Advertisement
Guest User

Untitled

a guest
Nov 2nd, 2016
253
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 44.45 KB | None | 0 0
  1.  
  2. 11-02 11:59:30.849 2859-2859/? I/PayActivity: starting payments for device: SECURE_PAYMENTS
  3.  
  4. --------- beginning of /dev/log/system
  5. 11-02 11:59:30.851 879-895/? I/ActivityManager: START u0 {act=com.clover.intent.action.START_LEAFCUTTER_PAYMENT cmp=com.clover.payment.builder.pay/com.clover.payment.requestor.LeafcutterPaymentsRequestorActivity (has extras)} from pid 2859
  6. 11-02 11:59:30.863 2859-2859/? I/PayActivity: onPause(CommonActivity.java:515): @41bfef08 +onPause
  7. 11-02 11:59:30.864 2859-2859/? I/PayActivity: onPause(CommonActivity.java:532): @41bfef08 -onPause
  8. 11-02 11:59:30.887 2859-2859/? I/LeafcutterPaymentsRequestorActivity: onCreate(CommonActivity.java:245): @41a49098 +onCreate: null
  9. 11-02 11:59:30.888 2859-2859/? I/LeafcutterPaymentsRequestorActivity: connect(CommonActivity.java:599): @41a49098 +connect
  10. 11-02 11:59:30.890 2859-2859/? W/ContextImpl: Implicit intents with startService are not safe: Intent { act=com.clover.sdk.employee.intent.action.EMPLOYEE_SERVICE_V3 (has extras) } android.content.ContextWrapper.bindService:517 com.clover.sdk.v1.ServiceConnector.connect:120 com.clover.common2.CommonActivity.getConnector:587
  11. 11-02 11:59:30.893 2859-2859/? W/ContextImpl: Implicit intents with startService are not safe: Intent { act=com.clover.sdk.inventory.intent.action.INVENTORY_SERVICE_V3 (has extras) } android.content.ContextWrapper.bindService:517 com.clover.sdk.v1.ServiceConnector.connect:120 com.clover.common2.CommonActivity.getConnector:587
  12. 11-02 11:59:30.894 2859-2859/? W/ContextImpl: Implicit intents with startService are not safe: Intent { act=com.clover.common.intent.action.CLOVER_SERVICE (has extras) } android.content.ContextWrapper.bindService:517 com.clover.sdk.v1.ServiceConnector.connect:120 com.clover.common2.CommonActivity.getConnector:587
  13. 11-02 11:59:30.897 2859-2859/? W/ContextImpl: Implicit intents with startService are not safe: Intent { act=com.clover.sdk.printer.intent.action.PRINTER_SERVICE (has extras) } android.content.ContextWrapper.bindService:517 com.clover.sdk.v1.ServiceConnector.connect:120 com.clover.common2.CommonActivity.getConnector:587
  14. 11-02 11:59:30.899 2859-2859/? W/ContextImpl: Implicit intents with startService are not safe: Intent { act=com.clover.intent.action.ORDER_SERVICE_V3 (has extras) } android.content.ContextWrapper.bindService:517 com.clover.sdk.v1.ServiceConnector.connect:120 com.clover.common2.CommonActivity.getConnector:587
  15. 11-02 11:59:30.901 2859-2859/? I/LeafcutterPaymentsRequestorActivity: connect(CommonActivity.java:620): @41a49098 -connect rc: true
  16. 11-02 11:59:30.902 2859-2859/? I/LeafcutterPaymentsRequestorActivity: onCreate(CommonActivity.java:282): @41a49098 -onCreate
  17. 11-02 11:59:30.916 2859-2859/? I/LeafcutterPaymentsRequestorActivity: onResume(CommonActivity.java:371): @41a49098 +onResume
  18. 11-02 11:59:30.920 2859-2859/? I/LeafcutterPaymentsRequestorActivity: onResume(CommonActivity.java:386): @41a49098 -onResume
  19. 11-02 11:59:30.931 2859-3236/? I/ServiceConnector: waitForConnection result: true, retryCount: 0
  20. 11-02 11:59:30.936 2859-2859/? D/EmployeeConnector: on service success: ResultStatus{statusCode=OK, statusMessage=null}
  21. 11-02 11:59:30.937 2859-3238/? I/SetupTask: doInBackground(CommonActivity.java:403): LeafcutterPaymentsRequestorActivity @41a49098
  22. 11-02 11:59:30.969 2859-3238/? I/SetupTask: doInBackground(CommonActivity.java:419): LeafcutterPaymentsRequestorActivity @41a49098 success: true isCancelled: false
  23. 11-02 11:59:30.970 2859-2859/? I/SetupTask: onPostExecute(CommonActivity.java:427): result:true, commonActivity: true
  24. 11-02 11:59:30.970 2859-2859/? I/SetupTask: onPostExecute(CommonActivity.java:433): LeafcutterPaymentsRequestorActivity @41a49098 isFinishing: false, resumed: true
  25. 11-02 11:59:30.971 2859-2859/? I/LeafcutterPaymentsRequestorActivity: onSetupComplete(CommonActivity.java:507): @41a49098
  26. 11-02 11:59:30.972 2859-2859/? I/SetupTask: onPostExecute(CommonActivity.java:464): LeafcutterPaymentsRequestorActivity @41a49098 setup tasks took: 56ms
  27. 11-02 11:59:30.978 2859-2859/? I/BaseOrderActivity: onPostExecuteContext(ConnectorSafeAsyncTask.java:45): onPostExecuteContext context: LeafcutterPaymentsRequestorActivity
