03:06.025 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateEditAccessRights" statema... 2018.06.05 17:03:06.025 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateEditAccessRights" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:06.025 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSelectReader" statema... 2018.06.05 17:03:06.026 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSelectReader" statema... 2018.06.05 17:03:06.026 ...SelectReader::onReaderInfoChanged(core/states/StateSelectReader.cpp:71) : Select first found reader "REINER SCT cyberJack RFID basis 0" of type PCSC card 2018.06.05 17:03:06.026 ReaderManagerWorker::startScan(card/base/ReaderManagerWorker.cpp:114) : Start scan on plugin: governikus::PcscReaderManagerPlugIn card 2018.06.05 17:03:06.026 ReaderManagerWorker::startScan(card/base/ReaderManagerWorker.cpp:114) : Start scan on plugin: governikus::RemoteReaderManagerPlugIn statema... 2018.06.05 17:03:06.026 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSelectReader" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:06.026 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateConnectCard" statema... 2018.06.05 17:03:06.027 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateConnectCard" statema... 2018.06.05 17:03:06.027 StateConnectCard::run(core/states/StateConnectCard.cpp:24) : StateConnectCard::run() card_dr... 2018.06.05 17:03:06.030 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102" statema... 2018.06.05 17:03:06.030 StateConnectCard::onCardInserted(core/states/StateConnectCard.cpp:40) : Card has been inserted, trying to connect network 2018.06.05 17:03:06.031 ...ramHandlerImpl::DatagramHandlerImpl(network/DatagramHandlerImpl.cpp:57) : Bound on port: 24727 card_pcsc 2018.06.05 17:03:06.035 PcscCard::connect(card/pcsc/PcscCard.cpp:111) : SCardConnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" | cardHandle: 3926196224 | protocol: "SCARD_PROTOCOL_T1" card_pcsc 2018.06.05 17:03:06.035 PcscCard::connect(card/pcsc/PcscCard.cpp:118) : SCardBeginTransaction for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:06.036 PcscReader::updateCard(card/pcsc/PcscReader.cpp:194) : old state: "(0x20422) CHANGED PRESENT UNPOWERED" | new state: "(0x20122) CHANGED PRESENT INUSE" card_dr... 2018.06.05 17:03:06.042 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102" statema... 2018.06.05 17:03:06.042 StateConnectCard::onCommandDone(core/states/StateConnectCard.cpp:49) : Card connection command completed statema... 2018.06.05 17:03:06.042 StateConnectCard::onCommandDone(core/states/StateConnectCard.cpp:57) : Card connection was successful statema... 2018.06.05 17:03:06.042 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateConnectCard" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:06.042 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateUpdateRetryCounter" statema... 2018.06.05 17:03:06.042 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateUpdateRetryCounter" default 2018.06.05 17:03:06.042 StateUpdateRetryCounter::run(core/states/StateUpdateRetryCounter.cpp:22) : StateUpdateRetryCounter::run() card_pcsc 2018.06.05 17:03:06.042 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4020c02011c" card_pcsc 2018.06.05 17:03:06.077 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:06.077 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000" card_pcsc 2018.06.05 17:03:06.077 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0022c1a412800a04007f0007020204020283010384010d" card_pcsc 2018.06.05 17:03:06.104 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:06.104 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000" card 2018.06.05 17:03:06.104 Reader::getRetryCounter(card/base/Reader.cpp:151) : StatusCode: SUCCESS support 2018.06.05 17:03:06.104 I Reader::updateRetryCounter(card/base/Reader.cpp:103) : retrieved retry counter: 3 , was: 3 , PIN deactivated: false card 2018.06.05 17:03:06.104 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK default 2018.06.05 17:03:06.104 ...r::onUpdateRetryCounterDone(core/states/StateUpdateRetryCounter.cpp:39) : StateUpdateRetryCounter::onUpdateRetryCounterDone() statema... 2018.06.05 17:03:06.105 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateUpdateRetryCounter" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:06.105 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateHandleRetryCounter" statema... 2018.06.05 17:03:06.105 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateHandleRetryCounter" default 2018.06.05 17:03:06.105 StateHandleRetryCounter::run(core/states/StateHandleRetryCounter.cpp:37) : PIN allowed statema... 2018.06.05 17:03:06.105 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateHandleRetryCounter" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:06.105 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateEstablishPacePin" statema... 2018.06.05 17:03:13.050 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateEstablishPacePin" default 2018.06.05 17:03:13.050 AuthContext::encodeEffectiveChat(core/context/AuthContext.cpp:223) : Using effective chat: "7f4c12060904007f0007030102025305000503fb04" default 2018.06.05 17:03:13.050 StateEstablishPacePin::run(core/states/StateEstablishPacePin.cpp:38) : Establish connection using PIN support 2018.06.05 17:03:13.051 I ...ionWorker::establishPaceChannel(card/base/CardConnectionWorker.cpp:179) : Starting PACE for PACE_PIN card 2018.06.05 17:03:13.052 const(card/base/pace/PaceHandler.cpp:141) : Use ECDH with standardized domain parameters: "0.4.0.127.0.7.2.2.4.2.2" card 2018.06.05 17:03:13.052 ...urveFactory::createCurve(card/base/pace/ec/EllipticCurveFactory.cpp:41) : Create elliptic curve brainpoolP256r1 card_pcsc 2018.06.05 17:03:13.052 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4020c02011c" card_pcsc 2018.06.05 17:03:13.065 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:13.066 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000" card_pcsc 2018.06.05 17:03:13.066 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0022c1a427800a04007f0007020204020283010384010d7f4c12060904007f0007030102025305000503fb04" card_pcsc 2018.06.05 17:03:13.106 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:13.106 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000" card_pcsc 2018.06.05 17:03:13.106 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "10860000027c0000" card_pcsc 2018.06.05 17:03:13.161 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:13.161 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "7c1280106fa32b995effb8fe649eed001ac073669000" card_pcsc 2018.06.05 17:03:13.162 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "10860000457c43814104a9871b2ca0aa8c2879151ac0ca3f546a04bb1237f7ec1fff270ec47f5e4e71f2673d078021916f92b318dd23645c28795492f6af8aaab45d7db255b1224f562700" card_pcsc 2018.06.05 17:03:13.389 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:13.389 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "7c43824104a7753fdb4a2698defd648861846bc8d1f2f21739d51441cfd2361f37fd58c40e2fde2f2069bc6ecd9b4dcac4f1c26fbf5e4b8e2f38ef1aa90a5348136603b8079000" card_pcsc 2018.06.05 17:03:13.393 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "10860000457c4383410455909a0db3cb3ec0199f31ed9ef424904f65102fcf5ef7484adf3a6aea6ff69e7f06c424924665c932e858e3c3cd9237014d70c3e81430ff64d3ea99bdc8a59d00" card_pcsc 2018.06.05 17:03:13.555 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:13.555 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "7c4384410409bc8a9fdcb2fd2edb90ba03f658c27432639cec6cd680fbb33a6653b154a87c2ee33f7badb3fba76ca15551e6c96627fc9a75a5ddcae267e831d40cac072afc9000" card_pcsc 2018.06.05 17:03:13.556 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "008600000c7c0a8508a60c47cd46e4dc6a00" card_pcsc 2018.06.05 17:03:13.668 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:13.668 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "7c2a8608d1c2352491837192870e4445435643416549443030313034880e44454356434165494430303130339000" default 2018.06.05 17:03:13.668 ...ynamicAuthenticationData(card/base/GeneralAuthenticateResponse.cpp:219) : mCarCurr "DECVCAeID00104" default 2018.06.05 17:03:13.668 ...ynamicAuthenticationData(card/base/GeneralAuthenticateResponse.cpp:220) : mCarPrev "DECVCAeID00103" card 2018.06.05 17:03:13.668 ...reement::performMutualAuthenticate(card/base/pace/KeyAgreement.cpp:170) : Successfully authenticated card 2018.06.05 17:03:13.668 PaceHandler::establishPaceChannel(card/base/pace/PaceHandler.cpp:93) : Pace channel established support 2018.06.05 17:03:13.669 I ...ionWorker::establishPaceChannel(card/base/CardConnectionWorker.cpp:206) : Finished PACE for PACE_PIN with result OK card 2018.06.05 17:03:13.669 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK statema... 2018.06.05 17:03:13.669 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateEstablishPacePin" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:13.669 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateDidAuthenticateEac1" statema... 2018.06.05 17:03:13.677 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateDidAuthenticateEac1" card_pcsc 2018.06.05 17:03:13.677 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c8400000d9701088e08e08470af1753b96600" card_pcsc 2018.06.05 17:03:13.712 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:13.712 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "871101e6df2f9dd83121a7644cc0f3f08f7f58990290008e0879c4a1563e7a732a9000" card 2018.06.05 17:03:13.712 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK default 2018.06.05 17:03:13.712 AuthContext::encodeEffectiveChat(core/context/AuthContext.cpp:223) : Using effective chat: "7f4c12060904007f0007030102025305000503fb04" card 2018.06.05 17:03:13.712 const(card/base/asn1/CVCertificateChainBuilder.cpp:85) : Get chain for authority "DECVCAeID00104" card 2018.06.05 17:03:13.712 const(card/base/asn1/CVCertificateChainBuilder.cpp:96) : Found valid chain QVector(CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])) statema... 2018.06.05 17:03:13.712 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateDidAuthenticateEac1" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:13.712 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendDIDAuthenticateResponseEAC1" statema... 2018.06.05 17:03:13.713 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendDIDAuthenticateResponseEAC1" network 2018.06.05 17:03:13.713 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data: "\n \n \n urn:liberty:paos:2006-08\n \n http://www.projectliberty.org/2006/01/role/paos\n \n http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand\n \n \n \n \n http://www.projectliberty.org/2006/02/role/paos\n \n urn:uuid:406a62fe-3535-45d1-b926-ffa165f60c5b\n \n \n \n \n http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok\n \n \n 7f4c12060904007f0007030102025305000503fb04\n 3181c1300d060804007f00070202020201023012060a04007f000702020302020201020201483012060a04007f0007020204020202010202010d301c060904007f000702020302300c060704007f0007010202010d020148302a060804007f0007020206161e687474703a2f2f6273692e62756e642e64652f6369662f6e70612e786d6c303e060804007f000702020831323012060a04007f00070202030202020102020149301c060904007f000702020302300c060704007f0007010202010d020149000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000\n 09bc8a9fdcb2fd2edb90ba03f658c27432639cec6cd680fbb33a6653b154a87c\n 627c6731116d7f92\n \n \n \n\n" network 2018.06.05 17:03:13.713 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver")) network 2018.06.05 17:03:13.713 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 17:03:13.790 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server network 2018.06.05 17:03:13.791 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1" network 2018.06.05 17:03:13.791 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1" network 2018.06.05 17:03:13.791 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked" network 2018.06.05 17:03:13.791 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:13 GMT" network 2018.06.05 17:03:13.791 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data: "\n \n \n \n \n \n\nE80704007F00070302\n00\n\nPIN\n\n\n045C767AC50E188148FED5B2BED14F6236C33EF439E79942FC7FA534649E0B75925F4C6970B7E43F36A1F5268355809E0E5FCD894BAEBB35C3D6A765A99BAF5D7F\n5979B5237863F0452478B9DC6A2570C2C0E65299B1201BC016D14AD35FCC32E943EB31265E31AD171543A59992A24D87C3737EE87A4D9352DDFCBE741B6D6BA0\n\n\n\n\n" paos 2018.06.05 17:03:13.791 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:37) : "ConnectionHandle" paos 2018.06.05 17:03:13.791 ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "CardApplication" paos 2018.06.05 17:03:13.791 ...ionHandleParser::parse(core/paos/element/ConnectionHandleParser.cpp:30) : "SlotHandle" paos 2018.06.05 17:03:13.791 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:37) : "DIDName" paos 2018.06.05 17:03:13.791 ...rser::parseMessage(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:37) : "AuthenticationProtocolData" paos 2018.06.05 17:03:13.792 ...parseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:80) : "Certificates" paos 2018.06.05 17:03:13.792 W ...arseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:111) : Unknown element: "Certificates" paos 2018.06.05 17:03:13.792 ...parseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:80) : "EphemeralPublicKey" paos 2018.06.05 17:03:13.792 ...parseEac2InputType(core/paos/retrieve/DidAuthenticateEac2Parser.cpp:80) : "Signature" network 2018.06.05 17:03:13.792 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DID_AUTHENTICATE_EAC2 statema... 