  28. 11-02 11:59:30.979 2859-2859/? I/BaseOrderActivity: onPostExecuteContext(ConnectorSafeAsyncTask.java:53): onPostExecuteContext isFinishing: false, destroyed: false, resumed: true
  29. 11-02 11:59:30.980 2859-2859/? I/PaymentRequestor: TX type: payment
  30. 11-02 11:59:30.984 1878-1961/? D/CloverAuth: Authenticating Account {name=AIBMS Sandbox Merchant 1 | <email omitted> (DEV), type=com.clover.account}
  31. 11-02 11:59:30.992 1878-1961/? V/CloverAuth: Bundle result returned from account manager:
  32. 11-02 11:59:30.992 1878-1961/? V/CloverAuth: authAccount => AIBMS Sandbox Merchant 1 | <email omitted> (DEV)
  33. 11-02 11:59:30.992 1878-1961/? V/CloverAuth: base_url => https://apisandbox.dev.clover.com
  34. 11-02 11:59:30.993 1878-1961/? V/CloverAuth: app_id => W3S2YT65W903A
  35. 11-02 11:59:30.993 1878-1961/? V/CloverAuth: merchant_id => VMK3PEAF3FVBW
  36. 11-02 11:59:30.993 1878-1961/? V/CloverAuth: accountType => com.clover.account
  37. 11-02 11:59:30.993 1878-1961/? V/CloverAuth: authtoken => <token omitted>
  38. 11-02 11:59:31.009 879-1919/? I/ActivityManager: START u0 {act=clover.intent.action.START_SECURE_PAYMENT cmp=com.clover.payment.executor.secure/.PaymentActivity (has extras)} from pid 2859
  39. 11-02 11:59:31.017 2859-2859/? I/LeafcutterPaymentsRequestorActivity: onPause(CommonActivity.java:515): @41a49098 +onPause
  40. 11-02 11:59:31.019 2859-2859/? I/LeafcutterPaymentsRequestorActivity: onPause(CommonActivity.java:532): @41a49098 -onPause
  41. 11-02 11:59:31.030 2052-2052/? I/PaymentActivity: onCreate(BaseActivity.java:60): created
  42. 11-02 11:59:31.031 2052-2052/? I/spa-common: *** BEGIN TRANSACTION ***
  43. 11-02 11:59:31.043 2052-2052/? I/PaymentActivity: onResume(BaseActivity.java:102): resumed
  44. 11-02 11:59:31.063 2052-2052/? I/PaymentActivity: newCheckPrinterTask(BaseActivity.java:117): checking printers ...
  45. 11-02 11:59:31.069 879-1596/? W/WindowState: current user violation 0 trying to display Window{41a3c598 u0 Keyguard}, type 2004, belonging to 10007
  46. 11-02 11:59:31.073 879-1596/? W/WindowState: current user violation 0 trying to display Window{41a3c598 u0 Keyguard}, type 2004, belonging to 10007
  47. 11-02 11:59:31.089 879-894/? W/WindowState: current user violation 0 trying to display Window{41a3c598 u0 Keyguard}, type 2004, belonging to 10007
  48. 11-02 11:59:31.135 879-897/? W/WindowState: current user violation 0 trying to display Window{41a3c598 u0 Keyguard}, type 2004, belonging to 10007
  49. 11-02 11:59:31.144 1878-1883/? D/dalvikvm: GC_CONCURRENT freed 671K, 45% free 4827K/8628K, paused 6ms+7ms, total 69ms
  50. 11-02 11:59:31.154 2052-2052/? I/BaseActivity: next(ChainedAsyncTask.java:56): starting next task: com.clover.payment.executor.secure.BaseActivity$2, for task: com.clover.payment.executor.secure.BaseActivity$4
  51. 11-02 11:59:31.179 879-897/? I/ActivityManager: Displayed com.clover.payment.executor.secure/.PaymentActivity: +160ms (total +313ms)
  52. 11-02 11:59:31.187 2052-2052/? I/BaseActivity: onPostExecute(BaseActivity.java:133): printer set? true
  53. 11-02 11:59:31.188 2052-2052/? I/BaseActivity: next(ChainedAsyncTask.java:56): starting next task: com.clover.payment.executor.secure.BaseActivity$3, for task: com.clover.payment.executor.secure.BaseActivity$2
  54. 11-02 11:59:31.207 2052-2052/? I/BaseActivity: next(ChainedAsyncTask.java:56): starting next task: com.clover.payment.executor.secure.AbstractPaymentActivity$4, for task: com.clover.payment.executor.secure.BaseActivity$3
  55. 11-02 11:59:31.214 2052-2052/? I/AbstractPaymentActivity: onPostExecute(AbstractPaymentActivity.java:516): conflicted? false
  56. 11-02 11:59:31.214 2052-2052/? I/AbstractPaymentActivity: next(ChainedAsyncTask.java:56): starting next task: com.clover.payment.executor.secure.AbstractPaymentActivity$3, for task: com.clover.payment.executor.secure.AbstractPaymentActivity$4
  57. 11-02 11:59:31.221 2052-2052/? I/AbstractPaymentActivity: onPostExecute(AbstractPaymentActivity.java:462): card entry methods: 0f
  58. 11-02 11:59:31.221 1995-2000/? D/dalvikvm: GC_CONCURRENT freed 399K, 29% free 3399K/4760K, paused 4ms+1ms, total 20ms
  59. 11-02 11:59:31.225 2052-2052/? I/PaymentActivity: newInitSessionTask(AbstractPaymentActivity.java:537): starting session ...