2018.06.05 17:03:13.792 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendDIDAuthenticateResponseEAC1" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:13.792 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateEACAdditionalInputType" statema... 2018.06.05 17:03:13.792 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateEACAdditionalInputType" statema... 2018.06.05 17:03:13.792 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateEACAdditionalInputType" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:13.792 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateProcessCertificatesFromEac2" statema... 2018.06.05 17:03:13.792 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateProcessCertificatesFromEac2" card 2018.06.05 17:03:13.792 const(card/base/asn1/CVCertificateChainBuilder.cpp:85) : Get chain for authority "DECVCAeID00104" card 2018.06.05 17:03:13.793 const(card/base/asn1/CVCertificateChainBuilder.cpp:96) : Found valid chain QVector(CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])) default 2018.06.05 17:03:13.793 ...catesFromEac2::run(core/states/StateProcessCertificatesFromEac2.cpp:26) : CVC chain already determined, skip further processing statema... 2018.06.05 17:03:13.793 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateProcessCertificatesFromEac2" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:13.793 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateDidAuthenticateEac2" statema... 2018.06.05 17:03:13.794 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateDidAuthenticateEac2" card 2018.06.05 17:03:13.794 const(card/base/asn1/CVCertificateChainBuilder.cpp:85) : Get chain for authority "DECVCAeID00104" card 2018.06.05 17:03:13.794 const(card/base/asn1/CVCertificateChainBuilder.cpp:96) : Found valid chain QVector(CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]), CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"])) card 2018.06.05 17:03:13.794 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:125) : Performing TA MSE:Set DST card 2018.06.05 17:03:13.794 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:126) : Sending CAR "DECVCAeID00104" card_pcsc 2018.06.05 17:03:13.794 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2281b62d87210193a49db8bb5aea7058eb175a3704095acfd07fafce271dd9caefcf2fab9a805a8e085fe915d1c657c97000" card_pcsc 2018.06.05 17:03:13.820 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:13.820 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08e73729b5d2de0da39000" card 2018.06.05 17:03:13.820 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:144) : Performing TA PSO:Verify Certificate card 2018.06.05 17:03:13.820 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:145) : Sending certificate CVC(type=DV_no_f, car="DECVCAeID00104", chr="DEDVeIDDTR101433", valid=["2018-05-17","2018-08-15"]) card_pcsc 2018.06.05 17:03:13.821 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "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" card_pcsc 2018.06.05 17:03:14.032 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:14.033 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08fd36a8dd22be8af49000" card 2018.06.05 17:03:14.033 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:125) : Performing TA MSE:Set DST card 2018.06.05 17:03:14.033 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:126) : Sending CAR "DEDVeIDDTR101433" card_pcsc 2018.06.05 17:03:14.033 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2281b62d8721010db9672575a39e5c943b898bd0ff1b15d39d0a6ad5f18c48f471c9a57d0c10a88e08279c2db9705cfe4c00" card_pcsc 2018.06.05 17:03:14.066 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:14.066 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08191183cdc37b32d59000" card 2018.06.05 17:03:14.066 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:144) : Performing TA PSO:Verify Certificate card 2018.06.05 17:03:14.066 ...tCertificateChain(card/base/command/DidAuthenticateEAC2Command.cpp:145) : Sending certificate CVC(type=AT, car="DEDVeIDDTR101433", chr="DE000048700233", valid=["2018-06-05","2018-06-06"]) card_pcsc 2018.06.05 17:03:14.066 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "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" card_pcsc 2018.06.05 17:03:14.263 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:14.263 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08e317b40d4812d20f9000" card 2018.06.05 17:03:14.263 ...nalAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:178) : Performing TA MSE:Set AT card_pcsc 2018.06.05 17:03:14.263 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2281a46d8761017b07f193ba2cc8ffafbb4d415b008b89ba73743dbb6a16cc215b59aa0d523be7999e91afca5f4f06d1cf14432f0b2ab4e6e34d71c6c3ebfcae3487984c2bf37f4d1742e0a05d437d4c10555152393899942a5144cfcd3ba23a02cc9d5b8535ae8e087b285b236e2ee84a00" card_pcsc 2018.06.05 17:03:14.319 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:14.319 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0874089d831a71bc1a9000" card 2018.06.05 17:03:14.319 ...nalAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:194) : Performing TA External Authenticate card_pcsc 2018.06.05 17:03:14.319 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c8200005d8751016145fcd27d65a1bb6c9b745c7a7d3ca34ef91a40cf47fc2c50348c7acd8431400a0b8ce4cb3dd710fc63442645320c31ca517d6644093bb69d437fae9887db71eb63daa52ac0644b1dbabfa54a4853ca8e0889e1dd5554ab001600" card_pcsc 2018.06.05 17:03:14.462 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:14.462 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0851ec53484c9a2be59000" card 2018.06.05 17:03:14.462 ...d::internalExecute(card/base/command/DidAuthenticateEAC2Command.cpp:82) : Performing Read EF.CardSecurity card_pcsc 2018.06.05 17:03:14.462 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101b1b999744e47a6d0848be158a57a9cb18e08e1739f2764dfa84a00" card_pcsc 2018.06.05 17:03:14.489 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:14.489 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08352a5a6f782da0b39000" card_pcsc 2018.06.05 17:03:14.489 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb000000d9701ff8e084a0fbaaf40b669b700" card_pcsc 2018.06.05 17:03:14.518 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:14.518 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e101d3230a11b7b6104b32e5203d9716366ede9b8cd81cef7473b198d7ecd09c2cd28359eb18e1622faf991a833f527b9c4dc89211ed497852898d06d92f1b64e3f0be400400f8b62967cb0d31711ecd2b90d3c8bb71c67554a822bd4ab97f75d98603b034774928490fe9e269e48615924dd35312fa87b3e26969a6e538c8b0638acfcf25a0a1df7b1791ad336138b59e70c15888ca285d0e542686703c8b8bb2a941289afd16cece011c1b3a7844d97d76e2d255d57cdce7cc55122b487005fb2b1a88a0ab7c463a8698c26025513e334740fdae6c611e4c2001fa7d7d3e0e94f8990290008e08d0c992da79b8558b9000" card_pcsc 2018.06.05 17:03:14.518 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb000df0d9701ff8e08c25ece53df9c5b2e00" card_pcsc 2018.06.05 17:03:14.546 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:14.547 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e1011692ce01d6afcb7f84e8a99d4614ce21e4b8826636b97978c8b7ff034a3a649fa34e793307097444045ec73b8c39a0882e2cecf1a9ae60efd940f29f74a75e54ece000e3c5bf3ce96c220280db73d6d231741c2323648d39d9cdb40658a4109de9be41ae4efff4ebdf8f353638eddd5ecb3d5c75db701bf0cc966675d2af36a72af0a4390754e3695f5edffc45fb22951e64b51e9c71f246787eaa138d915775358d8bf23f12a5aeabc9e61b5e4c991cb04f6c65dde0543df350a4c3b523de8fb10efa2a229612bbed93f8e15311b5bbd3d6fa1cb9a4bcbdaa14d68dbece09d1990290008e08e0dff65098f8b1679000" card_pcsc 2018.06.05 17:03:14.547 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb001be0d9701ff8e0837d3f69b334156c000" card_pcsc 2018.06.05 17:03:14.575 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:14.575 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e10122d39b83106bcb710c1ed8fcce2c8485b6578f83ce44cb9886473d2a0b3affe3e4bd856f7027a0216a658dec1024771bbbed13854ec1e8a20e8887485784b56a5896cbb00eafe1950058514e06eb3b0166fdbc889ebdc3ad5437d10b26f2e661add4a0c30cb9a298d88f3274721859babbc773723cb30d94112a5468769da49a2045b6aa715e074557d1acdcae9715955998844ddb42b195799c0783aa34766d207db8b01b339525fe936e56e3b5486bf5ccce6c26f5917bd394398fb83eaa652c4e24398e012bffbc2be4886aca0150f813342b56f212d5c5a15e5b252a2a61990290008e086059c64c0c12bf899000" card_pcsc 2018.06.05 17:03:14.575 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0029d0d9701ff8e085dc89176a7cb1a2f00" card_pcsc 2018.06.05 17:03:14.604 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:14.604 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e10118f5d49d1507fea7a7190e767433a6ab8a787c06314d3956d0df3edc09c178a482b19662b8828676f64637a05126ec5dedbf19142a3842c71dcd5df063ad156f95b1edabd74c0bfc275989d61c09b9a8a7f4f5596e83d346cfff58d97d0e011b76a7b8bad4e3d55e0491c06e13603b86d1d09e49896e5ee098ca3143c457cbf363fce3d18e4e4b39bc16a53cb7b28b78d81fc95f0a31ee84f5a031aef76ff5ded73ac9e04d98d9ad27efe24a18372f513ece1726022390d3951c1dc9c7763da1d4301d0db23c0d84401878c169429fcb9bdbfe82b6b6c854bef4dd2204c25fa8990290008e0839f4d58ab28d1be39000" card_pcsc 2018.06.05 17:03:14.604 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0037c0d9701ff8e0826a828870f81fed900" card_pcsc 2018.06.05 17:03:14.633 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:14.633 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e1019b166593af3f13d9fd3b42e8b6bcc02d273ab227d95e38d8445e665dd452508d7de7c4af598d669f381014d43705f36fa2ef841167faf2fdf76e8ade386d5e2c5fc86d3428b1cc2191340e08f87428aae876cb6f1b6eaedfd727740ae38afac30bc7b998805cba16e8e2f209ac7a7fb22157054955ffd98d9b274adacbc62b14a2f428993413b2a1571aafac1f51e8998131614f6e5a4e67d818b198d9c58f0cc4aabb446109878619c1750f4dde310fefb73b4f52b4db42d1cf56a37aa947e58949185562d62891ab75245aa5e623417506ab4340f5f374be630d8b0911beac990290008e083f58eaec5fb3241b9000" card_pcsc 2018.06.05 17:03:14.633 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0045b0d9701ff8e08eb77b31952d6bc8e00" card_pcsc 2018.06.05 17:03:14.661 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:14.661 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e1014df5d9e0e5cea4f7ae1417500f7fc3a89670b1d1f9e2cd1aa6997476ba5fe7c051a6b5417fffd2e71d05ecd88536857739ca7ff28bd7dfe45032621122063dccb7efb310e53485cd3a1f8e65b0833d09d7d15290fedb1b0ea569fcbed49b9ac1198124fdee3de38ab9838e0846d375c3056f8d0bdaf84b152940f5b71e29fbf3d49462f3e107eb5eae7fc69002a228945f12880095adf905471088cda96e280debf5769295231ef3495f87b7bdc848e774eb846e4766a959d8d4283f0d165465835342b4258547dcbd442fa6b9cd0b98292ed35eae7100074a1bb66debd585fb990290008e081c02f03744352f729000" card_pcsc 2018.06.05 17:03:14.661 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0053a0d9701ff8e088ef313f395c99f8f00" card_pcsc 2018.06.05 17:03:14.690 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:14.690 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8781e10163d7023a973a25de36edca57e1f1adaf7da59e172b5968d6d76c73b588a26c542a1ee96e698d93414da9d49d80c2ad53768a1e3bb7c298d39338afe9535d30b6020ccab688b929ec6b6069c281ea3c725d09aa827ba421cef647d632840c22996bcba92b6c2a143e5365a8ea6ac1d4be9a5024807992bee59b83e9ab82822d434fbf6cc7c1867c9e5f6a3370a0abcb6f17ff8e3095aac7af88780ff02edb837598e361faf5dc16fdbb69bff4132fc1dd98d197404dfa86d5e0c8a7cb62272f711a72f8fb04e4aff3a5fa5b74899d545c4320f4e7ff1d07917c5af41d01369751990290008e08d91de53d9b294f799000" card_pcsc 2018.06.05 17:03:14.690 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb006190d9701ff8e086baa3c533a2cb01b00" card_pcsc 2018.06.05 17:03:14.715 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:14.715 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "878181018c06f310b1d97ad53403af720a5446c428ad38281a44aca3449cdbea94e3f4414c743760fa148096485a8f91e15a3118f0e2130b5cc9ec29a00bd53886b072eeefd9fe3d101b6cf4da1515ce12b221167127fbf33a7686e2bd525e6a3fde11a2c60c1f56c78d2d98c35bc8d7f4c9d4f3d0a6af69602e1bb7dcdf7f1e758664b1990262828e08aeab8aa50b71ad6e6282" card 2018.06.05 17:03:14.716 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.2" card 2018.06.05 17:03:14.716 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:67) : Parsed ChipAuthenticationInfo card 2018.06.05 17:03:14.716 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:61) : Parsed PACEInfo card 2018.06.05 17:03:14.716 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.5.2.3" card 2018.06.05 17:03:14.716 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.5.2.3" card 2018.06.05 17:03:14.716 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.5.2" card 2018.06.05 17:03:14.716 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.3.2" card 2018.06.05 17:03:14.716 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.6" card 2018.06.05 17:03:14.716 SecurityInfos::decode(card/base/asn1/SecurityInfos.cpp:73) : Parsed SecurityInfo for protocol "0.4.0.127.0.7.2.2.1.2" card 2018.06.05 17:03:14.717 ...::internalExecute(card/base/command/DidAuthenticateEAC2Command.cpp:106) : Chose ChipAuthenticationInfo(0): protocol "0.4.0.127.0.7.2.2.3.2.2" , keyId "48" card 2018.06.05 17:03:14.717 ...hipAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:221) : Performing CA MSE:Set AT card_pcsc 2018.06.05 17:03:14.717 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2241a41d871101ccf704d26c8074370fdde8d0a5c122c78e085a021429e6e696dd00" card_pcsc 2018.06.05 17:03:14.750 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:14.750 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08949515b2e9bd3b839000" card 2018.06.05 17:03:14.750 ...hipAuthentication(card/base/command/DidAuthenticateEAC2Command.cpp:237) : Performing CA General Authenticate card_pcsc 2018.06.05 17:03:14.750 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c860000608751012a6a4d1f01e3be6a7280b136feb3eb5a6f1ca92bb5fb9e301bbc7e8fdeec134f9c5cb2a026123130956fa56facc740e54d01285fe721c80eed0c48559fe7127b1f334b426707c86ca4a063741248dffd9701008e088cc3baac2095d3e100" card_pcsc 2018.06.05 17:03:14.885 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:14.885 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8721010ebed2d293e76e9cacaa87c50103de030ce4712d627b288d1789edc3c57c4387990290008e089e3c54ce6cbf86769000" card 2018.06.05 17:03:14.885 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK statema... 