  60. 11-02 11:59:31.225 2052-2052/? I/BaseActivity: run(BaseActivity.java:248): replacing fragment: MessageFragment{41a85ef8}, with tag: CONFIGURING
  61. 11-02 11:59:31.242 2052-2052/? I/AbstractPaymentActivity: next(ChainedAsyncTask.java:56): starting next task: com.clover.payment.executor.secure.AbstractPaymentActivity$9, for task: com.clover.payment.executor.secure.AbstractPaymentActivity$8
  62. 11-02 11:59:31.249 2052-2061/? D/dalvikvm: GC_CONCURRENT freed 460K, 16% free 4252K/5004K, paused 2ms+4ms, total 19ms
  63. 11-02 11:59:31.259 2052-2052/? I/AbstractPaymentActivity: next(ChainedAsyncTask.java:56): starting next task: com.clover.payment.executor.secure.AbstractPaymentActivity$11, for task: com.clover.payment.executor.secure.AbstractPaymentActivity$9
  64. 11-02 11:59:31.260 2052-2052/? I/AbstractPaymentActivity: next(ChainedAsyncTask.java:56): starting next task: com.clover.payment.executor.secure.AbstractPaymentActivity$10, for task: com.clover.payment.executor.secure.AbstractPaymentActivity$11
  65. 11-02 11:59:31.260 2052-2052/? I/AbstractPaymentActivity: next(ChainedAsyncTask.java:56): starting next task: com.clover.payment.executor.secure.AbstractPaymentActivity$12, for task: com.clover.payment.executor.secure.AbstractPaymentActivity$10
  66. 11-02 11:59:31.264 2052-2052/? I/AbstractPaymentActivity: next(ChainedAsyncTask.java:56): starting next task: com.clover.payment.executor.secure.AbstractPaymentActivity$15, for task: com.clover.payment.executor.secure.AbstractPaymentActivity$12
  67. 11-02 11:59:31.265 2052-2052/? I/AbstractPaymentActivity: next(ChainedAsyncTask.java:56): starting next task: com.clover.payment.executor.secure.AbstractPaymentActivity$5, for task: com.clover.payment.executor.secure.AbstractPaymentActivity$15
  68. 11-02 11:59:31.265 2052-3331/? I/CardReaderTx: open(CardReader.java:94): opening session ...
  69. 11-02 11:59:31.266 1621-1632/? D/SecureBoardConnectionProvider: Package com.clover.payment.executor.secure is attempting to open a session...
  70. 11-02 11:59:31.266 1621-1632/? V/SecureBoardManager: DeviceStatus change: STATUS_DEVICE_CONNECTING
  71. 11-02 11:59:31.271 1621-1632/? V/SecureBoardManager: Wrote to clover_sig2_value: 1
  72. 11-02 11:59:31.672 879-1742/? W/ContextImpl: Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcast:1131 com.android.server.usb.UsbSettingsManager.deviceAttached:624 com.android.server.usb.UsbHostManager.usbDeviceAdded:190 com.android.server.usb.UsbHostManager.monitorUsbHostBus:-2 com.android.server.usb.UsbHostManager.access$000:40
  73. 11-02 11:59:31.674 1621-1632/? V/SecureBoardManager: DeviceStatus change: STATUS_DEVICE_SEARCHING
  74. 11-02 11:59:31.676 1659-1659/? W/ContextImpl: Calling a method in the system process without a qualified user: android.app.ContextImpl.startService:1487 android.content.ContextWrapper.startService:494 android.content.ContextWrapper.startService:494 com.android.settings.inputmethod.UsbHidReceiver.onReceive:15 android.app.ActivityThread.handleReceiver:2419
  75. 11-02 11:59:31.682 1621-1632/? V/SecureBoardManager: DeviceStatus change: STATUS_DEVICE_FOUND
  76. 11-02 11:59:31.683 1621-1632/? V/SecureBoardManager: DeviceStatus change: STATUS_DEVICE_CONNECTED
  77. 11-02 11:59:31.685 1621-2265/? D/TinyAlsa: Opening driver
  78. 11-02 11:59:31.685 1621-1632/? D/SecureBoardConnectionProvider: Package com.clover.payment.executor.secure successfully opened a session
  79. 11-02 11:59:31.686 2052-3331/? I/CardReaderTx: open(CardReader.java:111): open session complete, 421ms
  80. 11-02 11:59:31.686 1621-2265/? V/TinyAlsaLib: Set dual ctl 1 to 36
  81. 11-02 11:59:31.686 1621-2265/? V/TinyAlsaLib: Set dual ctl 3 to 28
  82. 11-02 11:59:31.686 1621-2265/? D/TinyAlsaLib: Set volume to 73%
  83. 11-02 11:59:31.686 1621-2265/? V/TinyAlsaLib: pcm_params_get
  84. 11-02 11:59:31.687 2052-2052/? I/AbstractPaymentActivity: next(ChainedAsyncTask.java:56): starting next task: com.clover.payment.executor.secure.AbstractPaymentActivity$7, for task: com.clover.payment.executor.secure.AbstractPaymentActivity$5
  85. 11-02 11:59:31.689 1878-1878/? I/Receiver: onReceive(UsbDeviceService.java:84): USB device attached : UsbDevice[mName=/dev/bus/usb/001/026,mVendorId=10483,mProductId=2,mClass=0,mSubclass=0,mProtocol=0,mInterfaces=[Landroid.os.Parcelable;@41cd81c0]
  86. 11-02 11:59:31.695 1878-1878/? W/ContextImpl: Implicit intents with startService are not safe: Intent { act=com.clover.common.intent.action.CLOVER_SERVICE (has extras) } android.content.ContextWrapper.bindService:517 com.clover.sdk.v1.ServiceConnector.connect:120 com.clover.engine.usb.UsbDeviceService.onCreate:45
  87. 11-02 11:59:31.703 2052-3331/? I/PaymentActivity: isConfigNeeded(AbstractPaymentActivity.java:592): config needed? false
  88. 11-02 11:59:31.704 2052-3331/? I/Last: read(SerializablePersistence.java:37): unable to read data: java.io.FileNotFoundException: /data/data/com.clover.payment.executor.secure/files/bin-ranges-last.ser: open failed: ENOENT (No such file or directory)
  89. 11-02 11:59:31.706 2052-5944/? D/com.clover.payment.executor.secure.CardReaderTx: Time before: 0 [CONFIG]
  90. 11-02 11:59:31.708 2052-2052/? I/AbstractPaymentActivity: next(ChainedAsyncTask.java:59): chain finished, next is null for task: com.clover.payment.executor.secure.AbstractPaymentActivity$7
  91. 11-02 11:59:31.708 2052-2052/? I/BaseActivity: run(BaseActivity.java:248): replacing fragment: MessageFragment{41a991c0}, with tag: CONFIGURING
  92. 11-02 11:59:31.716 1621-3064/? D/dalvikvm: GC_FOR_ALLOC freed 304K, 15% free 3453K/4028K, paused 8ms, total 8ms
  93. 11-02 11:59:31.717 1621-3064/? V/SecureBoardManager: [write] functionId: 29, usb packet size: 5120 bytes, content size: 1184 bytes
  94. 11-02 11:59:31.722 1621-3064/? V/SecureBoardManager: [write] data transferred: 5120 of 5120 bytes
  95. 11-02 11:59:31.722 1621-3064/? V/SecureBoardManager: [read] requesting transfer
  96. 11-02 11:59:31.731 2052-2061/? D/dalvikvm: GC_CONCURRENT freed 497K, 17% free 4173K/5004K, paused 2ms+1ms, total 14ms
  97. 11-02 11:59:31.737 1621-3064/? V/SecureBoardManager: [read] functionId: 29, usb packet size: 5120 bytes, content size: 17 bytes
  98. 11-02 11:59:31.738 2052-5944/? D/com.clover.payment.executor.secure.CardReaderTx: Time after: 32 [CONFIG]
  99. 11-02 11:59:31.742 2052-2052/? I/PaymentActivity: handle(PaymentActivity.java:3299): configuring contactless ...
  100. 11-02 11:59:31.744 2052-5944/? D/com.clover.payment.executor.secure.CardReaderTx: Time before: 32 [CONFIG]
  101. 11-02 11:59:31.745 1621-1633/? V/SecureBoardManager: [write] functionId: 29, usb packet size: 5120 bytes, content size: 1186 bytes
  102. 11-02 11:59:31.751 1621-1633/? V/SecureBoardManager: [write] data transferred: 5120 of 5120 bytes
  103. 11-02 11:59:31.751 1621-1633/? V/SecureBoardManager: [read] requesting transfer
  104. 11-02 11:59:31.763 1621-1633/? V/SecureBoardManager: [read] functionId: 29, usb packet size: 5120 bytes, content size: 22 bytes
  105. 11-02 11:59:31.763 2052-5944/? D/com.clover.payment.executor.secure.CardReaderTx: Time after: 51 [CONFIG]
  106. 11-02 11:59:31.764 2052-2052/? I/PaymentActivity: handle(PaymentActivity.java:3314): config complete, injecting CAPK keys ...
  107. 11-02 11:59:31.770 1621-1632/? V/SecureBoardManager: [write] functionId: 29, usb packet size: 5120 bytes, content size: 269 bytes
  108. 11-02 11:59:31.776 1621-1632/? V/SecureBoardManager: [write] data transferred: 5120 of 5120 bytes
  109. 11-02 11:59:31.776 1621-1632/? V/SecureBoardManager: [read] requesting transfer
  110. 11-02 11:59:31.782 1621-1632/? V/SecureBoardManager: [read] functionId: 29, usb packet size: 5120 bytes, content size: 17 bytes
  111. 11-02 11:59:31.783 2052-3319/? I/CardReaderTx: injectCapkKeys(CardReader.java:248): CAPKs cleared
  112. 11-02 11:59:31.811 2052-2061/? D/dalvikvm: GC_CONCURRENT freed 423K, 15% free 4259K/5004K, paused 2ms+1ms, total 17ms
  113. 11-02 11:59:31.811 2052-3319/? D/dalvikvm: WAIT_FOR_CONCURRENT_GC blocked 5ms
  114. 11-02 11:59:31.813 2052-3319/? I/CardReaderTx: injectCapkKeys(CardReader.java:291): EmvPacket{functionId: KEYS, responseCode: SUCCESS}
  115. Custom:
  116. CA_KEY_CONTAINER(CC43): CC360005A000000004CC370001FECC38000103CC390080A653EAC1C0F786C8724F737F172997D63D1C3251C44402049B865BAE877D0F398CBFBE8A6035E24AFA086BEFDE9351E54B95708EE672F0968BCD50DCE40F783322B2ABA04EF137EF18ABF03C7DBC5813AEAEF3AA7797BA15DF7D5BA1CBAF7FD520B5A482D8D3FEE105077871113E23A49AF3926554A70FE10ED728CF793B62A1CC4000149A295B05FB390EF7923F57618A9FDA2941FC34E0CC41000101CC42000101CC3C000100
  117. CA_KEY_SIGNATURE(CC44): 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
  118. CA_KEY_CONTAINER(CC43): CC360005A000000004CC370001F3CC38000103CC39009098F0C770F23864C2E766DF02D1E833DFF4FFE92D696E1642F0A88C5694C6479D16DB1537BFE29E4FDC6E6E8AFD1B0EB7EA0124723C333179BF19E93F10658B2F776E829E87DAEDA9C94A8B3382199A350C077977C97AFF08FD11310AC950A72C3CA5002EF513FCCC286E646E3C5387535D509514B3B326E1234F9CB48C36DDD44B416D23654034A66F403BA511C5EFA3CC400014A69AC7603DAF566E972DEDC2CB433E07E8B01A9ACC41000101CC42000101CC3C000100
  119. CA_KEY_SIGNATURE(CC44): 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
  120. CA_KEY_CONTAINER(CC43): CC360005A000000004CC370001FACC38000103CC390090A90FCD55AA2D5D9963E35ED0F440177699832F49C6BAB15CDAE5794BE93F934D4462D5D12762E48C38BA83D8445DEAA74195A301A102B2F114EADA0D180EE5E7A5C73E0C4E11F67A43DDAB5D55683B1474CC0627F44B8D3088A492FFAADAD4F42422D0E7013536C3C49AD3D0FAE96459B0F6B1B6056538A3D6D44640F94467B108867DEC40FAAECD740C00E2B7A8852DCC4000145BED4068D96EA16D2D77E03D6036FC7A160EA99CCC41000101CC42000101CC3C000100
  121. CA_KEY_SIGNATURE(CC44): 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
  122. CA_KEY_CONTAINER(CC43): CC360005A000000004CC370001F1CC38000103CC3900B0A0DCF4BDE19C3546B4B6F0414D174DDE294AABBB828C5A834D73AAE27C99B0B053A90278007239B6459FF0BBCD7B4B9C6C50AC02CE91368DA1BD21AAEADBC65347337D89B68F5C99A09D05BE02DD1F8C5BA20E2F13FB2A27C41D3F85CAD5CF6668E75851EC66EDBF98851FD4E42C44C1D59F5984703B27D5B9F21B8FA0D93279FBBF69E090642909C9EA27F898959541AA6757F5F624104F6E1D3A9532F2A6E51515AEAD1B43B3D7835088A2FAFA7BE7CC400014D8E68DA167AB5A85D8C3D55ECB9B0517A1A5B4BBCC41000101CC42000101CC3C000100
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