2018.06.05 17:03:14.885 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateDidAuthenticateEac2" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:14.886 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendDIDAuthenticateResponseEAC2" statema... 2018.06.05 17:03:14.886 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendDIDAuthenticateResponseEAC2" network 2018.06.05 17:03:14.886 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data: "\n \n \n urn:liberty:paos:2006-08\n \n http://www.projectliberty.org/2006/01/role/paos\n \n http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand\n \n \n \n \n http://www.projectliberty.org/2006/02/role/paos\n \n urn:uuid:363ae23e-d201-4aea-b5b2-c75a30bcf375\n \n \n \n \n http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok\n \n \n 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\n 7a4636428e26853d\n 72b85c1b90884976\n \n \n \n\n" network 2018.06.05 17:03:14.887 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver")) network 2018.06.05 17:03:14.887 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 17:03:15.052 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server network 2018.06.05 17:03:15.053 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1" network 2018.06.05 17:03:15.053 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1" network 2018.06.05 17:03:15.053 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked" network 2018.06.05 17:03:15.053 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:14 GMT" network 2018.06.05 17:03:15.053 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data: "\n \n \n \n \n \n00\n\n0CA4040C1D87110105C2C9FE7D03CA395864995204E80D4B8E08B9671BCE4A8DBEC800\n\n\n8C2080001D8711019B276E66F9206FE7362D2431918F7AE58E0824D7196D7C5B815600\n\n\n0C2241A41D871101C703EF9268BCCF87464BA3AE6B2D302E8E08CDE9A75FC65DB69300\n9000\n\n\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n9000\n\n\n0C2241A41D87110141256CBB8D37B069575ABFD81C8A6C4C8E089ADFF63F7133B83100\n9000\n\n\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n9000\n\n\n\n\n" paos 2018.06.05 17:03:15.053 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "SlotHandle" paos 2018.06.05 17:03:15.053 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.053 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.053 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.053 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.053 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.053 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.054 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode" paos 2018.06.05 17:03:15.054 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.054 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.054 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode" paos 2018.06.05 17:03:15.054 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.054 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.054 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode" paos 2018.06.05 17:03:15.054 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.054 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.054 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "AcceptableStatusCode" network 2018.06.05 17:03:15.054 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: TRANSMIT statema... 2018.06.05 17:03:15.054 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendDIDAuthenticateResponseEAC2" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:15.054 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateTransmit" statema... 2018.06.05 17:03:15.055 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateTransmit" card_pcsc 2018.06.05 17:03:15.055 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4040c1d87110105c2c9fe7d03ca395864995204e80d4b8e08b9671bce4a8dbec800" card_pcsc 2018.06.05 17:03:15.081 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.081 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08fb644ff4e0f6138f9000" card_pcsc 2018.06.05 17:03:15.081 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "8c2080001d8711019b276e66f9206fe7362d2431918f7ae58e0824d7196d7c5b815600" card_pcsc 2018.06.05 17:03:15.105 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.105 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08e685095d83ad2a429000" card_pcsc 2018.06.05 17:03:15.105 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2241a41d871101c703ef9268bccf87464ba3ae6b2d302e8e08cde9a75fc65db69300" card_pcsc 2018.06.05 17:03:15.157 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.157 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e089568edfa8e91e83b9000" card_pcsc 2018.06.05 17:03:15.157 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "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" card_pcsc 2018.06.05 17:03:15.301 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.301 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "873101d10c4b2efc4970c434a90779bc6fd622a753c762f0a038faf0d2951c2d3c9a1c3c498b2f57c4ee85fa92e71480fe2f4e990290008e08a3f5d521ea0cd2539000" card_pcsc 2018.06.05 17:03:15.301 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0c2241a41d87110141256cbb8d37b069575abfd81c8a6c4c8e089adff63f7133b83100" card_pcsc 2018.06.05 17:03:15.354 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.354 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08a499289edd46bba19000" card_pcsc 2018.06.05 17:03:15.354 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "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" card_pcsc 2018.06.05 17:03:15.496 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.496 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8731011286468e47ca34252f41571042b3cc451ad50e0516c8aac382642f98aeca85c67639eb15ff0ea28c34dca6dce545c58e990290008e08d7ab59d0fe961a1b9000" card 2018.06.05 17:03:15.496 TransmitCommand::internalExecute(card/base/command/TransmitCommand.cpp:74) : transmit end card 2018.06.05 17:03:15.496 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK statema... 2018.06.05 17:03:15.496 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateTransmit" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:15.496 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendTransmitResponse" statema... 2018.06.05 17:03:15.496 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendTransmitResponse" network 2018.06.05 17:03:15.497 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data: "\n \n \n urn:liberty:paos:2006-08\n \n http://www.projectliberty.org/2006/01/role/paos\n \n http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand\n \n \n \n \n http://www.projectliberty.org/2006/02/role/paos\n \n urn:uuid:fed7631f-51b6-4cb9-b86a-37fc90adb611\n \n \n \n \n http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok\n \n 990290008e08fb644ff4e0f6138f9000\n 990290008e08e685095d83ad2a429000\n 990290008e089568edfa8e91e83b9000\n 873101d10c4b2efc4970c434a90779bc6fd622a753c762f0a038faf0d2951c2d3c9a1c3c498b2f57c4ee85fa92e71480fe2f4e990290008e08a3f5d521ea0cd2539000\n 990290008e08a499289edd46bba19000\n 8731011286468e47ca34252f41571042b3cc451ad50e0516c8aac382642f98aeca85c67639eb15ff0ea28c34dca6dce545c58e990290008e08d7ab59d0fe961a1b9000\n \n \n\n" network 2018.06.05 17:03:15.497 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver")) network 2018.06.05 17:03:15.497 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 17:03:15.602 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server network 2018.06.05 17:03:15.602 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1" network 2018.06.05 17:03:15.603 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1" network 2018.06.05 17:03:15.603 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked" network 2018.06.05 17:03:15.603 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:14 GMT" network 2018.06.05 17:03:15.603 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data: "\n \n \n \n \n \n00\n\n0CA4020C1D8711019593B01D701BE8101C171C7C67D2548E8E08AF5E3BC2524528B900\n\n\n0CB0000000000E970200008E08B914A5F75E39DB500000\n\n\n0CA4020C1D871101A6A3B38AFE28F078568293E5DDD04B5C8E0807C14C3EBAC1F63D00\n\n\n0CB0000000000E970200008E0886C460276A3E25C80000\n\n\n0CA4020C1D8711013D7F273C5ECCF360EACE633DF61DE5B18E082192AAECC2DFD2E700\n\n\n0CB0000000000E970200008E083EC8BE7BB7768C690000\n\n\n0CA4020C1D8711012518211B9E57FBC4EB261E1848CD8CA48E0888152E5EC6C90AE800\n\n\n0CB0000000000E970200008E08E93BC9DA4D5C3ADF0000\n\n\n0CA4020C1D87110130CED76AB1962EA1087750B3C817A9298E08CF028E8AC1448DDB00\n\n\n0CB0000000000E970200008E08ABC8E01BEDDAE10E0000\n\n\n0CA4020C1D87110126CCF9D96AE522CBC9A1610D9A828E878E08E7E0678028E9D3C200\n\n\n0CB0000000000E970200008E082C027679D2AF8F2E0000\n\n\n0CA4020C1D87110118B4D21246B2AA395CDB93AB6C94E7938E08A544D4A28602396200\n\n\n0CB0000000000E970200008E088264F9B59EB9DA200000\n\n\n0CA4020C1D871101D9F69C4CE1968DEF293726739A3259508E0862B1586A4E7E73B900\n\n\n0CB0000000000E970200008E08B0FA651E89A8F99A0000\n\n\n0CA4020C1D871101389CA1906176BD57C8165BCAA9513D558E08A608E9319219E5B100\n\n\n0CB0000000000E970200008E0833471036F62EF8FE0000\n\n\n0CA4020C1D871101434DB6309DF4C9B0A3A44E173344D2BE8E08AC8A4BBA53F1B91E00\n\n\n0CB0000000000E970200008E08D00483DCF88E77530000\n\n\n0CA4020C1D871101249DB13FAF31319394CF9C6322FEFE598E083927F2F6074925E400\n\n\n0CB0000000000E970200008E08F70714CD8CD826720000\n\n\n\n\n" paos 2018.06.05 17:03:15.603 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "SlotHandle" paos 2018.06.05 17:03:15.603 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.603 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.603 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.603 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.603 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.603 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.603 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.603 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.603 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.604 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.604 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.604 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.604 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.604 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.604 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.604 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.604 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.604 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.604 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.604 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.604 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.604 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.604 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.604 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.604 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.605 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.605 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.605 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.605 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.605 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.605 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.605 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.605 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.605 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.605 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.605 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.605 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.605 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.605 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.605 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.605 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.605 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" paos 2018.06.05 17:03:15.606 TransmitParser::parseMessage(core/paos/retrieve/TransmitParser.cpp:30) : "InputAPDUInfo" paos 2018.06.05 17:03:15.606 ...mitParser::parseInputApduInfo(core/paos/retrieve/TransmitParser.cpp:66) : "InputAPDU" network 2018.06.05 17:03:15.606 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: TRANSMIT statema... 2018.06.05 17:03:15.606 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendTransmitResponse" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:15.606 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateTransmit" statema... 2018.06.05 17:03:15.606 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateTransmit" card_pcsc 2018.06.05 17:03:15.607 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d8711019593b01d701be8101c171c7c67d2548e8e08af5e3bc2524528b900" card_pcsc 2018.06.05 17:03:15.636 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.636 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08c90b0bb89951795b9000" card_pcsc 2018.06.05 17:03:15.636 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08b914a5f75e39db500000" card_pcsc 2018.06.05 17:03:15.660 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.660 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "871101c3ea04af1c25f27cfa93fcbcb6a0c5e9990290008e085b65a4d635a9bdcb9000" card_pcsc 2018.06.05 17:03:15.660 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101a6a3b38afe28f078568293e5ddd04b5c8e0807c14c3ebac1f63d00" card_pcsc 2018.06.05 17:03:15.684 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.684 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08b16ffc961669d1439000" card_pcsc 2018.06.05 17:03:15.684 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e0886c460276a3e25c80000" card_pcsc 2018.06.05 17:03:15.708 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.708 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8711017735b40677757b27e10e07006bc7a51e990290008e08c6c3fa1ffbcf85f99000" card_pcsc 2018.06.05 17:03:15.708 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d8711013d7f273c5eccf360eace633df61de5b18e082192aaecc2dfd2e700" card_pcsc 2018.06.05 17:03:15.738 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.738 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e0895f9b6734e04c2839000" card_pcsc 2018.06.05 17:03:15.738 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e083ec8be7bb7768c690000" card_pcsc 2018.06.05 17:03:15.762 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.763 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "87210187c5a367aadb8bed3b3f9d91afdad53654b6c5d0aa4f72d15de4ba94caee0f97990290008e082e7ec124d93b568f9000" card_pcsc 2018.06.05 17:03:15.763 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d8711012518211b9e57fbc4eb261e1848cd8ca48e0888152e5ec6c90ae800" card_pcsc 2018.06.05 17:03:15.787 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.787 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08432d5f8b0fc76de09000" card_pcsc 2018.06.05 17:03:15.787 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08e93bc9da4d5c3adf0000" card_pcsc 2018.06.05 17:03:15.811 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.812 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "871101ce082982b2e4359cea4a6765e239b5a6990290008e087e3600374c0ed8fe9000" card_pcsc 2018.06.05 17:03:15.812 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d87110130ced76ab1962ea1087750b3c817a9298e08cf028e8ac1448ddb00" card_pcsc 2018.06.05 17:03:15.840 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.840 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08151b1f982bc280e39000" card_pcsc 2018.06.05 17:03:15.840 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08abc8e01beddae10e0000" card_pcsc 2018.06.05 17:03:15.865 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.865 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "871101ae036772348cd7b85581ea1b9176cc2d990290008e083cce0d111bde233f9000" card_pcsc 2018.06.05 17:03:15.865 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d87110126ccf9d96ae522cbc9a1610d9a828e878e08e7e0678028e9d3c200" card_pcsc 2018.06.05 17:03:15.889 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.889 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e086d5b07869605a7f99000" card_pcsc 2018.06.05 17:03:15.890 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e082c027679d2af8f2e0000" card_pcsc 2018.06.05 17:03:15.914 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.914 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8711017968e4bc3fe6cb693283f49c380909de990290008e0876764c629045ab419000" card_pcsc 2018.06.05 17:03:15.915 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d87110118b4d21246b2aa395cdb93ab6c94e7938e08a544d4a28602396200" card_pcsc 2018.06.05 17:03:15.943 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.943 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08b169f33b66f18e909000" card_pcsc 2018.06.05 17:03:15.943 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e088264f9b59eb9da200000" card_pcsc 2018.06.05 17:03:15.968 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.968 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "8711011c597ef969ad0795b47027e959b68bb3990290008e089ce10ba4f3555d709000" card_pcsc 2018.06.05 17:03:15.968 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101d9f69c4ce1968def293726739a3259508e0862b1586a4e7e73b900" card_pcsc 2018.06.05 17:03:15.993 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:15.993 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e083dfe8b1873f2a1dd9000" card_pcsc 2018.06.05 17:03:15.993 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08b0fa651e89a8f99a0000" card_pcsc 2018.06.05 17:03:16.019 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:16.019 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "872101db06d0888659db3391b61be774283d68122fec2b272da7ec8f5a385274b5eac8990290008e0841b756fe47e1322f9000" card_pcsc 2018.06.05 17:03:16.019 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101389ca1906176bd57c8165bcaa9513d558e08a608e9319219e5b100" card_pcsc 2018.06.05 17:03:16.037 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:16.037 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "99026a828e08337493822f09e4276a82" card_pcsc 2018.06.05 17:03:16.037 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e0833471036f62ef8fe0000" card_pcsc 2018.06.05 17:03:16.062 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:16.062 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "872101dd05690c315a584c90ab4ecbdefe7f21a776fb170e8f193cc03cace461660e6a990290008e08b39a905b12f409409000" card_pcsc 2018.06.05 17:03:16.062 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101434db6309df4c9b0a3a44e173344d2be8e08ac8a4bba53f1b91e00" card_pcsc 2018.06.05 17:03:16.094 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:16.094 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "990290008e08e3bbe31346cbeb049000" card_pcsc 2018.06.05 17:03:16.094 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08d00483dcf88e77530000" card_pcsc 2018.06.05 17:03:16.122 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:16.122 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "874101182e633026e2865d86e0e90e2ae323ca68ee56a1425a473495dac65db32d18bfbfaeabbb3c33996f62e85ec9aae06b8e6485ad2d827d1add9df44e57b83e717d990290008e08271e0d4aac9814c39000" card_pcsc 2018.06.05 17:03:16.122 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0ca4020c1d871101249db13faf31319394cf9c6322fefe598e083927f2f6074925e400" card_pcsc 2018.06.05 17:03:16.140 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:16.140 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "99026a828e0830ee77d9b3bf0b096a82" card_pcsc 2018.06.05 17:03:16.140 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0cb0000000000e970200008e08f70714cd8cd826720000" card_pcsc 2018.06.05 17:03:16.167 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:16.167 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "874101cca8e4c08e9b238d0b319cc0e1d9f9fcee4825eb1d0060785bdc8a887825958fd4d884abb6eef3129fcc5755f555105eb8762a0791d7c597ecf2fde684328181990290008e08c3a7e036af59fb169000" card 2018.06.05 17:03:16.167 TransmitCommand::internalExecute(card/base/command/TransmitCommand.cpp:74) : transmit end card 2018.06.05 17:03:16.168 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK statema... 2018.06.05 17:03:16.168 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateTransmit" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:16.168 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendTransmitResponse" statema... 2018.06.05 17:03:16.168 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendTransmitResponse" network 2018.06.05 17:03:16.169 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data: "\n \n \n urn:liberty:paos:2006-08\n \n http://www.projectliberty.org/2006/01/role/paos\n \n http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand\n \n \n \n \n http://www.projectliberty.org/2006/02/role/paos\n \n urn:uuid:6a72c135-f254-470d-b031-720c178f2f33\n \n \n \n \n http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok\n \n 990290008e08c90b0bb89951795b9000\n 871101c3ea04af1c25f27cfa93fcbcb6a0c5e9990290008e085b65a4d635a9bdcb9000\n 990290008e08b16ffc961669d1439000\n 8711017735b40677757b27e10e07006bc7a51e990290008e08c6c3fa1ffbcf85f99000\n 990290008e0895f9b6734e04c2839000\n 87210187c5a367aadb8bed3b3f9d91afdad53654b6c5d0aa4f72d15de4ba94caee0f97990290008e082e7ec124d93b568f9000\n 990290008e08432d5f8b0fc76de09000\n 871101ce082982b2e4359cea4a6765e239b5a6990290008e087e3600374c0ed8fe9000\n 990290008e08151b1f982bc280e39000\n 871101ae036772348cd7b85581ea1b9176cc2d990290008e083cce0d111bde233f9000\n 990290008e086d5b07869605a7f99000\n 8711017968e4bc3fe6cb693283f49c380909de990290008e0876764c629045ab419000\n 990290008e08b169f33b66f18e909000\n 8711011c597ef969ad0795b47027e959b68bb3990290008e089ce10ba4f3555d709000\n 990290008e083dfe8b1873f2a1dd9000\n 872101db06d0888659db3391b61be774283d68122fec2b272da7ec8f5a385274b5eac8990290008e0841b756fe47e1322f9000\n 99026a828e08337493822f09e4276a82\n 872101dd05690c315a584c90ab4ecbdefe7f21a776fb170e8f193cc03cace461660e6a990290008e08b39a905b12f409409000\n 990290008e08e3bbe31346cbeb049000\n 874101182e633026e2865d86e0e90e2ae323ca68ee56a1425a473495dac65db32d18bfbfaeabbb3c33996f62e85ec9aae06b8e6485ad2d827d1add9df44e57b83e717d990290008e08271e0d4aac9814c39000\n 99026a828e0830ee77d9b3bf0b096a82\n 874101cca8e4c08e9b238d0b319cc0e1d9f9fcee4825eb1d0060785bdc8a887825958fd4d884abb6eef3129fcc5755f555105eb8762a0791d7c597ecf2fde684328181990290008e08c3a7e036af59fb169000\n \n \n\n" network 2018.06.05 17:03:16.169 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver")) network 2018.06.05 17:03:16.169 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 17:03:16.221 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server network 2018.06.05 17:03:16.221 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1" network 2018.06.05 17:03:16.221 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1" network 2018.06.05 17:03:16.221 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked" network 2018.06.05 17:03:16.221 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:15 GMT" network 2018.06.05 17:03:16.221 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data: "\n \n \n \n \n \n00\n\n\n\n" network 2018.06.05 17:03:16.221 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: DISCONNECT statema... 2018.06.05 17:03:16.221 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendTransmitResponse" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:16.221 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateSendDisconnectResponse" statema... 2018.06.05 17:03:16.222 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateSendDisconnectResponse" network 2018.06.05 17:03:16.222 StateGenericSendReceive::run(core/states/StateGenericSendReceive.cpp:213) : Try to send raw data: "\n \n \n urn:liberty:paos:2006-08\n \n http://www.projectliberty.org/2006/01/role/paos\n \n http://www.bsi.bund.de/ecard/api/1.1/PAOS/GetNextCommand\n \n \n \n \n http://www.projectliberty.org/2006/02/role/paos\n \n urn:uuid:cc6fa9c1-74f4-4924-92b7-2463b6fcf71c\n \n \n \n \n http://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok\n \n \n \n\n" network 2018.06.05 17:03:16.222 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8445, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8445/ecardpaos/paosreceiver")) network 2018.06.05 17:03:16.222 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 17:03:16.262 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:225) : Received message from eID-Server network 2018.06.05 17:03:16.263 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Server" = "Apache-Coyote/1.1" network 2018.06.05 17:03:16.263 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Content-Type" = "application/vnd.paos+xml;charset=ISO-8859-1" network 2018.06.05 17:03:16.263 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Transfer-Encoding" = "chunked" network 2018.06.05 17:03:16.263 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:241) : RawHeader | "Date" = "Tue, 05 Jun 2018 15:03:15 GMT" network 2018.06.05 17:03:16.263 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:253) : Received raw data: "\n \n \n \n \n \n\nhttp://www.bsi.bund.de/ecard/api/1.1/resultmajor#ok\n\n\n\n\n" network 2018.06.05 17:03:16.263 ...ndReceive::onReplyFinished(core/states/StateGenericSendReceive.cpp:255) : Received PAOS message of type: STARTPAOS_RESPONSE statema... 2018.06.05 17:03:16.263 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateSendDisconnectResponse" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:16.263 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateStartPaosResponse" statema... 2018.06.05 17:03:16.263 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateStartPaosResponse" statema... 2018.06.05 17:03:16.263 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateStartPaosResponse" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:16.264 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateUpdateRetryCounter" statema... 