  124. CA_KEY_CONTAINER(C
  125. 11-02 11:59:31.814 1621-3064/? V/SecureBoardManager: [write] functionId: 29, usb packet size: 5120 bytes, content size: 4615 bytes
  126. 11-02 11:59:31.820 1621-3064/? V/SecureBoardManager: [write] data transferred: 5120 of 5120 bytes
  127. 11-02 11:59:31.820 1621-3064/? V/SecureBoardManager: [read] requesting transfer
  128. 11-02 11:59:31.867 1621-3064/? V/SecureBoardManager: [read] functionId: 29, usb packet size: 5120 bytes, content size: 17 bytes
  129. 11-02 11:59:31.868 2052-3319/? I/CardReaderTx: injectCapkKeys(CardReader.java:298): CAPK load success
  130. 11-02 11:59:31.885 2052-3319/? D/dalvikvm: GC_FOR_ALLOC freed 375K, 15% free 4259K/5004K, paused 15ms, total 15ms
  131. 11-02 11:59:31.886 2052-3319/? I/CardReaderTx: injectCapkKeys(CardReader.java:291): EmvPacket{functionId: KEYS, responseCode: SUCCESS}
  132. Custom:
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
  134. CA_KEY_SIGNATURE(CC44): 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
  135. CA_KEY_CONTAINER(CC43): CC360005A000000003CC37000196CC38000103CC390080B74586D19A207BE6627C5B0AAFBC44A2ECF5A2942D3A26CE19C4FFAEEE920521868922E893E7838225A3947A2614796FB2C0628CE8C11E3825A56D3B1BBAEF783A5C6A81F36F8625395126FA983C5216D3166D48ACDE8A431212FF763A7F79D9EDB7FED76B485DE45BEB829A3D4730848A366D3324C3027032FF8D16A1E44D8DCC4000147616E9AC8BE014AF88CA11A8FB17967B7394030ECC41000101CC42000101CC3C000100
  136. CA_KEY_SIGNATURE(CC44): 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
  137. CA_KEY_CONTAINER(CC43): CC360005A000000003CC37000150CC380003010001CC390080D11197590057B84196C2F4D11A8F3C05408F422A35D702F90106EA5B019BB28AE607AA9CDEBCD0D81A38D48C7EBB0062D287369EC0C42124246AC30D80CD602AB7238D51084DED4698162C59D25EAC1E66255B4DB2352526EF0982C3B8AD3D1CCE85B01DB5788E75E09F44BE7361366DEF9D1E1317B05E5D0FF5290F88A0DB47CC400014B769775668CACB5D22A647D1D993141EDAB7237BCC41000101CC42000101CC3C000100
  138. CA_KEY_SIGNATURE(CC44): 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
  139. CA_KEY_CONTAINER(CC43): CC360005A000000003CC37000151CC38000103CC390090DB5FA29D1FDA8C1634B04DCCFF148ABEE63C772035C79851D3512107586E02A917F7C7E885E7C4A7D529710A145334CE67DC412CB1597B77AA2543B98D19CF2CB80C522BDBEA0F1B113FA2C86216C8C610A2D58F29CF3355CEB1BD3EF410D1EDD1F7AE0F16897979DE28C6EF293E0A19282BD1D793F1331523FC71A228800468C01A3653D14C6B4851A5C029478E757FCC400014B9D248075A3F23B522FE45573E04374DC4995D71CC41000101CC42000101CC3C000100
  140. CA_KEY_SIGNATURE(CC44): E92C51EE955376813E24328A2FF3843117BD5CE4BE5AE32CE9F16B869A348F23CE62D72DF11D28E142DD40B55331138093E38E86B199208C0E2BBEEDFA39DFF61743F2F40EDB58A09EB9EB17DB21DF5C643A91D888E822B6E4A0E918C873854A6F8B891FE462E5D9EB62B97FD01840D63695599372BB7E9F856108E100865DE888DA4385A07EC7FDD0E3C183AAE81F8C249CFABBA8078136E185FFC9FFAA0DC64C4DA9EB2D292306EADBE6163F2A600ED5075827C4C0549B11E7D649BF8550B9F2127D99E36A7EEA327B018BB9DCE2725
  141. 11-02 11:59:31.888 1621-1633/? V/SecureBoardManager: [write] functionId: 29, usb packet size: 5120 bytes, content size: 4827 bytes
  142. 11-02 11:59:31.894 1621-1633/? V/SecureBoardManager: [write] data transferred: 5120 of 5120 bytes
  143. 11-02 11:59:31.894 1621-1633/? V/SecureBoardManager: [read] requesting transfer
  144. 11-02 11:59:31.942 1621-1633/? V/SecureBoardManager: [read] functionId: 29, usb packet size: 5120 bytes, content size: 17 bytes
  145. 11-02 11:59:31.944 2052-3319/? I/CardReaderTx: injectCapkKeys(CardReader.java:298): CAPK load success
  146. 11-02 11:59:31.947 2052-3319/? I/CardReaderTx: injectCapkKeys(CardReader.java:291): EmvPacket{functionId: KEYS, responseCode: SUCCESS}
  147. Custom:
  148. CA_KEY_CONTAINER(CC43): CC360005A000000004CC37000105CC38000103CC390080A1F5E1C9BD8650BD43AB6EE56B891EF7459C0A24FA84F9127D1A6C79D4930F6DB1852E2510F18B61CD354DB83A356BD190B88AB8DF04284D02A4204A7B6CB7C5551977A9B36379CA3DE1A08E69F301C95CC1C20506959275F41723DD5D2925290579E5A95B0DF6323FC8E9273D6F849198C4996209166D9BFC973C361CC826E1CC40001453D04903B496F59544A84309AF169251F2896874CC41000101CC42000101CC3C000100