2018.06.05 17:03:16.264 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateUpdateRetryCounter" default 2018.06.05 17:03:16.264 StateUpdateRetryCounter::run(core/states/StateUpdateRetryCounter.cpp:22) : StateUpdateRetryCounter::run() card_pcsc 2018.06.05 17:03:16.264 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "00a4020c02011c" card_pcsc 2018.06.05 17:03:16.271 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:16.271 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "6a82" card_pcsc 2018.06.05 17:03:16.271 PcscCard::transmit(card/pcsc/PcscCard.cpp:289) : SCardTransmit cmdBuffer: "0022c1a412800a04007f0007020204020283010384010d" card_pcsc 2018.06.05 17:03:16.297 PcscCard::transmit(card/pcsc/PcscCard.cpp:291) : SCardTransmit for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:16.297 PcscCard::transmit(card/pcsc/PcscCard.cpp:273) : SCardTransmit resBuffer: "9000" card 2018.06.05 17:03:16.297 Reader::getRetryCounter(card/base/Reader.cpp:151) : StatusCode: SUCCESS support 2018.06.05 17:03:16.297 I Reader::updateRetryCounter(card/base/Reader.cpp:103) : retrieved retry counter: 3 , was: 3 , PIN deactivated: false card 2018.06.05 17:03:16.297 BaseCardCommand::execute(card/base/command/BaseCardCommand.cpp:42) : ReturnCode of internal execute: OK default 2018.06.05 17:03:16.298 ...r::onUpdateRetryCounterDone(core/states/StateUpdateRetryCounter.cpp:39) : StateUpdateRetryCounter::onUpdateRetryCounterDone() statema... 2018.06.05 17:03:16.298 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateUpdateRetryCounter" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:16.298 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateCleanUpReaderManager" statema... 2018.06.05 17:03:16.298 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateCleanUpReaderManager" default 2018.06.05 17:03:16.298 ...CleanUpReaderManager::run(core/states/StateCleanUpReaderManager.cpp:24) : Going to disconnect card connection card 2018.06.05 17:03:16.298 ReaderManagerWorker::stopScan(card/base/ReaderManagerWorker.cpp:130) : Stop scan on plugin: governikus::PcscReaderManagerPlugIn default 2018.06.05 17:03:16.298 ...CleanUpReaderManager::run(core/states/StateCleanUpReaderManager.cpp:28) : Going to disconnect readers card 2018.06.05 17:03:16.298 ReaderManagerWorker::stopScan(card/base/ReaderManagerWorker.cpp:130) : Stop scan on plugin: governikus::RemoteReaderManagerPlugIn statema... 2018.06.05 17:03:16.298 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateCleanUpReaderManager" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:16.299 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateCheckRefreshAddress" statema... 2018.06.05 17:03:16.299 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateCheckRefreshAddress" default 2018.06.05 17:03:16.300 StateCheckRefreshAddress::run(core/states/StateCheckRefreshAddress.cpp:80) : Current URL: "https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=1ae20737a5f5e3dad602d47ee10111f5610d1845" default 2018.06.05 17:03:16.300 StateCheckRefreshAddress::run(core/states/StateCheckRefreshAddress.cpp:82) : SubjectUrl: "https://eid-prod.connect.verwalt-berlin.de" network 2018.06.05 17:03:16.300 UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46) : SOP-Check( "https://eid-prod.verwalt-berlin.de:8443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= false default 2018.06.05 17:03:16.301 StateCheckRefreshAddress::run(core/states/StateCheckRefreshAddress.cpp:91) : SOP-Check failed, start process default 2018.06.05 17:03:16.301 ...shAddress::sendGetRequest(core/states/StateCheckRefreshAddress.cpp:133) : Send GET request to URL: "https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=1ae20737a5f5e3dad602d47ee10111f5610d1845" network 2018.06.05 17:03:16.301 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: 8443, peerHostName: "eid-prod.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.verwalt-berlin.de:8443/gov_autent/async?refID=1ae20737a5f5e3dad602d47ee10111f5610d1845")) network 2018.06.05 17:03:16.301 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 17:03:16.302 ...amHandlerImpl::~DatagramHandlerImpl(network/DatagramHandlerImpl.cpp:70) : Shutdown socket card_pcsc 2018.06.05 17:03:16.303 PcscCard::disconnect(card/pcsc/PcscCard.cpp:143) : SCardEndTransaction for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" card_pcsc 2018.06.05 17:03:16.367 PcscCard::disconnect(card/pcsc/PcscCard.cpp:148) : SCardDisconnect for "REINER SCT cyberJack RFID basis 0" : "Scard_S_Success" network 2018.06.05 17:03:16.480 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig" network 2018.06.05 17:03:16.480 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors network 2018.06.05 17:03:16.481 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-SHA384, bits=256, proto=TLSv1.2) network 2018.06.05 17:03:16.481 I (:0) : Used session protocol: "TlsV1_2" network 2018.06.05 17:03:16.481 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384) network 2018.06.05 17:03:16.481 I (:0) : Used peer certificate: QSslCertificate("3", "3c:3f:e6:1c:7c:28:28:d9", "Kfl3PTkdwoi1P7sQWG1dvQ==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.verwalt-berlin.de")), QDateTime(2017-10-16 13:01:51.000 UTC Qt::TimeSpec(UTC)), QDateTime(2020-10-21 23:59:59.000 UTC Qt::TimeSpec(UTC))) network 2018.06.05 17:03:16.481 I ...dress::onSslHandshakeDone(core/states/StateCheckRefreshAddress.cpp:162) : Handshake of tls connection done! default 2018.06.05 17:03:16.481 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048 default 2018.06.05 17:03:16.481 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000 default 2018.06.05 17:03:16.481 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" default 2018.06.05 17:03:16.481 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "0546c2b01048cb77669003ab0743255f94582f010baa85308133f514e218ff3c" default 2018.06.05 17:03:16.481 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C") default 2018.06.05 17:03:16.481 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.verwalt-berlin.de") SN= "3c:3f:e6:1c:7c:28:28:d9" for URL origin QUrl("https://eid-prod.verwalt-berlin.de:8443") default 2018.06.05 17:03:16.481 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384 default 2018.06.05 17:03:16.481 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224 card_pcsc 2018.06.05 17:03:16.534 PcscReader::updateCard(card/pcsc/PcscReader.cpp:194) : old state: "(0x20122) CHANGED PRESENT INUSE" | new state: "(0x20022) CHANGED PRESENT" default 2018.06.05 17:03:16.621 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:212) : Status Code: 303 | redirect URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1iQ6gZc1tMoEEg1fv1R3j7bZe%2B%2FYfczICI847h7uxz3405%2BP9%2BunrZjmZuh%2F%2BQr%2FDH39qeizIW%2F66pevvid%2Bo77%2B%2Bdc%2Fzcn7hYzfnWIeh34ufroX9fP330d%2F%2BbpO%2FfchmZv5e5%2B8i%2Fn7kn13GUP%2FjvwMfR%2BnYRmy4fX1J76Yl6ZPlt82qpdlnL%2BDYNHk3%2B4p%2Bc%2FZ0PdFtvx8H2VPXsu3tJheTf9zXoDsWkxVMWlDvwzPIgV%2FiHaKrGi2wi2m7VUsf56L%2Bcf5lfwXHCZyGEnTbxBFY9%2BwHMW%2FpRAGf8sSiMZgkspKtPj6k8L%2F8rVAsRJKS%2FwbjZfZNwzCoW80AmffoJSmUZzAaSRN7pn9XzB7wy9f%2F5skCbQoCuRbVuTQvYiiv6U0TH9DEgonoZJGUPKH%2BHleC6Wfl6RffvmKQDD1DSK%2BQbgH498h9DtM%2FAxRePz1p%2BAvar8V9fUPJX%2F%2FbfH09xr%2B3xWczHMx%2FVDq11%2F%2Fqsx%2FUeKfwN9s9Yfwv9rTXZJlnf%2FpJzfkxU9B8lqL%2F33jG969%2BLu7Ztmt%2Fq%2Fgr39sMn7%2FB7HfhT6bznEpcuYvJ%2F2PwP3puP3yb8L4ZEn%2BkPPjj9896naofd9%2F3tGfh6kCEQiCQQgDb2e9Z%2FzXbZf8NmGCZUlGljmKFWRGQzgMESQMo1iWJnCaE%2BnXn7xzvKH%2FH%2BUJr%2BJd9MttuL8%2F2W0Io1jqIf%2BJeVXD1Cz1%2B%2F9CVlLMMEJ9y9Lshx7z%2BbtWnEpfDn8gzOd%2FIwMCIfoHvnxuqv%2F6p5MU%2BS3kd8x0QmcYDhcFhZBUQmNlkZFFntA4klF5mcP%2FXzBMc%2FIN%2Fm%2F8HwH8BibEIfqHvf76g%2FvhsWWTJUvxq6Eo%2FMVzHDO5FbMrLFMpHGMbO29HqjbESr1lJmMLOmszexUPB3cxKluZActEHtM5omFTP%2BbygW0rX4Q95uJQnZMndvAXY%2F4%2BMfPYTn1l72NMW8E3WEViYF%2FgakN3A0d4Nuzf1vCM9vua2fvCQIFktkJjcMxvC5h9j31IND2RfiVPe8lkdYs5vE0RfI2fJhRCwcO%2BhNpgKYlzP5KrpChvCyrjRO6X%2BPnqbOkFxfKwRO%2FgTKXXqr%2Bdl8FiIe8JqOEJu3kJsHEpuyEO95jyz2N%2Fhf%2Fl3%2BH%2FT%2BB%2F%2BXf4%2FxP4X%2F4d%2Fn8LX1FYpf1hqO5Td41E7xB7W1tkmAf3hbEp5nYPlqu02yUEBnmcVqokW17IbgnyDLVrDzoqHf9EME7B8wSDm0dY9XowgAlnV%2F61YK2luODRMl9kVb8igXBIJZC4zL40u7iSg%2Fdp%2B9E6%2BmAI7kzwRRSEcvJ4UyId2CazpWeOFkDrxmhYPPQzRRYNVbf%2By1qBzzT%2BWEYRLCAjKlOWFMicHt1JxlvlFnXstV7LR%2B4QsAq3Hr7dQebqRn3qOm2yTTUn4AMT5zjWDV8o1cJx78m7xzGQH%2BmFgYhqP5EccNLplLFq74VC68khKCF1kpEGJD4Cwla%2BoQWthcVbWrFHDz8rzzjFL1ihjVUeIwuAC4y6TL4l9rGARUkgkPKZ44Xf4qkfsTNF8Rh8dBgDJu9d4RmbYYdj2CX%2B9%2BslO4bwhWkZxmDmH96f8%2FttgV0ROv6frTX%2FZq0fBpos88n4wMUngzOlujy24KfW%2BoRSheCL09blByepSQKJ3qT3sfTfJeTBnYDNnMjI6%2FRRU4fMpFJwylQB6tAhIqclKnhh2hUNrmowzBUZ1oGuvmAoQNDdu2xDuacrvu%2FGviRAnFl4mxmMfPhI9SGzRTkFZL%2FhQNQ1y5r2vOvFLKBZukaDu0zlC%2FIGo%2BILvT6uXVzyR2xAKoyEZShoql37VJIDfszm79ryl%2BMACGE%2FshioD5Amck6lKtmTpLkadjciCv2BssC0fimWz9A8hxd5H2V7N%2B4JqENTGAuNZm9HpztDjjBG06D3wBq%2BVoKItbaECtuIBeWWlqI6vqolvVz4S%2BS%2BZHlJBGTkvPZffvkT%2BEco%2Ffvo%2BdfB3%2BPrjyl%2FpI4%2F0hLXjHUx%2Ff7vb3nq94Hf8vuvBU4bR3vuuWADE9kWx%2BvKe2qiLL42MSoI02OwX72%2FweJ7nVRl1jG%2BddwF3cAAC0FTteAt6OHtOdosgGqyBmcIUFVS2MIGRn7E7Kj6OjD3GZifKaSfGfgUkA51MpQwIZZ%2FiGS00j5KgcQsos9s0jMXoysB8AqeztYqQ8bklaDwS73SeFohBbDlduqeWf8yBtvTrCaG8gaj3QJ3vBccbeEoJhr58iNOAwmHsDySUUdchk7Ng8Tg8c6exrnGgle2aQaCdVHnIfkyBZEd8FC%2BerSF822aiLmpPwnvFaWFzuUphZk%2Bhh4id6dPG3Wm0w87yGlEpJchVz78GQi0F7grdtqgr2hBwvww1b%2Bo%2Bh%2BG%2FjDWPzKa227%2FzwYkvJJ9SxsQQ88rn00aQIydKE1kThZVSw3M8IbwU0%2FmNA6DtH%2FkR%2Fxok3HtuE3FxSdj7zZxrY4Fqx0CcS3pKHAz4wnxVPZN7Qb9WS3b9kbuuAfFG5MdbGcQ%2FEFOHdy2cRsKYg1gb%2BLzgjcAYdt9FNxKEtC%2Bdg4KVC7oAHr0wekflimgYeum68ia2Xmnn%2FMozx3GdEzB%2BStbhEMOxvaAQVYJiFf7WJoa4WDuakZGSsj2ZHuMRV6oPeyKs0aVkMwXfmQB7zYkzMH8vGAHHYbhIastG8U6Aqi8L3eboMsdI%2B8mYkhH3fuXfAaU0dLM8yHGZhXGCwjsgcW2%2BW5Rp0EnqeP6tJarntuPjsjoUMmnzIS8IWD96GpOP2pLXpgICBvGXHK1q%2Fcn2JfxzrOVOuEu2VMZQMNAlpqaOr%2B9QoFU3T5mu9j9DjUbpEKnNw0zxfghLS0nc7cejFXI6gKoCj4ALed8lS2MBSx1tdGorP7rqeMImz%2BXuU54mZsSO2WFxxXdfCoUGaMDcqPngkMYZ%2Bs1sp2W8ECErxyf9msbTEEBJsJsghnXcuuTCo%2F9c3i0VBIPptdhJUhX0O6VrKXfC6GIRPqi1DpKHPB8Uz76ASxeJmAS2iGRI9N46eJkJWEtjAAve3QI%2BaTYQW1ssY0c%2FuRj1xbmW00wmkQOKbNGTtIesgmcvTOcvNNlBkhz2vWAZ2%2B6imnJHjlqCOYuuZOGz8Ag%2BMBorgMw1grzC2DuQ%2BLK20cXU3PKU4PLGdfEyqT1CHz3wydOYvgk%2BhMzYaMeus7DZoUNGbtY7%2Fwyp7toKUMapTNApFUl7O7p1%2BvehCi1ENOilZMszg6REMMEH7KHc3W9YmUU8pyJ31kMcfnPFZDuvBqVeBngXe%2Fqq%2FLQ527NNss%2FiDzYDfe94LgVFMW8LvvsddfauRkyTxHFedxTWD0%2Fb%2BBZJTJiBSquht4aUPFQhmcBXthyYj8jXHqr1l2QhkJQVyUN8eagCoRdv5Qt4wymFW%2B%2FOHsx7QITKqaaBecUlAKQfAPMxxLZLWzniuVfvrdKEd9Z2aczPh9P1ABVCFVDUXNjHs0aKOCPrtBMZi1bLj28A5pz2uyNBwp5xWihvlgm45uHI42IvMXs2UObN7%2B2qQidnYeGUAiMj91FrLMCXATphyNxfTLsAt5MWssgEgMm8BGcqnlf%2FSBRRKfjXV4FJjxBepANy6avuXj2FQU%2BpjxQw5sHCaahr9ykKMM%2BQNkdplxtxHb9w9ysJlgOBvE8DonCUCUiZlwXWJ5asQg5mmlcxTtf8%2FHQxdnU%2FHz3YMQDzk1rSXmHJwfRjHRVASy7w4rW2MqL4Qbwc3S59ziujGyeTWxXJmUbs7O1Ox8Q21Ut6uDSYkR5BEHjaQEjuRJ%2BynRvV2mi8zkJAbd%2FGDcfQ%2FsP9dbvHSwGXl43n6LLZ7hwFf5Ul4pUqWAwyDKI5Gcn0YvnkfFwHSpi6znAVEbwPF1W4v2XHsoCPb73jxSD9ooNvQn1TL%2BQAV%2FB7esJ%2BIEz%2BrWFoX3aYt3FSo8oK4ZgMcS1600XNABEsZtVeM2WDTFP18yJAqY9Ng8%2FhFFOs49Xj1hAIMYLYuYmEE8Nz%2B1tIntt96xwluCSlIMJeDJH4p1P30K9Nsmj15sVs4SCneYsUNtMnZjRjXJzXj4Sa2ZZh1K7wZzQg8rGn%2FpbWD%2BYTG0jsjGrCF61wSG8QOZpqJeP9oXxp72ZtqYOSQjOs%2Bw3tTh%2B8DWhqB2zKwbpyLKmm9FiVKLIGpfV%2FWuIzSZK39IYrAFwvN9wGY7g5S8Z3Erq%2BM5lSQgetTLJ1rBmmMlGj96y38KH1ejjI1jbYiGHUKAtraAQGcAHFuunmGAE%2FQ6xZKCA2SmZ%2BClPMGYaDR4Yc8Cld0hxwk9ig5otJnodyCvbT%2BJOJ8divUA3aHef6hnM7GUU9C0LRTgWSO%2Fsp6pPc6LSE%2F489pb1WJsqccJJDo9DCYWM8hx4acSIjktDlYgmAzstBxorvYhjXWx5fdqjT66fZUcqAlzV%2BtN5w4tXUr7f%2BsbZAsV0dvpk4U1EkWeaURJgEFlW2p1q7u%2FgTVQHIlNNV5O3aPIKyXxdJzmgairWdkITzRGthQsbR88loDxeE0NIYjuaT7zNeAG4eTJVehsubVXv2KHTG5ICreuCoeAWvpBPerBU04%2FK4%2B3hAXhfzChdGercsSRI0dSPS86rrpmNlYbBepVeOcFh0CeHlDAvazj7RJFldno67UyTjmxz4SOE1It3PFrk019zCbopCHSlGLzV7O4wQaJyaLXcXPMOC7HUz4ke6RzabvJ7ewYVDKpbO53p9rrEm6A8RcDOg1MBWhYdtw7s1ZBsV8vFAxtM3w9IPT97ByoPJFoIdWCV%2Fsxd5BQdzM83frV7TSdpYXYh3LqiMqb3MmHkA2CEFWlFfV1QM3wk2xZmSwnLbvrsIQZgH6T1iHf84xeay31qFnt05GQlTlXXbDDYp4E02fxoIMlH2yySyGipn9VhyGMhUzMI6bVJ4Nl5yMV5V5UlVDJXU9YsAOT%2B2wAnHZbGR%2BTHrx2%2Br59vLZoCCAW2ikxBzIxW63tG8keb29E1x5jAokbNXFXkRGRpwWBZJMsDcxhm%2Bjh9KUAJXWHFwbYZie0cyfcj0Qk2JGTO6Qq19Kb16n3lqyDZscGWXj9oJYEP0mTVgwJhhrzZ4wRrAmoRj2Ni5KpQwbcnvQAmDTPcKB5utRFLFovvV3jFHssNepHNmzPU0bvR7XN5s28SCdiS1hyQWMtGBxz97WE5UNUpsfGXddNFldMmUSJdRjmCeJAx%2BrW2a4Dvm6U7b3qYOooQZG%2BsKAwO9WerBFMUI7dTFp0cUtUsbWOyaJidA6XBXA8KzkgqnSMDMHh8ZOsuoPJciT5UkvQGscTLGzhKqtlYyEYeMFih3ImA7mdE80icveOIP7X6ts41MC%2BzCRfqvJKTIRgZnWpZOEaPcHbl46Y5fvJiqH7sD7aghO1BjP1hLeRhrit%2FOmQd7mp0X3H1GZDknZnCrnqqqyI1ncSVXuyjOkEPpllZrLSxVcQsRzqSNwmqhVJcHyCRqUMG8CKOx1RpEK2t43kQOQFT6cc1KaN7fLZmZLUuqrS7mA%2BesPgcRQ5HzPqIHfgTkbsaPOXHghEvWuOkhhtkwbW3vY1UMQsaWFCRq0wS2DMvBKahYjwa%2BXi02%2Fbk3AVOmRRJxvPJq6tsDmxIp42oZBMITYf%2BeqlV%2Fnw77eWVYaUyucJU2uSL%2BxnnzKfXFqZJi9bDLr8OGP9qER6ez7a5W1tmshhtHUMEuyzrtenIZRcWWnplium4MznORSwNXGtZo8srA%2B6Su5aQeYm%2BVXsXi8bFBajbQw5iM0nljmXTLCWZtAtN3NeKa2PFa1jpaiCzRSKQwyk0xFHoz%2B0sF61AuZ2trT7Y1gsdzWO%2FuJuadkYxS9bNl5%2FC%2FcxguVqTrdEiAZfOY%2BMB2MIqmSjwAhp74NiQe93HKYoWHwuy8LNnEY7FGoVJB5sdyfDY%2FCEPkIggkCXDu0Y9iBcRze0z7%2F0Ohoo8LjuanSoq%2BUA6%2BAhrDHwHyGzmVhyRHy%2FoXuo7pAkTXKCr%2FwRraCzPpxE0fP2RjdCMb%2BIQfeZsgnpWSx00YjlWM8iBhs%2Fh9oDS5QxidAmYnTBNF4IJ1ZhPYL0fL8P1HUHfD4iPru5D2TndEdPF70FASoXAeuFJ3TvwjqrkMA8K2VnkvNmNb%2BggnaXO%2FXmutasEpHhy%2BEf5Cp23sBeyiZioZd3c53ItRlOXu89FZay06r6OsEQ%2BsnrelwugjAw6VJo4JwA%2FPC0tbsSiHHHSnySTsigwvvvMfZR62eBlr2nthjTNyMu0ONVoGrZ%2BKKJLQ7rIHqjdPAH%2BObVtQ7KGcPdlEKE1l0Y%2B20JanrHQusKQPB9ISXDuRbBPE3R%2F5MmxwaJSEV8OtlDc9HwK%2FjJHuHAYOX33Anyvn2yQxbPlyUvSkD1PzE4Od7DHPleMgl28aLbq606LU7WaOO0cVipYxCi%2Bi9f6co8nk0%2BA8gjSi4Ek6xpgvM%2F1CuFfuGFLetzTMePLJs4t96VzP1R%2FeZjWehA38R2QblX6yF9IEgd82STWJAbzE6NrAz3E27rNuQ53%2B%2B0Iq%2BvgGoWTdH34qCx54qLc2LVSYOJTK%2FWtD%2BUUb0PdsLUehIHqUojMheENjUH5nCTPIEHGrC0iUJEh3e5CVzIt3kXLVXH9Sa2DKrgoedGup0R8tLMjXzfBl40yk3btdv8yyXneXXFMAEp8OF%2BgqSPvNr%2FbXdb%2BGGaSELS92cURXwPK8eklzIFMToDDqri7thR6JFZbw04%2B6d4t9N2CRWn93Vr8TTSfKJ191n7zUsDcH6PwiGaADzF4%2FKAz53SaiKcK5KlXuXrmGJFnpI0qNfjN4oRi3g4GKP8IhXmIpzh8UUoU3XnEdTjAaDWzYejcMY2neAKeOvmfQ0%2Fwknkmo%2FVc6yreE8ZviVyIMQfOpycNuy7zMKDaA1GHVYicZwrbqArmdm5CBIahHHIzN%2FzPimybs5ZbJoeaBOKcfh6EEudcOyFsOoCd9KDUdDWa3u2K0HuszeIf01uckKaebLw%2B1RfNvIbnud9BiETp9uDIRyahEKa3FrOSUmair7FZFnaEN2FZg%2FBCMjNH3mqGwatHKz2XYOx1aYY88N2oank6m7p2N7jwIsYXxOfg5G3748ylJm7uw82iwyW%2BWq6pkDJoFm5Jp2DTuiKeeHjnYR0hK4f7bEvQZy6J7BHOmNLFJjgSpaRYYkdje1wnfIpGcOr3OzAJ9AWRUmm9kZfdocUCi4KBn5v4fng%2BWHzCQ1lUgk3gxBOjyBLaHS%2FCpN9GARUr3TYCeK8GhlHfG%2BXPku0ewl1PYzlOGQsr8%2ByJ%2BrPQ7WQi%2Bx1xgmTrzPJNwxLtjSoEnU4%2BjWrvmXWUKLufwIghdtRCctPXDtC1yRPSDh1K6Iky%2FU5CNzHWKiLal8lddy229ZK%2B2Q%2BmNrTpOfc%2BW3N2LlIRmb5x2ah2x7%2BLjsSqLRxmWIvqLG8TjIO8bqHsCZNTdQegy06u%2BcmiiOa%2F6TThUfVicVav1xO8%2B%2FYOe%2BfM96SnWqg2BmqDQH7c9Vjh7ZLOW%2Fjd4vUGeaMrnWnCZ4%2FMPkMCDRoTskxKwYdj2bDSH%2B7VKJDIOgaq1XgW8c6K0J8H2JCu5tBFKrjHfkrd1dt464grsQ6GSnfpAJ82y%2FAQvwUpMB77PN3vU8hcFXehwWmFAVhYieROPYLJTeLzkvHA7tpfSfTu7LiSHieU%2BxPSR4FIbcoY8bLcXNJwlxeuKHov2R6GZNtPr8tm6clVnVILJoiaUDVTS2ArsEl6cVTuBIxfWcHkid4kIvQpqhQ2Og95T6xF7GIYMtlGiY0kHCL4Ou5XcJkbFHZ1%2BRN2%2FTXGqH1vX69lQ4PA1xX9bgjEQTztke2un91xN9NvuUFtBc5BVrtr%2BI%2BUgbMVLctO79LnWeHw%2B5m4DFWvHZS5jy3Fp508ilF6jB3d4ASayLsA3l31x%2F641MiHI6CTajefBX7JWtPZBGmkPS4LtnkxOdZJUpYrQebpgDSu3WXk6%2FMy%2BQbN2DR2MlGDPRTdY%2BHcd1s9RCKSnc1pOWxkEnQE%2FSKDhxs2FeujBYHDKcDvJXGim2ZWIxQPb%2Bu%2B1t34UaGeKgiqLVWRx5a7eqTFQSRMFic6%2B%2FQGYC2koJXtkeE0SCQnStk5wg%2Fk%2Bc2oGZtntWJTvW6osExT3Hw%2FirkcphDzXmJ%2BFWw4ZkBovG4VN2w11oYOa2GUeZqRUDnEB6%2FS4vNk6jC73Ax18ESGM4xV4cFciE82wUMlEv2VmVCuTMOTEd8Rg54PKoBdcvFYjcRxrHlgHxZYzdd9A%2FOZk91CfCeIWmQrIjMA1b80TFqjBvYxQD0cYE9DJvIp5O4rGSj3gvMrQLDORKUAz%2F0uyxrFQM5lhRl47JQkCJoH9DjwLSiws%2B1PMeKiNIn2hRFKIoHZJRj3ZxZiEnlf7tXkqdBFl7SFTJDThOKCTRNQnFY%2FHowNkH4sqaBnjSo3F63mhcY7P5uW6d7W3Uz9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=FDzSMRR1XVn1du%2FNsXPdw58hpu%2BA7Ga85YK4kEW%2BWPm23ZqyNrqr6suJCI6wRHsovkGZe%2BBLtXU0%0ArIG94WFIyMDJBNqeawO%2F%2BABwCmACF0j32LI56itq4vssdYdipQrEvLDDmi89RF%2ByIBXAE0T04ho1%0ALA1j1Ey%2FurxulloMTOjz12KBGgzpCUNWZnbZvzM0BoUOGVYNgjeN0DFrZKapLJc%2FGTt3KpGPVyrb%0AI0MrrySMW1Di%2BQXlJ4UrfZhAAoHILxqrDh7TN21%2FUsrtke7iZLt1dv3%2Bfai%2BukC%2FWzNZcxtw3vQS%0Am3HTzVxDWjHbbFXQS2jCPT%2FMhmeOVI3NV75PlQ%3D%3D") network 