  149. CA_KEY_SIGNATURE(CC44): 0028C3DE01622AAECFAED8A709BD1F0FDF1AC37484DE1923E8510103C924FA43A05CE23A1C0DD5279A0C6847157FCBC1A0F2734CD8046195C8FB4A390239E1CC3C7F3A363DB37EDCC080958BA7CD255F816F7E447472C57F264344EE1D3EBA91991D7E573A9EC79985643793D7137BD60CEA8DFBA9CEA2BA0CE874358D239AFA498672889747146F291465E41A2E85994969EA25AC010E8BAAFF8D795FAE35358ED6B82684A456458A57EB0352102069BF7251DAAA9B90B1B59CE993610778832E0B2D8FD37483DF5C75480BAC8537BD1B9996EA6455F747FA10D6C9223D41892636FFBB2EF042B403F1102CDFAFB2A9359A34EC94FBA8326889957D1572BD2B
  150. CA_KEY_CONTAINER(CC43): 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
  151. CA_KEY_SIGNATURE(CC44): 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
  152. CA_KEY_CONTAINER(CC43): CC360005A000000004CC370001F1CC38000103CC3900B0A0DCF4BDE19C3546B4B6F0414D174DDE294AABBB828C5A834D73AAE27C99B0B053A90278007239B6459FF0BBCD7B4B9C6C50AC02CE91368DA1BD21AAEADBC65347337D89B68F5C99A09D05BE02DD1F8C5BA20E2F13FB2A27C41D3F85CAD5CF6668E75851EC66EDBF98851FD4E42C44C1D59F5984703B27D5B9F21B8FA0D93279FBBF69E090642909C9EA27F898959541AA6757F5F624104F6E1D3A9532F2A6E51515AEAD1B43B3D7835088A2FAFA7BE7CC400014D8E68DA167AB5A85D8C3D55ECB9B0517A1A5B4BBCC41000101CC42000101CC3C000100
  153. CA_KEY_SIGNATURE(CC44): 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
  154. CA_KEY_CONTAINER(CC43): CC360005A000000004CC370001F3CC38000103CC39009098F0C770F23864C2E766DF02D1E833DFF4FFE92D696E1642F0A88C5694C6479D16DB1537BFE29E4FDC6E6E8AFD1B0EB7EA0124723C333179BF19E93F10658B2F776E829E87DAEDA9C94A8B3382199A350C077977C97AFF08FD11310AC950A72C3CA5002EF513FCCC286E646E3C5387535D509514B3B326E1234F9CB48C36DDD44B416D23654034A66F403BA511C5EFA3CC400014A69AC7603DAF566E972DEDC2CB433E07E8B01A9ACC41000101CC42000101CC3C000100
  155. CA_KEY_SIGNATURE(CC44): CEAB08773F552550605891386182522B4E96A4580162102A231589BCF1FEFA6933F5BE3837C35CE5E233701F432DD38E272A8AB6A070D6E9C9ED66AF576F007C08A2F9E12D4E5EB437323800724C1DA3985615970D56688715AC8A97785221CF8AF8C00CBFF217A49A925389FED569DAC1E46DADE36258B80818E44AB125A32F1A0427C7A07E895D00F75071D4EDD60FA21301B7595A3981F236F9725A317790ADF73
  156. 11-02 11:59:31.949 1621-1632/? V/SecureBoardManager: [write] functionId: 29, usb packet size: 5120 bytes, content size: 4819 bytes
  157. 11-02 11:59:31.954 149-358/? D/AudioPolicyManagerBase: setOutputDevice() output 2 device 0000 delayMs 170
  158. 11-02 11:59:31.954 149-358/? D/AudioPolicyManagerBase: setOutputDevice() prevDevice 0002
  159. 11-02 11:59:31.955 1621-1632/? V/SecureBoardManager: [write] data transferred: 5120 of 5120 bytes
  160. 11-02 11:59:31.955 1621-1632/? V/SecureBoardManager: [read] requesting transfer
  161. 11-02 11:59:31.968 1621-2265/? V/TinyAlsaLib: Open PCM device: 2 ch, 48000 hz, 16 bit
  162. 11-02 11:59:31.968 1621-2265/? V/TinyAlsaLib: Open PCM device complete
  163. 11-02 11:59:31.969 1621-2265/? D/TinyAlsa: Opened driver
  164. 11-02 11:59:32.003 1621-1632/? V/SecureBoardManager: [read] functionId: 29, usb packet size: 5120 bytes, content size: 17 bytes
  165. 11-02 11:59:32.003 2052-3319/? I/CardReaderTx: injectCapkKeys(CardReader.java:298): CAPK load success
  166. 11-02 11:59:32.025 2052-3319/? D/dalvikvm: GC_FOR_ALLOC freed 571K, 18% free 4274K/5184K, paused 16ms, total 16ms
  167. 11-02 11:59:32.025 2052-3319/? I/CardReaderTx: injectCapkKeys(CardReader.java:291): EmvPacket{functionId: KEYS, responseCode: SUCCESS}
  168. Custom:
  169. CA_KEY_CONTAINER(CC43): CC360005A000000004CC370001FACC38000103CC390090A90FCD55AA2D5D9963E35ED0F440177699832F49C6BAB15CDAE5794BE93F934D4462D5D12762E48C38BA83D8445DEAA74195A301A102B2F114EADA0D180EE5E7A5C73E0C4E11F67A43DDAB5D55683B1474CC0627F44B8D3088A492FFAADAD4F42422D0E7013536C3C49AD3D0FAE96459B0F6B1B6056538A3D6D44640F94467B108867DEC40FAAECD740C00E2B7A8852DCC4000145BED4068D96EA16D2D77E03D6036FC7A160EA99CCC41000101CC42000101CC3C000100
  170. CA_KEY_SIGNATURE(CC44): 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
  171. CA_KEY_CONTAINER(CC43): CC360005A000000152CC3700015ACC38000103CC390080EDD8252468A705614B4D07DE3211B30031AEDB6D33A4315F2CFF7C97DB918993C2DC02E79E2FF8A2683D5BBD0F614BC9AB360A448283EF8B9CF6731D71D6BE939B7C5D0B0452D660CF24C21C47CAC8E26948C8EED8E3D00C016828D642816E658DC2CFC61E7E7D7740633BEFE34107C1FB55DEA7FAAEA2B25E85BED948893D07CC400014CC9585E8E637191C10FCECB32B5AE1B9D410B52DCC42000101CC41000101CC3C000100
  172. CA_KEY_SIGNATURE(CC44): 1404D8CEB316509851A022BCD7B7DA36D62FF8F3FF82F85087B323DE270DE67F2D8D132201632E380B841829849DB1FEFEB6206C1C2334EA547A2A5E1C86C1058E8638B728BF3CEC0A181F1178F392C147AAB75ECEEDF87FDCFDEC768B597010A6D9798317609AF5846552A4A167CC2EA4226EE7C8976963FD781ACD0445B3440A5AA49C56D8102DE2C93165F5B7DFEB3F5AD623762C3F4C417853B6248E1C7D14D1C359B47B9F10E166FDFC8D389CBD7562B1150DFFD3DBB3CF606CA81245018BECF655665B7417B8F5EC4AE6534ED2B4513FA08C4E495E2241C08F6565F32E1FD62BF371391A99BE603586B117A0997CB834BA088211CDFA2D1ED37AF983FA
  173. CA_KEY_CONTAINER(CC43): CC360005A000000152CC3700015BCC38000103CC390090D3F45D065D4D900F68B2129AFA38F549AB9AE4619E5545814E468F382049A0B9776620DA60D62537F0705A2C926DBEAD4CA7CB43F0F0DD809584E9F7EFBDA3778747BC9E25C5606526FAB5E491646D4DD28278691C25956C8FED5E452F2442E25EDC6B0C1AA4B2E9EC4AD9B25A1B836295B823EDDC5EB6E1E0A3F41B28DB8C3B7E3E9B5979CD7E079EF024095A1D19DDCC4000144DC5C6CAB6AE96974D9DC8B2435E21F526BC7A60CC42000101CC41000101CC3C000100
  174. CA_KEY_SIGNATURE(CC44): 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
  175. CA_KEY_CONTAINER(CC43): CC360005A000000025CC3700010ECC38000103CC390090AA94A8C6DAD24F9BA56A27C09B01020819568B81A026BE9FD0A3416CA9A71166ED5084ED91CED47DD457DB7E6CBCD53E560BC5DF48ABC380993B6D549F5196CFA77DFB20A0296188E969A2772E8C4141665F8BB2516BA2C7B5FC91F8DA04E8D512EB0F6411516FB86FC021CE7E969DA94D33937909A53A57F907C40C22009DA7532CB3BE509AE173B39AD6A01BA5BB85CC400014A7266ABAE64B42A3668851191D49856E17F8FBCDCC42000101CC41000101CC3C000100
  176. CA_KEY_SIGNATURE(CC44): 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
  177. CA_KEY_CONTAINER(CC43): CC360005A000000025CC3700010FCC38000103CC3900B0C8D5AC27A5E1
  178. 11-02 11:59:32.029 1621-3064/? V/SecureBoardManager: [write] functionId: 29, usb packet size: 5120 bytes, content size: 4647 bytes
  179. 11-02 11:59:32.035 1621-3064/? V/SecureBoardManager: [write] data transferred: 5120 of 5120 bytes
  180. 11-02 11:59:32.035 1621-3064/? V/SecureBoardManager: [read] requesting transfer
  181. 11-02 11:59:32.083 1621-3064/? V/SecureBoardManager: [read] functionId: 29, usb packet size: 5120 bytes, content size: 17 bytes
  182. 11-02 11:59:32.083 2052-3319/? I/CardReaderTx: injectCapkKeys(CardReader.java:298): CAPK load success
  183. 11-02 11:59:32.087 2052-3319/? I/CardReaderTx: injectCapkKeys(CardReader.java:291): EmvPacket{functionId: KEYS, responseCode: SUCCESS}
  184. Custom:
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
  186. CA_KEY_SIGNATURE(CC44): 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
  187. CA_KEY_CONTAINER(CC43): CC360005A000000025CC37000104CC38000103CC390060D0F543F03F2517133EF2BA4A1104486758630DCFE3A883C77B4E4844E39A9BD6360D23E6644E1E071F196DDF2E4A68B4A3D93D14268D7240F6A14F0D714C17827D279D192E88931AF7300727AE9DA80A3F0E366AEBA61778171737989E1EE309CC400014FDD7139EC7E0C33167FD61AD3CADBD68D66E91C5CC42000101CC41000101CC3C000100
  188. CA_KEY_SIGNATURE(CC44): 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