2018.06.05 17:03:16.621 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Server": "Apache-Coyote/1.1" network 2018.06.05 17:03:16.621 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Location": "https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1iQ6gZc1tMoEEg1fv1R3j7bZe%2B%2FYfczICI847h7uxz3405%2BP9%2BunrZjmZuh%2F%2BQr%2FDH39qeizIW%2F66pevvid%2Bo77%2B%2Bdc%2Fzcn7hYzfnWIeh34ufroX9fP330d%2F%2BbpO%2FfchmZv5e5%2B8i%2Fn7kn13GUP%2FjvwMfR%2BnYRmy4fX1J76Yl6ZPlt82qpdlnL%2BDYNHk3%2B4p%2Bc%2FZ0PdFtvx8H2VPXsu3tJheTf9zXoDsWkxVMWlDvwzPIgV%2FiHaKrGi2wi2m7VUsf56L%2Bcf5lfwXHCZyGEnTbxBFY9%2BwHMW%2FpRAGf8sSiMZgkspKtPj6k8L%2F8rVAsRJKS%2FwbjZfZNwzCoW80AmffoJSmUZzAaSRN7pn9XzB7wy9f%2F5skCbQoCuRbVuTQvYiiv6U0TH9DEgonoZJGUPKH%2BHleC6Wfl6RffvmKQDD1DSK%2BQbgH498h9DtM%2FAxRePz1p%2BAvar8V9fUPJX%2F%2FbfH09xr%2B3xWczHMx%2FVDq11%2F%2Fqsx%2FUeKfwN9s9Yfwv9rTXZJlnf%2FpJzfkxU9B8lqL%2F33jG969%2BLu7Ztmt%2Fq%2Fgr39sMn7%2FB7HfhT6bznEpcuYvJ%2F2PwP3puP3yb8L4ZEn%2BkPPjj9896naofd9%2F3tGfh6kCEQiCQQgDb2e9Z%2FzXbZf8NmGCZUlGljmKFWRGQzgMESQMo1iWJnCaE%2BnXn7xzvKH%2FH%2BUJr%2BJd9MttuL8%2F2W0Io1jqIf%2BJeVXD1Cz1%2B%2F9CVlLMMEJ9y9Lshx7z%2BbtWnEpfDn8gzOd%2FIwMCIfoHvnxuqv%2F6p5MU%2BS3kd8x0QmcYDhcFhZBUQmNlkZFFntA4klF5mcP%2FXzBMc%2FIN%2Fm%2F8HwH8BibEIfqHvf76g%2FvhsWWTJUvxq6Eo%2FMVzHDO5FbMrLFMpHGMbO29HqjbESr1lJmMLOmszexUPB3cxKluZActEHtM5omFTP%2BbygW0rX4Q95uJQnZMndvAXY%2F4%2BMfPYTn1l72NMW8E3WEViYF%2FgakN3A0d4Nuzf1vCM9vua2fvCQIFktkJjcMxvC5h9j31IND2RfiVPe8lkdYs5vE0RfI2fJhRCwcO%2BhNpgKYlzP5KrpChvCyrjRO6X%2BPnqbOkFxfKwRO%2FgTKXXqr%2Bdl8FiIe8JqOEJu3kJsHEpuyEO95jyz2N%2Fhf%2Fl3%2BH%2FT%2BB%2F%2BXf4%2FxP4X%2F4d%2Fn8LX1FYpf1hqO5Td41E7xB7W1tkmAf3hbEp5nYPlqu02yUEBnmcVqokW17IbgnyDLVrDzoqHf9EME7B8wSDm0dY9XowgAlnV%2F61YK2luODRMl9kVb8igXBIJZC4zL40u7iSg%2Fdp%2B9E6%2BmAI7kzwRRSEcvJ4UyId2CazpWeOFkDrxmhYPPQzRRYNVbf%2By1qBzzT%2BWEYRLCAjKlOWFMicHt1JxlvlFnXstV7LR%2B4QsAq3Hr7dQebqRn3qOm2yTTUn4AMT5zjWDV8o1cJx78m7xzGQH%2BmFgYhqP5EccNLplLFq74VC68khKCF1kpEGJD4Cwla%2BoQWthcVbWrFHDz8rzzjFL1ihjVUeIwuAC4y6TL4l9rGARUkgkPKZ44Xf4qkfsTNF8Rh8dBgDJu9d4RmbYYdj2CX%2B9%2BslO4bwhWkZxmDmH96f8%2FttgV0ROv6frTX%2FZq0fBpos88n4wMUngzOlujy24KfW%2BoRSheCL09blByepSQKJ3qT3sfTfJeTBnYDNnMjI6%2FRRU4fMpFJwylQB6tAhIqclKnhh2hUNrmowzBUZ1oGuvmAoQNDdu2xDuacrvu%2FGviRAnFl4mxmMfPhI9SGzRTkFZL%2FhQNQ1y5r2vOvFLKBZukaDu0zlC%2FIGo%2BILvT6uXVzyR2xAKoyEZShoql37VJIDfszm79ryl%2BMACGE%2FshioD5Amck6lKtmTpLkadjciCv2BssC0fimWz9A8hxd5H2V7N%2B4JqENTGAuNZm9HpztDjjBG06D3wBq%2BVoKItbaECtuIBeWWlqI6vqolvVz4S%2BS%2BZHlJBGTkvPZffvkT%2BEco%2Ffvo%2BdfB3%2BPrjyl%2FpI4%2F0hLXjHUx%2Ff7vb3nq94Hf8vuvBU4bR3vuuWADE9kWx%2BvKe2qiLL42MSoI02OwX72%2FweJ7nVRl1jG%2BddwF3cAAC0FTteAt6OHtOdosgGqyBmcIUFVS2MIGRn7E7Kj6OjD3GZifKaSfGfgUkA51MpQwIZZ%2FiGS00j5KgcQsos9s0jMXoysB8AqeztYqQ8bklaDwS73SeFohBbDlduqeWf8yBtvTrCaG8gaj3QJ3vBccbeEoJhr58iNOAwmHsDySUUdchk7Ng8Tg8c6exrnGgle2aQaCdVHnIfkyBZEd8FC%2BerSF822aiLmpPwnvFaWFzuUphZk%2Bhh4id6dPG3Wm0w87yGlEpJchVz78GQi0F7grdtqgr2hBwvww1b%2Bo%2Bh%2BG%2FjDWPzKa227%2FzwYkvJJ9SxsQQ88rn00aQIydKE1kThZVSw3M8IbwU0%2FmNA6DtH%2FkR%2Fxok3HtuE3FxSdj7zZxrY4Fqx0CcS3pKHAz4wnxVPZN7Qb9WS3b9kbuuAfFG5MdbGcQ%2FEFOHdy2cRsKYg1gb%2BLzgjcAYdt9FNxKEtC%2Bdg4KVC7oAHr0wekflimgYeum68ia2Xmnn%2FMozx3GdEzB%2BStbhEMOxvaAQVYJiFf7WJoa4WDuakZGSsj2ZHuMRV6oPeyKs0aVkMwXfmQB7zYkzMH8vGAHHYbhIastG8U6Aqi8L3eboMsdI%2B8mYkhH3fuXfAaU0dLM8yHGZhXGCwjsgcW2%2BW5Rp0EnqeP6tJarntuPjsjoUMmnzIS8IWD96GpOP2pLXpgICBvGXHK1q%2Fcn2JfxzrOVOuEu2VMZQMNAlpqaOr%2B9QoFU3T5mu9j9DjUbpEKnNw0zxfghLS0nc7cejFXI6gKoCj4ALed8lS2MBSx1tdGorP7rqeMImz%2BXuU54mZsSO2WFxxXdfCoUGaMDcqPngkMYZ%2Bs1sp2W8ECErxyf9msbTEEBJsJsghnXcuuTCo%2F9c3i0VBIPptdhJUhX0O6VrKXfC6GIRPqi1DpKHPB8Uz76ASxeJmAS2iGRI9N46eJkJWEtjAAve3QI%2BaTYQW1ssY0c%2FuRj1xbmW00wmkQOKbNGTtIesgmcvTOcvNNlBkhz2vWAZ2%2B6imnJHjlqCOYuuZOGz8Ag%2BMBorgMw1grzC2DuQ%2BLK20cXU3PKU4PLGdfEyqT1CHz3wydOYvgk%2BhMzYaMeus7DZoUNGbtY7%2Fwyp7toKUMapTNApFUl7O7p1%2BvehCi1ENOilZMszg6REMMEH7KHc3W9YmUU8pyJ31kMcfnPFZDuvBqVeBngXe%2Fqq%2FLQ527NNss%2FiDzYDfe94LgVFMW8LvvsddfauRkyTxHFedxTWD0%2Fb%2BBZJTJiBSquht4aUPFQhmcBXthyYj8jXHqr1l2QhkJQVyUN8eagCoRdv5Qt4wymFW%2B%2FOHsx7QITKqaaBecUlAKQfAPMxxLZLWzniuVfvrdKEd9Z2aczPh9P1ABVCFVDUXNjHs0aKOCPrtBMZi1bLj28A5pz2uyNBwp5xWihvlgm45uHI42IvMXs2UObN7%2B2qQidnYeGUAiMj91FrLMCXATphyNxfTLsAt5MWssgEgMm8BGcqnlf%2FSBRRKfjXV4FJjxBepANy6avuXj2FQU%2BpjxQw5sHCaahr9ykKMM%2BQNkdplxtxHb9w9ysJlgOBvE8DonCUCUiZlwXWJ5asQg5mmlcxTtf8%2FHQxdnU%2FHz3YMQDzk1rSXmHJwfRjHRVASy7w4rW2MqL4Qbwc3S59ziujGyeTWxXJmUbs7O1Ox8Q21Ut6uDSYkR5BEHjaQEjuRJ%2BynRvV2mi8zkJAbd%2FGDcfQ%2FsP9dbvHSwGXl43n6LLZ7hwFf5Ul4pUqWAwyDKI5Gcn0YvnkfFwHSpi6znAVEbwPF1W4v2XHsoCPb73jxSD9ooNvQn1TL%2BQAV%2FB7esJ%2BIEz%2BrWFoX3aYt3FSo8oK4ZgMcS1600XNABEsZtVeM2WDTFP18yJAqY9Ng8%2FhFFOs49Xj1hAIMYLYuYmEE8Nz%2B1tIntt96xwluCSlIMJeDJH4p1P30K9Nsmj15sVs4SCneYsUNtMnZjRjXJzXj4Sa2ZZh1K7wZzQg8rGn%2FpbWD%2BYTG0jsjGrCF61wSG8QOZpqJeP9oXxp72ZtqYOSQjOs%2Bw3tTh%2B8DWhqB2zKwbpyLKmm9FiVKLIGpfV%2FWuIzSZK39IYrAFwvN9wGY7g5S8Z3Erq%2BM5lSQgetTLJ1rBmmMlGj96y38KH1ejjI1jbYiGHUKAtraAQGcAHFuunmGAE%2FQ6xZKCA2SmZ%2BClPMGYaDR4Yc8Cld0hxwk9ig5otJnodyCvbT%2BJOJ8divUA3aHef6hnM7GUU9C0LRTgWSO%2Fsp6pPc6LSE%2F489pb1WJsqccJJDo9DCYWM8hx4acSIjktDlYgmAzstBxorvYhjXWx5fdqjT66fZUcqAlzV%2BtN5w4tXUr7f%2BsbZAsV0dvpk4U1EkWeaURJgEFlW2p1q7u%2FgTVQHIlNNV5O3aPIKyXxdJzmgairWdkITzRGthQsbR88loDxeE0NIYjuaT7zNeAG4eTJVehsubVXv2KHTG5ICreuCoeAWvpBPerBU04%2FK4%2B3hAXhfzChdGercsSRI0dSPS86rrpmNlYbBepVeOcFh0CeHlDAvazj7RJFldno67UyTjmxz4SOE1It3PFrk019zCbopCHSlGLzV7O4wQaJyaLXcXPMOC7HUz4ke6RzabvJ7ewYVDKpbO53p9rrEm6A8RcDOg1MBWhYdtw7s1ZBsV8vFAxtM3w9IPT97ByoPJFoIdWCV%2Fsxd5BQdzM83frV7TSdpYXYh3LqiMqb3MmHkA2CEFWlFfV1QM3wk2xZmSwnLbvrsIQZgH6T1iHf84xeay31qFnt05GQlTlXXbDDYp4E02fxoIMlH2yySyGipn9VhyGMhUzMI6bVJ4Nl5yMV5V5UlVDJXU9YsAOT%2B2wAnHZbGR%2BTHrx2%2Br59vLZoCCAW2ikxBzIxW63tG8keb29E1x5jAokbNXFXkRGRpwWBZJMsDcxhm%2Bjh9KUAJXWHFwbYZie0cyfcj0Qk2JGTO6Qq19Kb16n3lqyDZscGWXj9oJYEP0mTVgwJhhrzZ4wRrAmoRj2Ni5KpQwbcnvQAmDTPcKB5utRFLFovvV3jFHssNepHNmzPU0bvR7XN5s28SCdiS1hyQWMtGBxz97WE5UNUpsfGXddNFldMmUSJdRjmCeJAx%2BrW2a4Dvm6U7b3qYOooQZG%2BsKAwO9WerBFMUI7dTFp0cUtUsbWOyaJidA6XBXA8KzkgqnSMDMHh8ZOsuoPJciT5UkvQGscTLGzhKqtlYyEYeMFih3ImA7mdE80icveOIP7X6ts41MC%2BzCRfqvJKTIRgZnWpZOEaPcHbl46Y5fvJiqH7sD7aghO1BjP1hLeRhrit%2FOmQd7mp0X3H1GZDknZnCrnqqqyI1ncSVXuyjOkEPpllZrLSxVcQsRzqSNwmqhVJcHyCRqUMG8CKOx1RpEK2t43kQOQFT6cc1KaN7fLZmZLUuqrS7mA%2BesPgcRQ5HzPqIHfgTkbsaPOXHghEvWuOkhhtkwbW3vY1UMQsaWFCRq0wS2DMvBKahYjwa%2BXi02%2Fbk3AVOmRRJxvPJq6tsDmxIp42oZBMITYf%2BeqlV%2Fnw77eWVYaUyucJU2uSL%2BxnnzKfXFqZJi9bDLr8OGP9qER6ez7a5W1tmshhtHUMEuyzrtenIZRcWWnplium4MznORSwNXGtZo8srA%2B6Su5aQeYm%2BVXsXi8bFBajbQw5iM0nljmXTLCWZtAtN3NeKa2PFa1jpaiCzRSKQwyk0xFHoz%2B0sF61AuZ2trT7Y1gsdzWO%2FuJuadkYxS9bNl5%2FC%2FcxguVqTrdEiAZfOY%2BMB2MIqmSjwAhp74NiQe93HKYoWHwuy8LNnEY7FGoVJB5sdyfDY%2FCEPkIggkCXDu0Y9iBcRze0z7%2F0Ohoo8LjuanSoq%2BUA6%2BAhrDHwHyGzmVhyRHy%2FoXuo7pAkTXKCr%2FwRraCzPpxE0fP2RjdCMb%2BIQfeZsgnpWSx00YjlWM8iBhs%2Fh9oDS5QxidAmYnTBNF4IJ1ZhPYL0fL8P1HUHfD4iPru5D2TndEdPF70FASoXAeuFJ3TvwjqrkMA8K2VnkvNmNb%2BggnaXO%2FXmutasEpHhy%2BEf5Cp23sBeyiZioZd3c53ItRlOXu89FZay06r6OsEQ%2BsnrelwugjAw6VJo4JwA%2FPC0tbsSiHHHSnySTsigwvvvMfZR62eBlr2nthjTNyMu0ONVoGrZ%2BKKJLQ7rIHqjdPAH%2BObVtQ7KGcPdlEKE1l0Y%2B20JanrHQusKQPB9ISXDuRbBPE3R%2F5MmxwaJSEV8OtlDc9HwK%2FjJHuHAYOX33Anyvn2yQxbPlyUvSkD1PzE4Od7DHPleMgl28aLbq606LU7WaOO0cVipYxCi%2Bi9f6co8nk0%2BA8gjSi4Ek6xpgvM%2F1CuFfuGFLetzTMePLJs4t96VzP1R%2FeZjWehA38R2QblX6yF9IEgd82STWJAbzE6NrAz3E27rNuQ53%2B%2B0Iq%2BvgGoWTdH34qCx54qLc2LVSYOJTK%2FWtD%2BUUb0PdsLUehIHqUojMheENjUH5nCTPIEHGrC0iUJEh3e5CVzIt3kXLVXH9Sa2DKrgoedGup0R8tLMjXzfBl40yk3btdv8yyXneXXFMAEp8OF%2BgqSPvNr%2FbXdb%2BGGaSELS92cURXwPK8eklzIFMToDDqri7thR6JFZbw04%2B6d4t9N2CRWn93Vr8TTSfKJ191n7zUsDcH6PwiGaADzF4%2FKAz53SaiKcK5KlXuXrmGJFnpI0qNfjN4oRi3g4GKP8IhXmIpzh8UUoU3XnEdTjAaDWzYejcMY2neAKeOvmfQ0%2Fwknkmo%2FVc6yreE8ZviVyIMQfOpycNuy7zMKDaA1GHVYicZwrbqArmdm5CBIahHHIzN%2FzPimybs5ZbJoeaBOKcfh6EEudcOyFsOoCd9KDUdDWa3u2K0HuszeIf01uckKaebLw%2B1RfNvIbnud9BiETp9uDIRyahEKa3FrOSUmair7FZFnaEN2FZg%2FBCMjNH3mqGwatHKz2XYOx1aYY88N2oank6m7p2N7jwIsYXxOfg5G3748ylJm7uw82iwyW%2BWq6pkDJoFm5Jp2DTuiKeeHjnYR0hK4f7bEvQZy6J7BHOmNLFJjgSpaRYYkdje1wnfIpGcOr3OzAJ9AWRUmm9kZfdocUCi4KBn5v4fng%2BWHzCQ1lUgk3gxBOjyBLaHS%2FCpN9GARUr3TYCeK8GhlHfG%2BXPku0ewl1PYzlOGQsr8%2ByJ%2BrPQ7WQi%2Bx1xgmTrzPJNwxLtjSoEnU4%2BjWrvmXWUKLufwIghdtRCctPXDtC1yRPSDh1K6Iky%2FU5CNzHWKiLal8lddy229ZK%2B2Q%2BmNrTpOfc%2BW3N2LlIRmb5x2ah2x7%2BLjsSqLRxmWIvqLG8TjIO8bqHsCZNTdQegy06u%2BcmiiOa%2F6TThUfVicVav1xO8%2B%2FYOe%2BfM96SnWqg2BmqDQH7c9Vjh7ZLOW%2Fjd4vUGeaMrnWnCZ4%2FMPkMCDRoTskxKwYdj2bDSH%2B7VKJDIOgaq1XgW8c6K0J8H2JCu5tBFKrjHfkrd1dt464grsQ6GSnfpAJ82y%2FAQvwUpMB77PN3vU8hcFXehwWmFAVhYieROPYLJTeLzkvHA7tpfSfTu7LiSHieU%2BxPSR4FIbcoY8bLcXNJwlxeuKHov2R6GZNtPr8tm6clVnVILJoiaUDVTS2ArsEl6cVTuBIxfWcHkid4kIvQpqhQ2Og95T6xF7GIYMtlGiY0kHCL4Ou5XcJkbFHZ1%2BRN2%2FTXGqH1vX69lQ4PA1xX9bgjEQTztke2un91xN9NvuUFtBc5BVrtr%2BI%2BUgbMVLctO79LnWeHw%2B5m4DFWvHZS5jy3Fp508ilF6jB3d4ASayLsA3l31x%2F641MiHI6CTajefBX7JWtPZBGmkPS4LtnkxOdZJUpYrQebpgDSu3WXk6%2FMy%2BQbN2DR2MlGDPRTdY%2BHcd1s9RCKSnc1pOWxkEnQE%2FSKDhxs2FeujBYHDKcDvJXGim2ZWIxQPb%2Bu%2B1t34UaGeKgiqLVWRx5a7eqTFQSRMFic6%2B%2FQGYC2koJXtkeE0SCQnStk5wg%2Fk%2Bc2oGZtntWJTvW6osExT3Hw%2FirkcphDzXmJ%2BFWw4ZkBovG4VN2w11oYOa2GUeZqRUDnEB6%2FS4vNk6jC73Ax18ESGM4xV4cFciE82wUMlEv2VmVCuTMOTEd8Rg54PKoBdcvFYjcRxrHlgHxZYzdd9A%2FOZk91CfCeIWmQrIjMA1b80TFqjBvYxQD0cYE9DJvIp5O4rGSj3gvMrQLDORKUAz%2F0uyxrFQM5lhRl47JQkCJoH9DjwLSiws%2B1PMeKiNIn2hRFKIoHZJRj3ZxZiEnlf7tXkqdBFl7SFTJDThOKCTRNQnFY%2FHowNkH4sqaBnjSo3F63mhcY7P5uW6d7W3Uz9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=FDzSMRR1XVn1du%2FNsXPdw58hpu%2BA7Ga85YK4kEW%2BWPm23ZqyNrqr6suJCI6wRHsovkGZe%2BBLtXU0%0ArIG94WFIyMDJBNqeawO%2F%2BABwCmACF0j32LI56itq4vssdYdipQrEvLDDmi89RF%2ByIBXAE0T04ho1%0ALA1j1Ey%2FurxulloMTOjz12KBGgzpCUNWZnbZvzM0BoUOGVYNgjeN0DFrZKapLJc%2FGTt3KpGPVyrb%0AI0MrrySMW1Di%2BQXlJ4UrfZhAAoHILxqrDh7TN21%2FUsrtke7iZLt1dv3%2Bfai%2BukC%2FWzNZcxtw3vQS%0Am3HTzVxDWjHbbFXQS2jCPT%2FMhmeOVI3NV75PlQ%3D%3D" network 2018.06.05 17:03:16.621 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Cache-Control": "no-cache, no-store" network 2018.06.05 17:03:16.621 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Pragma": "no-cache" network 2018.06.05 17:03:16.621 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Content-Length": "0" network 2018.06.05 17:03:16.622 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Date": "Tue, 05 Jun 2018 15:03:15 GMT" network 2018.06.05 17:03:16.622 UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46) : SOP-Check( "https://eid-prod.verwalt-berlin.de:8443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= false default 2018.06.05 17:03:16.622 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:291) : SOP-Check failed, continue process default 2018.06.05 17:03:16.622 ...shAddress::sendGetRequest(core/states/StateCheckRefreshAddress.cpp:133) : Send GET request to URL: "https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1iQ6gZc1tMoEEg1fv1R3j7bZe%2B%2FYfczICI847h7uxz3405%2BP9%2BunrZjmZuh%2F%2BQr%2FDH39qeizIW%2F66pevvid%2Bo77%2B%2Bdc%2Fzcn7hYzfnWIeh34ufroX9fP330d%2F%2BbpO%2FfchmZv5e5%2B8i%2Fn7kn13GUP%2FjvwMfR%2BnYRmy4fX1J76Yl6ZPlt82qpdlnL%2BDYNHk3%2B4p%2Bc%2FZ0PdFtvx8H2VPXsu3tJheTf9zXoDsWkxVMWlDvwzPIgV%2FiHaKrGi2wi2m7VUsf56L%2Bcf5lfwXHCZyGEnTbxBFY9%2BwHMW%2FpRAGf8sSiMZgkspKtPj6k8L%2F8rVAsRJKS%2FwbjZfZNwzCoW80AmffoJSmUZzAaSRN7pn9XzB7wy9f%2F5skCbQoCuRbVuTQvYiiv6U0TH9DEgonoZJGUPKH%2BHleC6Wfl6RffvmKQDD1DSK%2BQbgH498h9DtM%2FAxRePz1p%2BAvar8V9fUPJX%2F%2FbfH09xr%2B3xWczHMx%2FVDq11%2F%2Fqsx%2FUeKfwN9s9Yfwv9rTXZJlnf%2FpJzfkxU9B8lqL%2F33jG969%2BLu7Ztmt%2Fq%2Fgr39sMn7%2FB7HfhT6bznEpcuYvJ%2F2PwP3puP3yb8L4ZEn%2BkPPjj9896naofd9%2F3tGfh6kCEQiCQQgDb2e9Z%2FzXbZf8NmGCZUlGljmKFWRGQzgMESQMo1iWJnCaE%2BnXn7xzvKH%2FH%2BUJr%2BJd9MttuL8%2F2W0Io1jqIf%2BJeVXD1Cz1%2B%2F9CVlLMMEJ9y9Lshx7z%2BbtWnEpfDn8gzOd%2FIwMCIfoHvnxuqv%2F6p5MU%2BS3kd8x0QmcYDhcFhZBUQmNlkZFFntA4klF5mcP%2FXzBMc%2FIN%2Fm%2F8HwH8BibEIfqHvf76g%2FvhsWWTJUvxq6Eo%2FMVzHDO5FbMrLFMpHGMbO29HqjbESr1lJmMLOmszexUPB3cxKluZActEHtM5omFTP%2BbygW0rX4Q95uJQnZMndvAXY%2F4%2BMfPYTn1l72NMW8E3WEViYF%2FgakN3A0d4Nuzf1vCM9vua2fvCQIFktkJjcMxvC5h9j31IND2RfiVPe8lkdYs5vE0RfI2fJhRCwcO%2BhNpgKYlzP5KrpChvCyrjRO6X%2BPnqbOkFxfKwRO%2FgTKXXqr%2Bdl8FiIe8JqOEJu3kJsHEpuyEO95jyz2N%2Fhf%2Fl3%2BH%2FT%2BB%2F%2BXf4%2FxP4X%2F4d%2Fn8LX1FYpf1hqO5Td41E7xB7W1tkmAf3hbEp5nYPlqu02yUEBnmcVqokW17IbgnyDLVrDzoqHf9EME7B8wSDm0dY9XowgAlnV%2F61YK2luODRMl9kVb8igXBIJZC4zL40u7iSg%2Fdp%2B9E6%2BmAI7kzwRRSEcvJ4UyId2CazpWeOFkDrxmhYPPQzRRYNVbf%2By1qBzzT%2BWEYRLCAjKlOWFMicHt1JxlvlFnXstV7LR%2B4QsAq3Hr7dQebqRn3qOm2yTTUn4AMT5zjWDV8o1cJx78m7xzGQH%2BmFgYhqP5EccNLplLFq74VC68khKCF1kpEGJD4Cwla%2BoQWthcVbWrFHDz8rzzjFL1ihjVUeIwuAC4y6TL4l9rGARUkgkPKZ44Xf4qkfsTNF8Rh8dBgDJu9d4RmbYYdj2CX%2B9%2BslO4bwhWkZxmDmH96f8%2FttgV0ROv6frTX%2FZq0fBpos88n4wMUngzOlujy24KfW%2BoRSheCL09blByepSQKJ3qT3sfTfJeTBnYDNnMjI6%2FRRU4fMpFJwylQB6tAhIqclKnhh2hUNrmowzBUZ1oGuvmAoQNDdu2xDuacrvu%2FGviRAnFl4mxmMfPhI9SGzRTkFZL%2FhQNQ1y5r2vOvFLKBZukaDu0zlC%2FIGo%2BILvT6uXVzyR2xAKoyEZShoql37VJIDfszm79ryl%2BMACGE%2FshioD5Amck6lKtmTpLkadjciCv2BssC0fimWz9A8hxd5H2V7N%2B4JqENTGAuNZm9HpztDjjBG06D3wBq%2BVoKItbaECtuIBeWWlqI6vqolvVz4S%2BS%2BZHlJBGTkvPZffvkT%2BEco%2Ffvo%2BdfB3%2BPrjyl%2FpI4%2F0hLXjHUx%2Ff7vb3nq94Hf8vuvBU4bR3vuuWADE9kWx%2BvKe2qiLL42MSoI02OwX72%2FweJ7nVRl1jG%2BddwF3cAAC0FTteAt6OHtOdosgGqyBmcIUFVS2MIGRn7E7Kj6OjD3GZifKaSfGfgUkA51MpQwIZZ%2FiGS00j5KgcQsos9s0jMXoysB8AqeztYqQ8bklaDwS73SeFohBbDlduqeWf8yBtvTrCaG8gaj3QJ3vBccbeEoJhr58iNOAwmHsDySUUdchk7Ng8Tg8c6exrnGgle2aQaCdVHnIfkyBZEd8FC%2BerSF822aiLmpPwnvFaWFzuUphZk%2Bhh4id6dPG3Wm0w87yGlEpJchVz78GQi0F7grdtqgr2hBwvww1b%2Bo%2Bh%2BG%2FjDWPzKa227%2FzwYkvJJ9SxsQQ88rn00aQIydKE1kThZVSw3M8IbwU0%2FmNA6DtH%2FkR%2Fxok3HtuE3FxSdj7zZxrY4Fqx0CcS3pKHAz4wnxVPZN7Qb9WS3b9kbuuAfFG5MdbGcQ%2FEFOHdy2cRsKYg1gb%2BLzgjcAYdt9FNxKEtC%2Bdg4KVC7oAHr0wekflimgYeum68ia2Xmnn%2FMozx3GdEzB%2BStbhEMOxvaAQVYJiFf7WJoa4WDuakZGSsj2ZHuMRV6oPeyKs0aVkMwXfmQB7zYkzMH8vGAHHYbhIastG8U6Aqi8L3eboMsdI%2B8mYkhH3fuXfAaU0dLM8yHGZhXGCwjsgcW2%2BW5Rp0EnqeP6tJarntuPjsjoUMmnzIS8IWD96GpOP2pLXpgICBvGXHK1q%2Fcn2JfxzrOVOuEu2VMZQMNAlpqaOr%2B9QoFU3T5mu9j9DjUbpEKnNw0zxfghLS0nc7cejFXI6gKoCj4ALed8lS2MBSx1tdGorP7rqeMImz%2BXuU54mZsSO2WFxxXdfCoUGaMDcqPngkMYZ%2Bs1sp2W8ECErxyf9msbTEEBJsJsghnXcuuTCo%2F9c3i0VBIPptdhJUhX0O6VrKXfC6GIRPqi1DpKHPB8Uz76ASxeJmAS2iGRI9N46eJkJWEtjAAve3QI%2BaTYQW1ssY0c%2FuRj1xbmW00wmkQOKbNGTtIesgmcvTOcvNNlBkhz2vWAZ2%2B6imnJHjlqCOYuuZOGz8Ag%2BMBorgMw1grzC2DuQ%2BLK20cXU3PKU4PLGdfEyqT1CHz3wydOYvgk%2BhMzYaMeus7DZoUNGbtY7%2Fwyp7toKUMapTNApFUl7O7p1%2BvehCi1ENOilZMszg6REMMEH7KHc3W9YmUU8pyJ31kMcfnPFZDuvBqVeBngXe%2Fqq%2FLQ527NNss%2FiDzYDfe94LgVFMW8LvvsddfauRkyTxHFedxTWD0%2Fb%2BBZJTJiBSquht4aUPFQhmcBXthyYj8jXHqr1l2QhkJQVyUN8eagCoRdv5Qt4wymFW%2B%2FOHsx7QITKqaaBecUlAKQfAPMxxLZLWzniuVfvrdKEd9Z2aczPh9P1ABVCFVDUXNjHs0aKOCPrtBMZi1bLj28A5pz2uyNBwp5xWihvlgm45uHI42IvMXs2UObN7%2B2qQidnYeGUAiMj91FrLMCXATphyNxfTLsAt5MWssgEgMm8BGcqnlf%2FSBRRKfjXV4FJjxBepANy6avuXj2FQU%2BpjxQw5sHCaahr9ykKMM%2BQNkdplxtxHb9w9ysJlgOBvE8DonCUCUiZlwXWJ5asQg5mmlcxTtf8%2FHQxdnU%2FHz3YMQDzk1rSXmHJwfRjHRVASy7w4rW2MqL4Qbwc3S59ziujGyeTWxXJmUbs7O1Ox8Q21Ut6uDSYkR5BEHjaQEjuRJ%2BynRvV2mi8zkJAbd%2FGDcfQ%2FsP9dbvHSwGXl43n6LLZ7hwFf5Ul4pUqWAwyDKI5Gcn0YvnkfFwHSpi6znAVEbwPF1W4v2XHsoCPb73jxSD9ooNvQn1TL%2BQAV%2FB7esJ%2BIEz%2BrWFoX3aYt3FSo8oK4ZgMcS1600XNABEsZtVeM2WDTFP18yJAqY9Ng8%2FhFFOs49Xj1hAIMYLYuYmEE8Nz%2B1tIntt96xwluCSlIMJeDJH4p1P30K9Nsmj15sVs4SCneYsUNtMnZjRjXJzXj4Sa2ZZh1K7wZzQg8rGn%2FpbWD%2BYTG0jsjGrCF61wSG8QOZpqJeP9oXxp72ZtqYOSQjOs%2Bw3tTh%2B8DWhqB2zKwbpyLKmm9FiVKLIGpfV%2FWuIzSZK39IYrAFwvN9wGY7g5S8Z3Erq%2BM5lSQgetTLJ1rBmmMlGj96y38KH1ejjI1jbYiGHUKAtraAQGcAHFuunmGAE%2FQ6xZKCA2SmZ%2BClPMGYaDR4Yc8Cld0hxwk9ig5otJnodyCvbT%2BJOJ8divUA3aHef6hnM7GUU9C0LRTgWSO%2Fsp6pPc6LSE%2F489pb1WJsqccJJDo9DCYWM8hx4acSIjktDlYgmAzstBxorvYhjXWx5fdqjT66fZUcqAlzV%2BtN5w4tXUr7f%2BsbZAsV0dvpk4U1EkWeaURJgEFlW2p1q7u%2FgTVQHIlNNV5O3aPIKyXxdJzmgairWdkITzRGthQsbR88loDxeE0NIYjuaT7zNeAG4eTJVehsubVXv2KHTG5ICreuCoeAWvpBPerBU04%2FK4%2B3hAXhfzChdGercsSRI0dSPS86rrpmNlYbBepVeOcFh0CeHlDAvazj7RJFldno67UyTjmxz4SOE1It3PFrk019zCbopCHSlGLzV7O4wQaJyaLXcXPMOC7HUz4ke6RzabvJ7ewYVDKpbO53p9rrEm6A8RcDOg1MBWhYdtw7s1ZBsV8vFAxtM3w9IPT97ByoPJFoIdWCV%2Fsxd5BQdzM83frV7TSdpYXYh3LqiMqb3MmHkA2CEFWlFfV1QM3wk2xZmSwnLbvrsIQZgH6T1iHf84xeay31qFnt05GQlTlXXbDDYp4E02fxoIMlH2yySyGipn9VhyGMhUzMI6bVJ4Nl5yMV5V5UlVDJXU9YsAOT%2B2wAnHZbGR%2BTHrx2%2Br59vLZoCCAW2ikxBzIxW63tG8keb29E1x5jAokbNXFXkRGRpwWBZJMsDcxhm%2Bjh9KUAJXWHFwbYZie0cyfcj0Qk2JGTO6Qq19Kb16n3lqyDZscGWXj9oJYEP0mTVgwJhhrzZ4wRrAmoRj2Ni5KpQwbcnvQAmDTPcKB5utRFLFovvV3jFHssNepHNmzPU0bvR7XN5s28SCdiS1hyQWMtGBxz97WE5UNUpsfGXddNFldMmUSJdRjmCeJAx%2BrW2a4Dvm6U7b3qYOooQZG%2BsKAwO9WerBFMUI7dTFp0cUtUsbWOyaJidA6XBXA8KzkgqnSMDMHh8ZOsuoPJciT5UkvQGscTLGzhKqtlYyEYeMFih3ImA7mdE80icveOIP7X6ts41MC%2BzCRfqvJKTIRgZnWpZOEaPcHbl46Y5fvJiqH7sD7aghO1BjP1hLeRhrit%2FOmQd7mp0X3H1GZDknZnCrnqqqyI1ncSVXuyjOkEPpllZrLSxVcQsRzqSNwmqhVJcHyCRqUMG8CKOx1RpEK2t43kQOQFT6cc1KaN7fLZmZLUuqrS7mA%2BesPgcRQ5HzPqIHfgTkbsaPOXHghEvWuOkhhtkwbW3vY1UMQsaWFCRq0wS2DMvBKahYjwa%2BXi02%2Fbk3AVOmRRJxvPJq6tsDmxIp42oZBMITYf%2BeqlV%2Fnw77eWVYaUyucJU2uSL%2BxnnzKfXFqZJi9bDLr8OGP9qER6ez7a5W1tmshhtHUMEuyzrtenIZRcWWnplium4MznORSwNXGtZo8srA%2B6Su5aQeYm%2BVXsXi8bFBajbQw5iM0nljmXTLCWZtAtN3NeKa2PFa1jpaiCzRSKQwyk0xFHoz%2B0sF61AuZ2trT7Y1gsdzWO%2FuJuadkYxS9bNl5%2FC%2FcxguVqTrdEiAZfOY%2BMB2MIqmSjwAhp74NiQe93HKYoWHwuy8LNnEY7FGoVJB5sdyfDY%2FCEPkIggkCXDu0Y9iBcRze0z7%2F0Ohoo8LjuanSoq%2BUA6%2BAhrDHwHyGzmVhyRHy%2FoXuo7pAkTXKCr%2FwRraCzPpxE0fP2RjdCMb%2BIQfeZsgnpWSx00YjlWM8iBhs%2Fh9oDS5QxidAmYnTBNF4IJ1ZhPYL0fL8P1HUHfD4iPru5D2TndEdPF70FASoXAeuFJ3TvwjqrkMA8K2VnkvNmNb%2BggnaXO%2FXmutasEpHhy%2BEf5Cp23sBeyiZioZd3c53ItRlOXu89FZay06r6OsEQ%2BsnrelwugjAw6VJo4JwA%2FPC0tbsSiHHHSnySTsigwvvvMfZR62eBlr2nthjTNyMu0ONVoGrZ%2BKKJLQ7rIHqjdPAH%2BObVtQ7KGcPdlEKE1l0Y%2B20JanrHQusKQPB9ISXDuRbBPE3R%2F5MmxwaJSEV8OtlDc9HwK%2FjJHuHAYOX33Anyvn2yQxbPlyUvSkD1PzE4Od7DHPleMgl28aLbq606LU7WaOO0cVipYxCi%2Bi9f6co8nk0%2BA8gjSi4Ek6xpgvM%2F1CuFfuGFLetzTMePLJs4t96VzP1R%2FeZjWehA38R2QblX6yF9IEgd82STWJAbzE6NrAz3E27rNuQ53%2B%2B0Iq%2BvgGoWTdH34qCx54qLc2LVSYOJTK%2FWtD%2BUUb0PdsLUehIHqUojMheENjUH5nCTPIEHGrC0iUJEh3e5CVzIt3kXLVXH9Sa2DKrgoedGup0R8tLMjXzfBl40yk3btdv8yyXneXXFMAEp8OF%2BgqSPvNr%2FbXdb%2BGGaSELS92cURXwPK8eklzIFMToDDqri7thR6JFZbw04%2B6d4t9N2CRWn93Vr8TTSfKJ191n7zUsDcH6PwiGaADzF4%2FKAz53SaiKcK5KlXuXrmGJFnpI0qNfjN4oRi3g4GKP8IhXmIpzh8UUoU3XnEdTjAaDWzYejcMY2neAKeOvmfQ0%2Fwknkmo%2FVc6yreE8ZviVyIMQfOpycNuy7zMKDaA1GHVYicZwrbqArmdm5CBIahHHIzN%2FzPimybs5ZbJoeaBOKcfh6EEudcOyFsOoCd9KDUdDWa3u2K0HuszeIf01uckKaebLw%2B1RfNvIbnud9BiETp9uDIRyahEKa3FrOSUmair7FZFnaEN2FZg%2FBCMjNH3mqGwatHKz2XYOx1aYY88N2oank6m7p2N7jwIsYXxOfg5G3748ylJm7uw82iwyW%2BWq6pkDJoFm5Jp2DTuiKeeHjnYR0hK4f7bEvQZy6J7BHOmNLFJjgSpaRYYkdje1wnfIpGcOr3OzAJ9AWRUmm9kZfdocUCi4KBn5v4fng%2BWHzCQ1lUgk3gxBOjyBLaHS%2FCpN9GARUr3TYCeK8GhlHfG%2BXPku0ewl1PYzlOGQsr8%2ByJ%2BrPQ7WQi%2Bx1xgmTrzPJNwxLtjSoEnU4%2BjWrvmXWUKLufwIghdtRCctPXDtC1yRPSDh1K6Iky%2FU5CNzHWKiLal8lddy229ZK%2B2Q%2BmNrTpOfc%2BW3N2LlIRmb5x2ah2x7%2BLjsSqLRxmWIvqLG8TjIO8bqHsCZNTdQegy06u%2BcmiiOa%2F6TThUfVicVav1xO8%2B%2FYOe%2BfM96SnWqg2BmqDQH7c9Vjh7ZLOW%2Fjd4vUGeaMrnWnCZ4%2FMPkMCDRoTskxKwYdj2bDSH%2B7VKJDIOgaq1XgW8c6K0J8H2JCu5tBFKrjHfkrd1dt464grsQ6GSnfpAJ82y%2FAQvwUpMB77PN3vU8hcFXehwWmFAVhYieROPYLJTeLzkvHA7tpfSfTu7LiSHieU%2BxPSR4FIbcoY8bLcXNJwlxeuKHov2R6GZNtPr8tm6clVnVILJoiaUDVTS2ArsEl6cVTuBIxfWcHkid4kIvQpqhQ2Og95T6xF7GIYMtlGiY0kHCL4Ou5XcJkbFHZ1%2BRN2%2FTXGqH1vX69lQ4PA1xX9bgjEQTztke2un91xN9NvuUFtBc5BVrtr%2BI%2BUgbMVLctO79LnWeHw%2B5m4DFWvHZS5jy3Fp508ilF6jB3d4ASayLsA3l31x%2F641MiHI6CTajefBX7JWtPZBGmkPS4LtnkxOdZJUpYrQebpgDSu3WXk6%2FMy%2BQbN2DR2MlGDPRTdY%2BHcd1s9RCKSnc1pOWxkEnQE%2FSKDhxs2FeujBYHDKcDvJXGim2ZWIxQPb%2Bu%2B1t34UaGeKgiqLVWRx5a7eqTFQSRMFic6%2B%2FQGYC2koJXtkeE0SCQnStk5wg%2Fk%2Bc2oGZtntWJTvW6osExT3Hw%2FirkcphDzXmJ%2BFWw4ZkBovG4VN2w11oYOa2GUeZqRUDnEB6%2FS4vNk6jC73Ax18ESGM4xV4cFciE82wUMlEv2VmVCuTMOTEd8Rg54PKoBdcvFYjcRxrHlgHxZYzdd9A%2FOZk91CfCeIWmQrIjMA1b80TFqjBvYxQD0cYE9DJvIp5O4rGSj3gvMrQLDORKUAz%2F0uyxrFQM5lhRl47JQkCJoH9DjwLSiws%2B1PMeKiNIn2hRFKIoHZJRj3ZxZiEnlf7tXkqdBFl7SFTJDThOKCTRNQnFY%2FHowNkH4sqaBnjSo3F63mhcY7P5uW6d7W3Uz9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=FDzSMRR1XVn1du%2FNsXPdw58hpu%2BA7Ga85YK4kEW%2BWPm23ZqyNrqr6suJCI6wRHsovkGZe%2BBLtXU0%0ArIG94WFIyMDJBNqeawO%2F%2BABwCmACF0j32LI56itq4vssdYdipQrEvLDDmi89RF%2ByIBXAE0T04ho1%0ALA1j1Ey%2FurxulloMTOjz12KBGgzpCUNWZnbZvzM0BoUOGVYNgjeN0DFrZKapLJc%2FGTt3KpGPVyrb%0AI0MrrySMW1Di%2BQXlJ4UrfZhAAoHILxqrDh7TN21%2FUsrtke7iZLt1dv3%2Bfai%2BukC%2FWzNZcxtw3vQS%0Am3HTzVxDWjHbbFXQS2jCPT%2FMhmeOVI3NV75PlQ%3D%3D" network 2018.06.05 17:03:16.622 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "eid-prod.connect.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e&SAMLResponse=rXrXEqRIku17fUVb7SNWjVZl0z2G1iQ6gZc1tMoEEg1fv1R3j7bZe%2B%2FYfczICI847h7uxz3405%2BP9%2BunrZjmZuh%2F%2BQr%2FDH39qeizIW%2F66pevvid%2Bo77%2B%2Bdc%2Fzcn7hYzfnWIeh34ufroX9fP330d%2F%2BbpO%2FfchmZv5e5%2B8i%2Fn7kn13GUP%2FjvwMfR%2BnYRmy4fX1J76Yl6ZPlt82qpdlnL%2BDYNHk3%2B4p%2Bc%2FZ0PdFtvx8H2VPXsu3tJheTf9zXoDsWkxVMWlDvwzPIgV%2FiHaKrGi2wi2m7VUsf56L%2Bcf5lfwXHCZyGEnTbxBFY9%2BwHMW%2FpRAGf8sSiMZgkspKtPj6k8L%2F8rVAsRJKS%2FwbjZfZNwzCoW80AmffoJSmUZzAaSRN7pn9XzB7wy9f%2F5skCbQoCuRbVuTQvYiiv6U0TH9DEgonoZJGUPKH%2BHleC6Wfl6RffvmKQDD1DSK%2BQbgH498h9DtM%2FAxRePz1p%2BAvar8V9fUPJX%2F%2FbfH09xr%2B3xWczHMx%2FVDq11%2F%2Fqsx%2FUeKfwN9s9Yfwv9rTXZJlnf%2FpJzfkxU9B8lqL%2F33jG969%2BLu7Ztmt%2Fq%2Fgr39sMn7%2FB7HfhT6bznEpcuYvJ%2F2PwP3puP3yb8L4ZEn%2BkPPjj9896naofd9%2F3tGfh6kCEQiCQQgDb2e9Z%2FzXbZf8NmGCZUlGljmKFWRGQzgMESQMo1iWJnCaE%2BnXn7xzvKH%2FH%2BUJr%2BJd9MttuL8%2F2W0Io1jqIf%2BJeVXD1Cz1%2B%2F9CVlLMMEJ9y9Lshx7z%2BbtWnEpfDn8gzOd%2FIwMCIfoHvnxuqv%2F6p5MU%2BS3kd8x0QmcYDhcFhZBUQmNlkZFFntA4klF5mcP%2FXzBMc%2FIN%2Fm%2F8HwH8BibEIfqHvf76g%2FvhsWWTJUvxq6Eo%2FMVzHDO5FbMrLFMpHGMbO29HqjbESr1lJmMLOmszexUPB3cxKluZActEHtM5omFTP%2BbygW0rX4Q95uJQnZMndvAXY%2F4%2BMfPYTn1l72NMW8E3WEViYF%2FgakN3A0d4Nuzf1vCM9vua2fvCQIFktkJjcMxvC5h9j31IND2RfiVPe8lkdYs5vE0RfI2fJhRCwcO%2BhNpgKYlzP5KrpChvCyrjRO6X%2BPnqbOkFxfKwRO%2FgTKXXqr%2Bdl8FiIe8JqOEJu3kJsHEpuyEO95jyz2N%2Fhf%2Fl3%2BH%2FT%2BB%2F%2BXf4%2FxP4X%2F4d%2Fn8LX1FYpf1hqO5Td41E7xB7W1tkmAf3hbEp5nYPlqu02yUEBnmcVqokW17IbgnyDLVrDzoqHf9EME7B8wSDm0dY9XowgAlnV%2F61YK2luODRMl9kVb8igXBIJZC4zL40u7iSg%2Fdp%2B9E6%2BmAI7kzwRRSEcvJ4UyId2CazpWeOFkDrxmhYPPQzRRYNVbf%2By1qBzzT%2BWEYRLCAjKlOWFMicHt1JxlvlFnXstV7LR%2B4QsAq3Hr7dQebqRn3qOm2yTTUn4AMT5zjWDV8o1cJx78m7xzGQH%2BmFgYhqP5EccNLplLFq74VC68khKCF1kpEGJD4Cwla%2BoQWthcVbWrFHDz8rzzjFL1ihjVUeIwuAC4y6TL4l9rGARUkgkPKZ44Xf4qkfsTNF8Rh8dBgDJu9d4RmbYYdj2CX%2B9%2BslO4bwhWkZxmDmH96f8%2FttgV0ROv6frTX%2FZq0fBpos88n4wMUngzOlujy24KfW%2BoRSheCL09blByepSQKJ3qT3sfTfJeTBnYDNnMjI6%2FRRU4fMpFJwylQB6tAhIqclKnhh2hUNrmowzBUZ1oGuvmAoQNDdu2xDuacrvu%2FGviRAnFl4mxmMfPhI9SGzRTkFZL%2FhQNQ1y5r2vOvFLKBZukaDu0zlC%2FIGo%2BILvT6uXVzyR2xAKoyEZShoql37VJIDfszm79ryl%2BMACGE%2FshioD5Amck6lKtmTpLkadjciCv2BssC0fimWz9A8hxd5H2V7N%2B4JqENTGAuNZm9HpztDjjBG06D3wBq%2BVoKItbaECtuIBeWWlqI6vqolvVz4S%2BS%2BZHlJBGTkvPZffvkT%2BEco%2Ffvo%2BdfB3%2BPrjyl%2FpI4%2F0hLXjHUx%2Ff7vb3nq94Hf8vuvBU4bR3vuuWADE9kWx%2BvKe2qiLL42MSoI02OwX72%2FweJ7nVRl1jG%2BddwF3cAAC0FTteAt6OHtOdosgGqyBmcIUFVS2MIGRn7E7Kj6OjD3GZifKaSfGfgUkA51MpQwIZZ%2FiGS00j5KgcQsos9s0jMXoysB8AqeztYqQ8bklaDwS73SeFohBbDlduqeWf8yBtvTrCaG8gaj3QJ3vBccbeEoJhr58iNOAwmHsDySUUdchk7Ng8Tg8c6exrnGgle2aQaCdVHnIfkyBZEd8FC%2BerSF822aiLmpPwnvFaWFzuUphZk%2Bhh4id6dPG3Wm0w87yGlEpJchVz78GQi0F7grdtqgr2hBwvww1b%2Bo%2Bh%2BG%2FjDWPzKa227%2FzwYkvJJ9SxsQQ88rn00aQIydKE1kThZVSw3M8IbwU0%2FmNA6DtH%2FkR%2Fxok3HtuE3FxSdj7zZxrY4Fqx0CcS3pKHAz4wnxVPZN7Qb9WS3b9kbuuAfFG5MdbGcQ%2FEFOHdy2cRsKYg1gb%2BLzgjcAYdt9FNxKEtC%2Bdg4KVC7oAHr0wekflimgYeum68ia2Xmnn%2FMozx3GdEzB%2BStbhEMOxvaAQVYJiFf7WJoa4WDuakZGSsj2ZHuMRV6oPeyKs0aVkMwXfmQB7zYkzMH8vGAHHYbhIastG8U6Aqi8L3eboMsdI%2B8mYkhH3fuXfAaU0dLM8yHGZhXGCwjsgcW2%2BW5Rp0EnqeP6tJarntuPjsjoUMmnzIS8IWD96GpOP2pLXpgICBvGXHK1q%2Fcn2JfxzrOVOuEu2VMZQMNAlpqaOr%2B9QoFU3T5mu9j9DjUbpEKnNw0zxfghLS0nc7cejFXI6gKoCj4ALed8lS2MBSx1tdGorP7rqeMImz%2BXuU54mZsSO2WFxxXdfCoUGaMDcqPngkMYZ%2Bs1sp2W8ECErxyf9msbTEEBJsJsghnXcuuTCo%2F9c3i0VBIPptdhJUhX0O6VrKXfC6GIRPqi1DpKHPB8Uz76ASxeJmAS2iGRI9N46eJkJWEtjAAve3QI%2BaTYQW1ssY0c%2FuRj1xbmW00wmkQOKbNGTtIesgmcvTOcvNNlBkhz2vWAZ2%2B6imnJHjlqCOYuuZOGz8Ag%2BMBorgMw1grzC2DuQ%2BLK20cXU3PKU4PLGdfEyqT1CHz3wydOYvgk%2BhMzYaMeus7DZoUNGbtY7%2Fwyp7toKUMapTNApFUl7O7p1%2BvehCi1ENOilZMszg6REMMEH7KHc3W9YmUU8pyJ31kMcfnPFZDuvBqVeBngXe%2Fqq%2FLQ527NNss%2FiDzYDfe94LgVFMW8LvvsddfauRkyTxHFedxTWD0%2Fb%2BBZJTJiBSquht4aUPFQhmcBXthyYj8jXHqr1l2QhkJQVyUN8eagCoRdv5Qt4wymFW%2B%2FOHsx7QITKqaaBecUlAKQfAPMxxLZLWzniuVfvrdKEd9Z2aczPh9P1ABVCFVDUXNjHs0aKOCPrtBMZi1bLj28A5pz2uyNBwp5xWihvlgm45uHI42IvMXs2UObN7%2B2qQidnYeGUAiMj91FrLMCXATphyNxfTLsAt5MWssgEgMm8BGcqnlf%2FSBRRKfjXV4FJjxBepANy6avuXj2FQU%2BpjxQw5sHCaahr9ykKMM%2BQNkdplxtxHb9w9ysJlgOBvE8DonCUCUiZlwXWJ5asQg5mmlcxTtf8%2FHQxdnU%2FHz3YMQDzk1rSXmHJwfRjHRVASy7w4rW2MqL4Qbwc3S59ziujGyeTWxXJmUbs7O1Ox8Q21Ut6uDSYkR5BEHjaQEjuRJ%2BynRvV2mi8zkJAbd%2FGDcfQ%2FsP9dbvHSwGXl43n6LLZ7hwFf5Ul4pUqWAwyDKI5Gcn0YvnkfFwHSpi6znAVEbwPF1W4v2XHsoCPb73jxSD9ooNvQn1TL%2BQAV%2FB7esJ%2BIEz%2BrWFoX3aYt3FSo8oK4ZgMcS1600XNABEsZtVeM2WDTFP18yJAqY9Ng8%2FhFFOs49Xj1hAIMYLYuYmEE8Nz%2B1tIntt96xwluCSlIMJeDJH4p1P30K9Nsmj15sVs4SCneYsUNtMnZjRjXJzXj4Sa2ZZh1K7wZzQg8rGn%2FpbWD%2BYTG0jsjGrCF61wSG8QOZpqJeP9oXxp72ZtqYOSQjOs%2Bw3tTh%2B8DWhqB2zKwbpyLKmm9FiVKLIGpfV%2FWuIzSZK39IYrAFwvN9wGY7g5S8Z3Erq%2BM5lSQgetTLJ1rBmmMlGj96y38KH1ejjI1jbYiGHUKAtraAQGcAHFuunmGAE%2FQ6xZKCA2SmZ%2BClPMGYaDR4Yc8Cld0hxwk9ig5otJnodyCvbT%2BJOJ8divUA3aHef6hnM7GUU9C0LRTgWSO%2Fsp6pPc6LSE%2F489pb1WJsqccJJDo9DCYWM8hx4acSIjktDlYgmAzstBxorvYhjXWx5fdqjT66fZUcqAlzV%2BtN5w4tXUr7f%2BsbZAsV0dvpk4U1EkWeaURJgEFlW2p1q7u%2FgTVQHIlNNV5O3aPIKyXxdJzmgairWdkITzRGthQsbR88loDxeE0NIYjuaT7zNeAG4eTJVehsubVXv2KHTG5ICreuCoeAWvpBPerBU04%2FK4%2B3hAXhfzChdGercsSRI0dSPS86rrpmNlYbBepVeOcFh0CeHlDAvazj7RJFldno67UyTjmxz4SOE1It3PFrk019zCbopCHSlGLzV7O4wQaJyaLXcXPMOC7HUz4ke6RzabvJ7ewYVDKpbO53p9rrEm6A8RcDOg1MBWhYdtw7s1ZBsV8vFAxtM3w9IPT97ByoPJFoIdWCV%2Fsxd5BQdzM83frV7TSdpYXYh3LqiMqb3MmHkA2CEFWlFfV1QM3wk2xZmSwnLbvrsIQZgH6T1iHf84xeay31qFnt05GQlTlXXbDDYp4E02fxoIMlH2yySyGipn9VhyGMhUzMI6bVJ4Nl5yMV5V5UlVDJXU9YsAOT%2B2wAnHZbGR%2BTHrx2%2Br59vLZoCCAW2ikxBzIxW63tG8keb29E1x5jAokbNXFXkRGRpwWBZJMsDcxhm%2Bjh9KUAJXWHFwbYZie0cyfcj0Qk2JGTO6Qq19Kb16n3lqyDZscGWXj9oJYEP0mTVgwJhhrzZ4wRrAmoRj2Ni5KpQwbcnvQAmDTPcKB5utRFLFovvV3jFHssNepHNmzPU0bvR7XN5s28SCdiS1hyQWMtGBxz97WE5UNUpsfGXddNFldMmUSJdRjmCeJAx%2BrW2a4Dvm6U7b3qYOooQZG%2BsKAwO9WerBFMUI7dTFp0cUtUsbWOyaJidA6XBXA8KzkgqnSMDMHh8ZOsuoPJciT5UkvQGscTLGzhKqtlYyEYeMFih3ImA7mdE80icveOIP7X6ts41MC%2BzCRfqvJKTIRgZnWpZOEaPcHbl46Y5fvJiqH7sD7aghO1BjP1hLeRhrit%2FOmQd7mp0X3H1GZDknZnCrnqqqyI1ncSVXuyjOkEPpllZrLSxVcQsRzqSNwmqhVJcHyCRqUMG8CKOx1RpEK2t43kQOQFT6cc1KaN7fLZmZLUuqrS7mA%2BesPgcRQ5HzPqIHfgTkbsaPOXHghEvWuOkhhtkwbW3vY1UMQsaWFCRq0wS2DMvBKahYjwa%2BXi02%2Fbk3AVOmRRJxvPJq6tsDmxIp42oZBMITYf%2BeqlV%2Fnw77eWVYaUyucJU2uSL%2BxnnzKfXFqZJi9bDLr8OGP9qER6ez7a5W1tmshhtHUMEuyzrtenIZRcWWnplium4MznORSwNXGtZo8srA%2B6Su5aQeYm%2BVXsXi8bFBajbQw5iM0nljmXTLCWZtAtN3NeKa2PFa1jpaiCzRSKQwyk0xFHoz%2B0sF61AuZ2trT7Y1gsdzWO%2FuJuadkYxS9bNl5%2FC%2FcxguVqTrdEiAZfOY%2BMB2MIqmSjwAhp74NiQe93HKYoWHwuy8LNnEY7FGoVJB5sdyfDY%2FCEPkIggkCXDu0Y9iBcRze0z7%2F0Ohoo8LjuanSoq%2BUA6%2BAhrDHwHyGzmVhyRHy%2FoXuo7pAkTXKCr%2FwRraCzPpxE0fP2RjdCMb%2BIQfeZsgnpWSx00YjlWM8iBhs%2Fh9oDS5QxidAmYnTBNF4IJ1ZhPYL0fL8P1HUHfD4iPru5D2TndEdPF70FASoXAeuFJ3TvwjqrkMA8K2VnkvNmNb%2BggnaXO%2FXmutasEpHhy%2BEf5Cp23sBeyiZioZd3c53ItRlOXu89FZay06r6OsEQ%2BsnrelwugjAw6VJo4JwA%2FPC0tbsSiHHHSnySTsigwvvvMfZR62eBlr2nthjTNyMu0ONVoGrZ%2BKKJLQ7rIHqjdPAH%2BObVtQ7KGcPdlEKE1l0Y%2B20JanrHQusKQPB9ISXDuRbBPE3R%2F5MmxwaJSEV8OtlDc9HwK%2FjJHuHAYOX33Anyvn2yQxbPlyUvSkD1PzE4Od7DHPleMgl28aLbq606LU7WaOO0cVipYxCi%2Bi9f6co8nk0%2BA8gjSi4Ek6xpgvM%2F1CuFfuGFLetzTMePLJs4t96VzP1R%2FeZjWehA38R2QblX6yF9IEgd82STWJAbzE6NrAz3E27rNuQ53%2B%2B0Iq%2BvgGoWTdH34qCx54qLc2LVSYOJTK%2FWtD%2BUUb0PdsLUehIHqUojMheENjUH5nCTPIEHGrC0iUJEh3e5CVzIt3kXLVXH9Sa2DKrgoedGup0R8tLMjXzfBl40yk3btdv8yyXneXXFMAEp8OF%2BgqSPvNr%2FbXdb%2BGGaSELS92cURXwPK8eklzIFMToDDqri7thR6JFZbw04%2B6d4t9N2CRWn93Vr8TTSfKJ191n7zUsDcH6PwiGaADzF4%2FKAz53SaiKcK5KlXuXrmGJFnpI0qNfjN4oRi3g4GKP8IhXmIpzh8UUoU3XnEdTjAaDWzYejcMY2neAKeOvmfQ0%2Fwknkmo%2FVc6yreE8ZviVyIMQfOpycNuy7zMKDaA1GHVYicZwrbqArmdm5CBIahHHIzN%2FzPimybs5ZbJoeaBOKcfh6EEudcOyFsOoCd9KDUdDWa3u2K0HuszeIf01uckKaebLw%2B1RfNvIbnud9BiETp9uDIRyahEKa3FrOSUmair7FZFnaEN2FZg%2FBCMjNH3mqGwatHKz2XYOx1aYY88N2oank6m7p2N7jwIsYXxOfg5G3748ylJm7uw82iwyW%2BWq6pkDJoFm5Jp2DTuiKeeHjnYR0hK4f7bEvQZy6J7BHOmNLFJjgSpaRYYkdje1wnfIpGcOr3OzAJ9AWRUmm9kZfdocUCi4KBn5v4fng%2BWHzCQ1lUgk3gxBOjyBLaHS%2FCpN9GARUr3TYCeK8GhlHfG%2BXPku0ewl1PYzlOGQsr8%2ByJ%2BrPQ7WQi%2Bx1xgmTrzPJNwxLtjSoEnU4%2BjWrvmXWUKLufwIghdtRCctPXDtC1yRPSDh1K6Iky%2FU5CNzHWKiLal8lddy229ZK%2B2Q%2BmNrTpOfc%2BW3N2LlIRmb5x2ah2x7%2BLjsSqLRxmWIvqLG8TjIO8bqHsCZNTdQegy06u%2BcmiiOa%2F6TThUfVicVav1xO8%2B%2FYOe%2BfM96SnWqg2BmqDQH7c9Vjh7ZLOW%2Fjd4vUGeaMrnWnCZ4%2FMPkMCDRoTskxKwYdj2bDSH%2B7VKJDIOgaq1XgW8c6K0J8H2JCu5tBFKrjHfkrd1dt464grsQ6GSnfpAJ82y%2FAQvwUpMB77PN3vU8hcFXehwWmFAVhYieROPYLJTeLzkvHA7tpfSfTu7LiSHieU%2BxPSR4FIbcoY8bLcXNJwlxeuKHov2R6GZNtPr8tm6clVnVILJoiaUDVTS2ArsEl6cVTuBIxfWcHkid4kIvQpqhQ2Og95T6xF7GIYMtlGiY0kHCL4Ou5XcJkbFHZ1%2BRN2%2FTXGqH1vX69lQ4PA1xX9bgjEQTztke2un91xN9NvuUFtBc5BVrtr%2BI%2BUgbMVLctO79LnWeHw%2B5m4DFWvHZS5jy3Fp508ilF6jB3d4ASayLsA3l31x%2F641MiHI6CTajefBX7JWtPZBGmkPS4LtnkxOdZJUpYrQebpgDSu3WXk6%2FMy%2BQbN2DR2MlGDPRTdY%2BHcd1s9RCKSnc1pOWxkEnQE%2FSKDhxs2FeujBYHDKcDvJXGim2ZWIxQPb%2Bu%2B1t34UaGeKgiqLVWRx5a7eqTFQSRMFic6%2B%2FQGYC2koJXtkeE0SCQnStk5wg%2Fk%2Bc2oGZtntWJTvW6osExT3Hw%2FirkcphDzXmJ%2BFWw4ZkBovG4VN2w11oYOa2GUeZqRUDnEB6%2FS4vNk6jC73Ax18ESGM4xV4cFciE82wUMlEv2VmVCuTMOTEd8Rg54PKoBdcvFYjcRxrHlgHxZYzdd9A%2FOZk91CfCeIWmQrIjMA1b80TFqjBvYxQD0cYE9DJvIp5O4rGSj3gvMrQLDORKUAz%2F0uyxrFQM5lhRl47JQkCJoH9DjwLSiws%2B1PMeKiNIn2hRFKIoHZJRj3ZxZiEnlf7tXkqdBFl7SFTJDThOKCTRNQnFY%2FHowNkH4sqaBnjSo3F63mhcY7P5uW6d7W3Uz9z5ryf3Tqf%2F964l%2B%2FZPjbNw9%2F%2BUzk1%2F8B&RelayState=1528210982109&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=FDzSMRR1XVn1du%2FNsXPdw58hpu%2BA7Ga85YK4kEW%2BWPm23ZqyNrqr6suJCI6wRHsovkGZe%2BBLtXU0%0ArIG94WFIyMDJBNqeawO%2F%2BABwCmACF0j32LI56itq4vssdYdipQrEvLDDmi89RF%2ByIBXAE0T04ho1%0ALA1j1Ey%2FurxulloMTOjz12KBGgzpCUNWZnbZvzM0BoUOGVYNgjeN0DFrZKapLJc%2FGTt3KpGPVyrb%0AI0MrrySMW1Di%2BQXlJ4UrfZhAAoHILxqrDh7TN21%2FUsrtke7iZLt1dv3%2Bfai%2BukC%2FWzNZcxtw3vQS%0Am3HTzVxDWjHbbFXQS2jCPT%2FMhmeOVI3NV75PlQ%3D%3D")) network 2018.06.05 17:03:16.622 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 17:03:16.739 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig" network 2018.06.05 17:03:16.739 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors network 2018.06.05 17:03:16.739 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-GCM-SHA384, bits=256, proto=TLSv1.2) network 2018.06.05 17:03:16.740 I (:0) : Used session protocol: "TlsV1_2" network 2018.06.05 17:03:16.740 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384) network 2018.06.05 17:03:16.740 I (:0) : Used peer certificate: QSslCertificate("3", "e7:08:a6:d2:a3:00:be:42", "7d4jrw+Ie/197bX/lQTapw==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.connect.verwalt-berlin.de")), QDateTime(2016-07-20 04:59:12.000 UTC Qt::TimeSpec(UTC)), QDateTime(2019-07-25 23:59:59.000 UTC Qt::TimeSpec(UTC))) network 2018.06.05 17:03:16.740 I ...dress::onSslHandshakeDone(core/states/StateCheckRefreshAddress.cpp:162) : Handshake of tls connection done! default 2018.06.05 17:03:16.740 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048 default 2018.06.05 17:03:16.740 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000 default 2018.06.05 17:03:16.740 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" default 2018.06.05 17:03:16.740 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "774af1694f2280b09d0d640948b22a77ea638f1157f517923c255bd2aae56b94" default 2018.06.05 17:03:16.740 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C") default 2018.06.05 17:03:16.740 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" for URL origin QUrl("https://eid-prod.connect.verwalt-berlin.de:443") default 2018.06.05 17:03:16.740 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384 default 2018.06.05 17:03:16.741 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224 default 2018.06.05 17:03:16.837 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:212) : Status Code: 303 | redirect URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e") network 2018.06.05 17:03:16.837 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Location": "https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e" network 2018.06.05 17:03:16.837 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Cache-Control": "no-cache, no-store" network 2018.06.05 17:03:16.837 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Pragma": "no-cache" network 2018.06.05 17:03:16.837 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Content-Length": "0" network 2018.06.05 17:03:16.837 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Date": "Tue, 05 Jun 2018 15:03:16 GMT" network 2018.06.05 17:03:16.837 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:215) : Header | "Set-Cookie": "TS015f2d62=01d33437f99f830f21e1cdc71a11b77fe6b9aeedcd7b0848b7009167cacf04fac5c3cce811437943cfe8a82a6647be80f47766aece; Path=/" network 2018.06.05 17:03:16.837 UrlUtil::isMatchingSameOriginPolicy(network/UrlUtil.cpp:46) : SOP-Check( "https://eid-prod.connect.verwalt-berlin.de:443" , "https://eid-prod.connect.verwalt-berlin.de:443" )= true default 2018.06.05 17:03:16.837 ...shAddress::onNetworkReply(core/states/StateCheckRefreshAddress.cpp:285) : SOP-Check succeeded, abort process default 2018.06.05 17:03:16.837 ...s::fetchServerCertificate(core/states/StateCheckRefreshAddress.cpp:321) : Fetch TLS certificate for URL QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e") network 2018.06.05 17:03:16.839 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:259) : ProxyQuery(type: QNetworkProxyQuery::QueryType(UrlRequest), protocol: "https", peerPort: -1, peerHostName: "eid-prod.connect.verwalt-berlin.de", localPort: -1, url: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e")) network 2018.06.05 17:03:16.839 ...nymous}::SystemProxyFactory::queryProxy(network/NetworkManager.cpp:261) : Found proxies (NoProxy """:0" ["Tunnel Listen UDP SctpTunnel SctpListen"]) network 2018.06.05 17:03:16.957 TlsChecker::getFatalErrors(network/TlsChecker.cpp:205) : (ignored) "10: Das oberste Zertifikat der Kette ist selbstsigniert und daher nicht vertrauenswürdig" network 2018.06.05 17:03:16.957 TlsChecker::containsFatalError(network/TlsChecker.cpp:218) : Ignore SSL errors network 2018.06.05 17:03:16.957 I (:0) : Used session cipher QSslCipher(name=ECDHE-RSA-AES256-GCM-SHA384, bits=256, proto=TLSv1.2) network 2018.06.05 17:03:16.958 I (:0) : Used session protocol: "TlsV1_2" network 2018.06.05 17:03:16.958 I (:0) : Used ephemeral server key: QSslKey(PublicKey, EC, 384) network 2018.06.05 17:03:16.958 I (:0) : Used peer certificate: QSslCertificate("3", "e7:08:a6:d2:a3:00:be:42", "7d4jrw+Ie/197bX/lQTapw==", ("T-Systems International GmbH"), ("IT-Dienstleistungszentrum Berlin"), QMap((1, "eid-prod.connect.verwalt-berlin.de")), QDateTime(2016-07-20 04:59:12.000 UTC Qt::TimeSpec(UTC)), QDateTime(2019-07-25 23:59:59.000 UTC Qt::TimeSpec(UTC))) network 2018.06.05 17:03:16.958 I ...FetchingServerCertificate(core/states/StateCheckRefreshAddress.cpp:340) : Handshake of tls connection done! default 2018.06.05 17:03:16.958 TlsChecker::hasValidCertificateKeyLength(network/TlsChecker.cpp:49) : Check certificate key of type "Rsa" and key size 2048 default 2018.06.05 17:03:16.958 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 2000 default 2018.06.05 17:03:16.958 TlsChecker::checkCertificate(network/TlsChecker.cpp:29) : Check certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" default 2018.06.05 17:03:16.958 TlsChecker::checkCertificate(network/TlsChecker.cpp:31) : Certificate hash( QCryptographicHash::Algorithm(Sha256) ) "774af1694f2280b09d0d640948b22a77ea638f1157f517923c255bd2aae56b94" default 2018.06.05 17:03:16.958 TlsChecker::checkCertificate(network/TlsChecker.cpp:32) : Accepted certificate hashes QSet("774AF1694F2280B09D0D640948B22A77EA638F1157F517923C255BD2AAE56B94", "0546C2B01048CB77669003AB0743255F94582F010BAA85308133F514E218FF3C") default 2018.06.05 17:03:16.958 AuthContext::addCertificateData(core/context/AuthContext.h:143) : Adding certificate CN= ("eid-prod.connect.verwalt-berlin.de") SN= "e7:08:a6:d2:a3:00:be:42" for URL origin QUrl("https://eid-prod.connect.verwalt-berlin.de:443") default 2018.06.05 17:03:16.958 TlsChecker::hasValidEphemeralKeyLength(network/TlsChecker.cpp:84) : Check ephemeral key of type "Ec" and key size 384 default 2018.06.05 17:03:16.959 TlsChecker::isValidKeyLength(network/TlsChecker.cpp:94) : Minimum requested key size 224 default 2018.06.05 17:03:16.959 ...freshAddress::doneSuccess(core/states/StateCheckRefreshAddress.cpp:359) : Determined RefreshUrl: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e") statema... 2018.06.05 17:03:16.959 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateCheckRefreshAddress" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:16.959 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateWriteHistory" statema... 2018.06.05 17:03:16.961 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateWriteHistory" statema... 2018.06.05 17:03:17.039 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateWriteHistory" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:17.039 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "StateRedirectBrowser" statema... 2018.06.05 17:03:17.039 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "StateRedirectBrowser" activation 2018.06.05 17:03:17.039 ...sendRedirect(activation/webservice/WebserviceActivationContext.cpp:126) : Redirect URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e&ResultMajor=ok") activation 2018.06.05 17:03:17.039 ...sendRedirect(activation/webservice/WebserviceActivationContext.cpp:135) : Redirecting now to URL: QUrl("https://eid-prod.connect.verwalt-berlin.de/BuergerKontoWeb/SAMLReceiveServlet?sessionId=516d12bb-0894-4d35-b041-ca094178cf3e&ResultMajor=ok") statema... 2018.06.05 17:03:17.039 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "StateRedirectBrowser" with status: No_Error | "Es ist kein Fehler aufgetreten." statema... 2018.06.05 17:03:17.039 AbstractState::onEntry(core/states/AbstractState.cpp:77) : Next state is "FinalState" card_dr... 2018.06.05 17:03:17.042 const(card/drivers/ReaderDetector.cpp:59) : Found known reader: USB Vendor ID: "0xc4b" USB Product ID: "0x9102" statema... 2018.06.05 17:03:18.396 AbstractState::onStateApprovedChanged(core/states/AbstractState.cpp:60) : Running state "FinalState" statema... 2018.06.05 17:03:18.396 AbstractState::onExit(core/states/AbstractState.cpp:87) : Leaving state "FinalState" with status: No_Error | "Es ist kein Fehler aufgetreten." default 2018.06.05 17:03:18.417 AppController::onWorkflowFinished(core/controller/AppController.cpp:144) : governikus::AuthController done support 2018.06.05 17:03:18.424 I AppController::onWorkflowFinished(core/controller/AppController.cpp:150) : Finished workflow AUTH card_pcsc 2018.06.05 17:03:26.536 PcscReader::updateCard(card/pcsc/PcscReader.cpp:194) : old state: "(0x20022) CHANGED PRESENT" | new state: "(0x20422) CHANGED PRESENT UNPOWERED" default 2018.06.05 17:03:37.197 unknown(unknown:0) : onSelectionChange (QUrl("file:///C:/Users/Stefan/AusweisApp2.2018-06-05_15-01.log")) 1 default 2018.06.05 17:03:39.401 unknown(unknown:0) : onSelectionChange (QUrl("file:///C:/Users/Stefan/Desktop/AusweisApp2.2018-06-05_15-01.log")) 1 gui 2018.06.05 17:03:40.586 LogFilesDialog::saveLogFile(widget/LogFilesDialog.cpp:204) : File location: "C:/Users/Stefan/Desktop/AusweisApp2.2018-06-05_15-01.log"