  189. CA_KEY_CONTAINER(CC43): CC360005A000000025CC37000197CC38000103CC390090E178FFE834B4B767AF3C9A511F973D8E8505C5FCB2D3768075AB7CC946A955789955879AAF737407151521996DFA43C58E6B130EB1D863B85DC9FFB4050947A2676AA6A061A4A7AE1EDB0E36A697E87E037517EB8923136875BA2CA1087CBA7EC7653E5E28A0C261A033AF27E3A67B64BBA26956307EC47E674E3F8B722B3AE0498DB16C7985310D9F3D117300D32B09CC400014EBDA522B631B3EB4F4CBFC0679C450139D2B69CDCC42000101CC41000101CC3C000100
  190. CA_KEY_SIGNATURE(CC44): 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
  191. CA_KEY_CONTAINER(CC43): CC360005A000000025CC37000198CC38000103CC3900B0D31A7094FB221CBA6660FB975AAFEA80DB7BB7EAFD7351E748827AB62D4AEECCFC1787FD47A04699A02DB00D7C382E80E804B35C59434C602389D691B9CCD51ED06BE67A276119C4C10E2E40FC4EDDF9DF39B9B0BDEE8D076E2A012E8A292AF8EFE18553470639C1A032252E0E5748B25A3F9BA4CFCEE073038B061837F2AC1B04C279640F5BD110A9DC665ED2FA6828BD5D0FE810A892DEE6B0E74CE8863BDE08FD5FD61A0F11FA0D14978D8CED7DD3CC400014D4DBA428CF11D45BAEB0A35CAEA8007AD8BA8D71CC42000101CC41000101CC3C000100
  192. CA_KEY_SIGNATURE(CC44): D63CF30BD3A824481277F2B6F0A4B810F3286767B2DAA71E5EA15AE7AAE8977C87B4AD45DB33E35E48405577948B4DEDDF91ED347A503E28FE07470C28F6AC295975D9DBE29707CCD1F9B8D1AEB8C3158AA2F413683F6C1CFDB928958BB0A370956F68E37AA35B10F68C65B8D6883A7851B5945030E0A83E2103B265E60E0AD5E229D13A3EEA78F986F58C9782DF108C54599DC7AB675AE3925CD00FEDA4288A66C69D08162F6E27C6FAB70FF052057759221E1EF458F47B052FEECF8257DEAA13DE4
  193. 11-02 11:59:32.089 1621-1633/? V/SecureBoardManager: [write] functionId: 29, usb packet size: 5120 bytes, content size: 4855 bytes
  194. 11-02 11:59:32.095 1621-1633/? V/SecureBoardManager: [write] data transferred: 5120 of 5120 bytes
  195. 11-02 11:59:32.095 1621-1633/? V/SecureBoardManager: [read] requesting transfer
  196. 11-02 11:59:32.142 1621-1633/? V/SecureBoardManager: [read] functionId: 29, usb packet size: 5120 bytes, content size: 17 bytes
  197. 11-02 11:59:32.143 2052-3319/? I/CardReaderTx: injectCapkKeys(CardReader.java:298): CAPK load success
  198. 11-02 11:59:32.145 2052-3319/? I/CardReaderTx: injectCapkKeys(CardReader.java:291): EmvPacket{functionId: KEYS, responseCode: SUCCESS}
  199. Custom:
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
  201. CA_KEY_SIGNATURE(CC44): 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
  202. }
  203. 11-02 11:59:32.146 1621-1632/? V/SecureBoardManager: [write] functionId: 29, usb packet size: 5120 bytes, content size: 839 bytes
  204. 11-02 11:59:32.152 1621-1632/? V/SecureBoardManager: [write] data transferred: 5120 of 5120 bytes
  205. 11-02 11:59:32.152 1621-1632/? V/SecureBoardManager: [read] requesting transfer
  206. 11-02 11:59:32.162 1621-1632/? V/SecureBoardManager: [read] functionId: 29, usb packet size: 5120 bytes, content size: 17 bytes
  207. 11-02 11:59:32.163 2052-3319/? I/CardReaderTx: injectCapkKeys(CardReader.java:298): CAPK load success
  208. 11-02 11:59:32.178 2052-5944/? D/com.clover.payment.executor.secure.CardReaderTx: Time before: 51 [INSTALL_BINS]
  209. 11-02 11:59:32.179 1621-3064/? V/SecureBoardManager: [write] functionId: 29, usb packet size: 5120 bytes, content size: 385 bytes
  210. 11-02 11:59:32.185 1621-3064/? V/SecureBoardManager: [write] data transferred: 5120 of 5120 bytes
  211. 11-02 11:59:32.185 1621-3064/? V/SecureBoardManager: [read] requesting transfer
  212. 11-02 11:59:32.188 2052-2061/? D/dalvikvm: GC_CONCURRENT freed 533K, 21% free 4135K/5184K, paused 2ms+1ms, total 23ms
  213. 11-02 11:59:32.195 1621-3064/? V/SecureBoardManager: [read] functionId: 29, usb packet size: 5120 bytes, content size: 9 bytes
  214. 11-02 11:59:32.195 2052-5944/? D/com.clover.payment.executor.secure.CardReaderTx: Time after: 68 [INSTALL_BINS]
  215. 11-02 11:59:32.197 2052-2052/? I/BaseActivity: run(BaseActivity.java:248): replacing fragment: MessageFragment{41b85c68}, with tag: FATAL
  216. 11-02 11:59:32.996 2859-2865/? D/dalvikvm: GC_CONCURRENT freed 803K, 16% free 4870K/5744K, paused 2ms+3ms, total 20ms
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement