D160 Openpay AID CAPK
unknown
c_cpp
9 months ago
93 kB
12
Indexable
//AIDS
/*-----------------------------------------------------------------------------*/
typedef struct{
unsigned char AppName[33]; //Local application name. The string ends with '\x00' and is 32 bytes in maximum.
unsigned char AID[17]; //Application ID.
unsigned char AidLen; //the length of AID
unsigned char SelFlag; //Application selection flag (partial matching PART_MATCH or full matching FULL_MATCH)
unsigned char Priority; //priority indicator
unsigned char TargetPer; //Target percent (0 ¨C 99) (provided by acquirer)
unsigned char MaxTargetPer; //Max target percent(0 ¨C 99) (provided by acquirer)
unsigned char FloorLimitCheck; //Check the floor limit or not (1: check(default), 0 : not check)
unsigned char RandTransSel; //Perform random transaction selection or not (1: perform(default), 0 : not perform)
unsigned char VelocityCheck; //Perform velocity check or not (1 : perform(default), 0 not perform)
unsigned long FloorLimit; //Floor limit (provided by acquirer)
unsigned long Threshold; //Threshold (provided by acquirer)
unsigned char TACDenial[6]; //Terminal action code - denial
unsigned char TACOnline[6]; //Terminal action code ¨C online
unsigned char TACDefault[6]; //Terminal action code ¨C default
unsigned char AcquierId[6]; //Acquirer identifier
unsigned char dDOL[256]; //terminal default DDOL
unsigned char tDOL[256]; //terminal default TDOL
unsigned char Version[3]; //application version
unsigned char RiskManData[10]; //Risk management data
}EMV_APPLIST;
////////APLICACIONES CONFIGURACION PROSA
#ifdef EMV_PROD_VERSION
EMV_APPLIST VISA_CREDIT={
"VISA CREDIT",//App name
"\xA0\x00\x00\x00\x03\x10\x10",//AID
7,//Aid length
PART_MATCH,
0,//Priority
0,//target percent
0,//Max target percent
1,//Check the floor limit or not
0,//Perform random transaction selection
1,//Perform velocity check or not
0,//Floor limit
0,//Threshold
"\x00\x10\x00\x00\x00", //TACDenial OK
"\xDC\x40\x04\xF8\x00", //TACOnline OK
"\xDC\x40\x00\xA8\x00", //TACDefault OK
"\x00\x00\x00\x12\x34\x56",//Acquirer identifier
"\x03\x9F\x37\x04",//terminal default DDOL
"\x09\x9F\x1A\x02\x95\x05\x9A\x03\x9C\x01",//terminal default TDOL
TermAVN1,//application version
"",//Risk management data
};
EMV_APPLIST VISA_CREDIT_1 = {
"VISA CREDIT 1",//App name
"\xA0\x00\x00\x00\x03\x10\x20",//AID
7,//Aid length
PART_MATCH,
0,//Priority
0,//target percent
0,//Max target percent
1,//Check the floor limit or not
0,//Perform random transaction selection
1,//Perform velocity check or not
0,//Floor limit
0,//Threshold
"\x00\x10\x00\x00\x00", //TACDenial OK
"\xDC\x40\x04\xF8\x00", //TACOnline OK
"\xDC\x40\x00\xA8\x00", //TACDefault OK
"\x00\x00\x00\x12\x34\x56",//Acquirer identifier
"\x03\x9F\x37\x04",//terminal default DDOL
"\x09\x9F\x1A\x02\x95\x05\x9A\x03\x9C\x01",//terminal default TDOL
TermAVN1,//application version
"",//Risk management data
};
EMV_APPLIST VISA_ELECTRON = {
"VISA ELECTRON",//App name
"\xA0\x00\x00\x00\x03\x20\x10",//AID
7,//Aid length
PART_MATCH,
0,//Priority
0,//target percent
0,//Max target percent
1,//Check the floor limit or not
0,//Perform random transaction selection
1,//Perform velocity check or not
0,//Floor limit
0,//Threshold
"\x00\x10\x00\x00\x00", //TACDenial OK
"\xDC\x40\x04\xF8\x00", //TACOnline OK
"\xDC\x40\x00\xA8\x00", //TACDefault OK
"\x00\x00\x00\x12\x34\x56",//Acquirer identifier
"\x03\x9F\x37\x04",//terminal default DDOL
"\x09\x9F\x1A\x02\x95\x05\x9A\x03\x9C\x01",//terminal default TDOL
TermAVN1,//application version
"",//Risk management data
};
EMV_APPLIST VISA_INTERLINK = {
"VISA INTERLINK",//App name
"\xA0\x00\x00\x00\x03\x30\x10",//AID
7,//Aid length
PART_MATCH,
0,//Priority
0,//target percent
0,//Max target percent
1,//Check the floor limit or not
0,//Perform random transaction selection
1,//Perform velocity check or not
0,//Floor limit
0,//Threshold
"\x00\x10\x00\x00\x00",//Terminal action code - denial
"\x58\x40\x00\xA8\x00",//Terminal action code - online
"\x58\x40\x04\xF8\x00",//Terminal action code - default
"\x00\x00\x00\x12\x34\x56",//Acquirer identifier
"\x03\x9F\x37\x04",//terminal default DDOL
"\x09\x9F\x1A\x02\x95\x05\x9A\x03\x9C\x01",//terminal default TDOL
TermAVN1,//application version
"",//Risk management data
};
EMV_APPLIST MCHIP = {
"MCHIP",//App name
"\xA0\x00\x00\x00\x04\x10\x10",//AID
7,//Aid length
PART_MATCH,//Application selection flag
0,//Priority
0,//target percent
0,//Max target percent
1,//Check the floor limit or not
0,//Perform random transaction selection
1,//Perform velocity check or not
0,//Floor limit
0,//Threshold
"\x00\x00\x00\x00\x00",//Terminal action code - denial
"\xFE\x50\xB8\xF8\x00",//Terminal action code - online
"\xFE\x50\xB8\xA0\x00",//Terminal action code - default
"\x00\x00\x00\x12\x34\x56",//Acquirer identifier
"\x03\x9F\x37\x04",//terminal default DDOL
"\x09\x9F\x1A\x02\x95\x05\x9A\x03\x9C\x01",//terminal default TDOL
TermAVN2,//application version
"",//Risk management data
};
EMV_APPLIST AMEX = {
"AMEX",//App name
"\xA0\x00\x00\x00\x25\x01",//AID
6,//Aid length
PART_MATCH,//Application selection flag
0,//Priority
0,//target percent
0,//Max target percent
1,//Check the floor limit or not
0,//Perform random transaction selection
1,//Perform velocity check or not
0,//Floor limit
0,//Threshold
"\x00\x10\x00\x00\x00",//Terminal action code - denial
"\xDE\x00\xFC\x98\x00",//Terminal action code - online
"\xDC\x50\xFC\x98\x00",//Terminal action code - default
"\x00\x00\x00\x12\x34\x56",//Acquirer identifier
"\x03\x9F\x37\x04",//terminal default DDOL
"\x0F\x9F\x02\x06\x5F\x2A\x02\x9A\x03\x9C\x01\x95\x05\x9F\x37\x04",//terminal default TDOL
TermAVN5,//application version IGUAL a 0001
"",//Risk management data
};
EMV_APPLIST AMEX_1 = {
"AMEX",//App name
"\xA0\x00\x00\x00\x25\x01\x04\x02",//AID
8,//Aid length
PART_MATCH,//Application selection flag
0,//Priority
0,//target percent
0,//Max target percent
1,//Check the floor limit or not
0,//Perform random transaction selection
1,//Perform velocity check or not
0,//Floor limit
0,//Threshold
"\x00\x10\x00\x00\x00",//Terminal action code - denial
"\xDE\x00\xFC\x98\x00",//Terminal action code - online
"\xDC\x50\xFC\x98\x00",//Terminal action code - default
"\x00\x00\x00\x12\x34\x56",//Acquirer identifier
"\x03\x9F\x37\x04",//terminal default DDOL
"\x0F\x9F\x02\x06\x5F\x2A\x02\x9A\x03\x9C\x01\x95\x05\x9F\x37\x04",//terminal default TDOL
TermAVN5,//application version
"",//Risk management data
};
EMV_APPLIST DPAS = {
"DPAS",//App name
"\xA0\x00\x00\x01\x52\x30\x10",//AID
7,//Aid length
PART_MATCH,//Application selection flag
0,//Priority
0,//target percent
0,//Max target percent
1,//Check the floor limit or not
0,//Perform random transaction selection
1,//Perform velocity check or not
0,//Floor limit
0,//Threshold
"\x00\x10\x00\x00\x00",//Terminal action code - denial
"\xFC\xE0\x9C\xF8\x00",//Terminal action code - online
"\xDC\x00\x00\x20\x00",//Terminal action code - default
"\x00\x00\x00\x12\x34\x56",//Acquirer identifier
"\x03\x9F\x37\x04",//terminal default DDOL
"\x09\x9F\x1A\x02\x95\x05\x9A\x03\x9C\x01",//terminal default TDOL
"\x00\x01",//application version
"",//Risk management data
};
EMV_APPLIST DPAS_1 = {
"DPAS 1",//App name
"\xA0\x00\x00\x01\x52\x40\x10",//AID
7,//Aid length
PART_MATCH,//Application selection flag
0,//Priority
0,//target percent
0,//Max target percent
1,//Check the floor limit or not
0,//Perform random transaction selection
1,//Perform velocity check or not
0,//Floor limit
0,//Threshold
"\x00\x10\x00\x00\x00",//Terminal action code - denial
"\xFC\xE0\x9C\xF8\x00",//Terminal action code - online
"\xDC\x00\x00\x20\x00",//Terminal action code - default
"\x00\x00\x00\x12\x34\x56",//Acquirer identifier
"\x03\x9F\x37\x04",//terminal default DDOL
"\x09\x9F\x1A\x02\x95\x05\x9A\x03\x9C\x01",//terminal default TDOL
"\x00\x01",//application version
"",//Risk management data
};
EMV_APPLIST DPAS_2 = {
"DPAS 2",//App name
"\xA0\x00\x00\x03\x24\x10\x10",//AID
7,//Aid length
PART_MATCH,//Application selection flag
0,//Priority
0,//target percent
0,//Max target percent
1,//Check the floor limit or not
0,//Perform random transaction selection
1,//Perform velocity check or not
0,//Floor limit
0,//Threshold
"\x00\x10\x00\x00\x00",//Terminal action code - denial
"\xFC\xE0\x9C\xF8\x00",//Terminal action code - online
"\xDC\x00\x00\x20\x00",//Terminal action code - default
"\x00\x00\x00\x12\x34\x56",//Acquirer identifier
"\x03\x9F\x37\x04",//terminal default DDOL
"\x09\x9F\x1A\x02\x95\x05\x9A\x03\x9C\x01",//terminal default TDOL
"\x00\x01",//application version
"",//Risk management data
};
EMV_APPLIST CARNET = {
"CARNET",//App name
"\xA0\x00\x00\x07\x24\x20\x10",//AID
7,//Aid length
PART_MATCH,//Application selection flag
0,//Priority
0,//target percent
0,//Max target percent
1,//Check the floor limit or not
0,//Perform random transaction selection
1,//Perform velocity check or not
0,//Floor limit
0,//Threshold
"\x00\x00\x00\x00\x00",//Terminal action code - denial
"\xFC\x50\xBC\xF8\x00",//Terminal action code - online
"\xFC\x50\xBC\x20\x00",//Terminal action code - default
"\x00\x00\x00\x12\x34\x56",//Acquirer identifier
"\x03\x9F\x37\x04",//terminal default DDOL
"\x09\x9F\x1A\x02\x95\x05\x9A\x03\x9C\x01",//terminal default TDOL
"\x00\x01",//application version
"",//Risk management data
};
EMV_APPLIST CARNET_1 = {
"CARNET 1",//App name
"\xA0\x00\x00\x07\x24\x10\x10",//AID
7,//Aid length
PART_MATCH,//Application selection flag
0,//Priority
0,//target percent
0,//Max target percent
1,//Check the floor limit or not
0,//Perform random transaction selection
1,//Perform velocity check or not
0,//Floor limit
0,//Threshold
"\x00\x00\x00\x00\x00",//Terminal action code - denial
"\xFC\x50\xBC\xF8\x00",//Terminal action code - online
"\xFC\x50\xBC\x20\x00",//Terminal action code - default
"\x00\x00\x00\x12\x34\x56",//Acquirer identifier
"\x03\x9F\x37\x04",//terminal default DDOL
"\x09\x9F\x1A\x02\x95\x05\x9A\x03\x9C\x01",//terminal default TDOL
"\x00\x01",//application version
"",//Risk management data
};
#endif
#ifdef EMV_TEST_VERSION
EMV_APPLIST VISA_EMV = { //TEST?
"VISA EMV",//App name
"\xA0\x00\x00\x00\x99\x90\x90",//AID
7,//Aid length
PART_MATCH,//Application selection flag
0,//Priority
0,//target percent
0,//Max target percent
1,//Check the floor limit or not
0,//Perform random transaction selection
1,//Perform velocity check or not
0,//Floor limit
0,//Threshold
"\x00\x00\x00\x00\x00",//Terminal action code - denial
"\xD8\x40\x04\xF8\x00",//Terminal action code - online
"\xD8\x40\x00\xA8\x00",//Terminal action code - default
"\x00\x00\x00\x12\x34\x56",//Acquirer identifier
"\x03\x9F\x37\x04",//terminal default DDOL
"\x09\x9F\x1A\x02\x95\x05\x9A\x03\x9C\x01",//terminal default TDOL
TermAVN1,//application version
"",//Risk management data
};
EMV_APPLIST VISA_EMV_2 = { //TEST?
"VISA EMV 2",//App name
"\xA0\x00\x00\x00\x98\x08\x40",//AID
7,//Aid length
PART_MATCH,//Application selection flag
0,//Priority
0,//target percent
0,//Max target percent
1,//Check the floor limit or not
0,//Perform random transaction selection
1,//Perform velocity check or not
0,//Floor limit
0,//Threshold
"\x00\x00\x00\x00\x00",//Terminal action code - denial
"\xD8\x40\x04\xF8\x00",//Terminal action code - online
"\xD8\x40\x00\xA8\x00",//Terminal action code - default
"\x00\x00\x00\x12\x34\x56",//Acquirer identifier
"\x03\x9F\x37\x04",//terminal default DDOL
"\x09\x9F\x1A\x02\x95\x05\x9A\x03\x9C\x01",//terminal default TDOL
TermAVN1,//application version
"",//Risk management data
};
#endif
//KEYS
/*-----------------------------------------------------------------------------*/
typedef struct {
unsigned char RID[5]; //Registered Application Provider Identifier
unsigned char KeyID; //Key Index
unsigned char HashInd; //Hash arithmetic indicator
unsigned char ArithInd; //RSA arithmetic indicator
unsigned char ModulLen; //Length of Module
unsigned char Modul[248]; //Module
unsigned char ExponentLen; //Length of exponent
unsigned char Exponent[3]; //Exponent
unsigned char ExpDate[3]; //Expiration Date (YYMMDD)
unsigned char CheckSum[20]; //Check Sum of Key
}EMV_CAPK;
// FIN DE APLICACIONES COMUNES PARA TEST Y PROD
/************************************************
Belows are EMV test data
************************************************/
//DPAS Live Key 5C
EMV_CAPK capk_VISA_t92 = {
{0xA0, 0x00, 0x00, 0x00, 0x03}, //Registered Application Provider Identifier
0x92, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
176, //Length of Module
//Module
{0x99, 0x6A, 0xF5, 0x6F, 0x56, 0x91, 0x87, 0xD0, 0x92, 0x93, 0xC1, 0x48, 0x10, 0x45, 0x0E, 0xD8,
0xEE, 0x33, 0x57, 0x39, 0x7B, 0x18, 0xA2, 0x45, 0x8E, 0xFA, 0xA9, 0x2D, 0xA3, 0xB6, 0xDF, 0x65,
0x14, 0xEC, 0x06, 0x01, 0x95, 0x31, 0x8F, 0xD4, 0x3B, 0xE9, 0xB8, 0xF0, 0xCC, 0x66, 0x9E, 0x3F,
0x84, 0x40, 0x57, 0xCB, 0xDD, 0xF8, 0xBD, 0xA1, 0x91, 0xBB, 0x64, 0x47, 0x3B, 0xC8, 0xDC, 0x9A,
0x73, 0x0D, 0xB8, 0xF6, 0xB4, 0xED, 0xE3, 0x92, 0x41, 0x86, 0xFF, 0xD9, 0xB8, 0xC7, 0x73, 0x57,
0x89, 0xC2, 0x3A, 0x36, 0xBA, 0x0B, 0x8A, 0xF6, 0x53, 0x72, 0xEB, 0x57, 0xEA, 0x5D, 0x89, 0xE7,
0xD1, 0x4E, 0x9C, 0x7B, 0x6B, 0x55, 0x74, 0x60, 0xF1, 0x08, 0x85, 0xDA, 0x16, 0xAC, 0x92, 0x3F,
0x15, 0xAF, 0x37, 0x58, 0xF0, 0xF0, 0x3E, 0xBD, 0x3C, 0x5C, 0x2C, 0x94, 0x9C, 0xBA, 0x30, 0x6D,
0xB4, 0x4E, 0x6A, 0x2C, 0x07, 0x6C, 0x5F, 0x67, 0xE2, 0x81, 0xD7, 0xEF, 0x56, 0x78, 0x5D, 0xC4,
0xD7, 0x59, 0x45, 0xE4, 0x91, 0xF0, 0x19, 0x18, 0x80, 0x0A, 0x9E, 0x2D, 0xC6, 0x6F, 0x60, 0x08,
0x05, 0x66, 0xCE, 0x0D, 0xAF, 0x8D, 0x17, 0xEA, 0xD4, 0x6A, 0xD8, 0xE3, 0x0A, 0x24, 0x7C, 0x9F},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0x42, 0x9C, 0x95, 0x4A, 0x38, 0x59, 0xCE, 0xF9, 0x12, 0x95, 0xF6, 0x63, 0xC9, 0x63, 0xE5, 0x82,
0xED, 0x6E, 0xB2, 0x53}
};
EMV_CAPK capk_VISA_t94 = {
{0xA0, 0x00, 0x00, 0x00, 0x03}, //Registered Application Provider Identifier
0x94, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
248, //Length of Module
//Module
{0xAC, 0xD2, 0xB1, 0x23, 0x02, 0xEE, 0x64, 0x4F, 0x3F, 0x83, 0x5A, 0xBD, 0x1F, 0xC7, 0xA6, 0xF6,
0x2C, 0xCE, 0x48, 0xFF, 0xEC, 0x62, 0x2A, 0xA8, 0xEF, 0x06, 0x2B, 0xEF, 0x6F, 0xB8, 0xBA, 0x8B,
0xC6, 0x8B, 0xBF, 0x6A, 0xB5, 0x87, 0x0E, 0xED, 0x57, 0x9B, 0xC3, 0x97, 0x3E, 0x12, 0x13, 0x03,
0xD3, 0x48, 0x41, 0xA7, 0x96, 0xD6, 0xDC, 0xBC, 0x41, 0xDB, 0xF9, 0xE5, 0x2C, 0x46, 0x09, 0x79,
0x5C, 0x0C, 0xCF, 0x7E, 0xE8, 0x6F, 0xA1, 0xD5, 0xCB, 0x04, 0x10, 0x71, 0xED, 0x2C, 0x51, 0xD2,
0x20, 0x2F, 0x63, 0xF1, 0x15, 0x6C, 0x58, 0xA9, 0x2D, 0x38, 0xBC, 0x60, 0xBD, 0xF4, 0x24, 0xE1,
0x77, 0x6E, 0x2B, 0xC9, 0x64, 0x80, 0x78, 0xA0, 0x3B, 0x36, 0xFB, 0x55, 0x43, 0x75, 0xFC, 0x53,
0xD5, 0x7C, 0x73, 0xF5, 0x16, 0x0E, 0xA5, 0x9F, 0x3A, 0xFC, 0x53, 0x98, 0xEC, 0x7B, 0x67, 0x75,
0x8D, 0x65, 0xC9, 0xBF, 0xF7, 0x82, 0x8B, 0x6B, 0x82, 0xD4, 0xBE, 0x12, 0x4A, 0x41, 0x6A, 0xB7,
0x30, 0x19, 0x14, 0x31, 0x1E, 0xA4, 0x62, 0xC1, 0x9F, 0x77, 0x1F, 0x31, 0xB3, 0xB5, 0x73, 0x36,
0x00, 0x0D, 0xFF, 0x73, 0x2D, 0x3B, 0x83, 0xDE, 0x07, 0x05, 0x2D, 0x73, 0x03, 0x54, 0xD2, 0x97,
0xBE, 0xC7, 0x28, 0x71, 0xDC, 0xCF, 0x0E, 0x19, 0x3F, 0x17, 0x1A, 0xBA, 0x27, 0xEE, 0x46, 0x4C,
0x6A, 0x97, 0x69, 0x09, 0x43, 0xD5, 0x9B, 0xDA, 0xBB, 0x2A, 0x27, 0xEB, 0x71, 0xCE, 0xEB, 0xDA,
0xFA, 0x11, 0x76, 0x04, 0x64, 0x78, 0xFD, 0x62, 0xFE, 0xC4, 0x52, 0xD5, 0xCA, 0x39, 0x32, 0x96,
0x53, 0x0A, 0xA3, 0xF4, 0x19, 0x27, 0xAD, 0xFE, 0x43, 0x4A, 0x2D, 0xF2, 0xAE, 0x30, 0x54, 0xF8,
0x84, 0x06, 0x57, 0xA2, 0x6E, 0x0F, 0xC6, 0x17},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0xC4, 0xA3, 0xC4, 0x3C, 0xCF, 0x87, 0x32, 0x7D, 0x13, 0x6B, 0x80, 0x41, 0x60, 0xE4, 0x7D, 0x43,
0xB6, 0x0E, 0x6E, 0x0F}
};
EMV_CAPK capk_VISA_t95 = {
{0xA0, 0x00, 0x00, 0x00, 0x03}, //Registered Application Provider Identifier
0x95, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
144, //Length of Module
//Module
{0xBE, 0x9E, 0x1F, 0xA5, 0xE9, 0xA8, 0x03, 0x85, 0x29, 0x99, 0xC4, 0xAB, 0x43, 0x2D, 0xB2, 0x86,
0x00, 0xDC, 0xD9, 0xDA, 0xB7, 0x6D, 0xFA, 0xAA, 0x47, 0x35, 0x5A, 0x0F, 0xE3, 0x7B, 0x15, 0x08,
0xAC, 0x6B, 0xF3, 0x88, 0x60, 0xD3, 0xC6, 0xC2, 0xE5, 0xB1, 0x2A, 0x3C, 0xAA, 0xF2, 0xA7, 0x00,
0x5A, 0x72, 0x41, 0xEB, 0xAA, 0x77, 0x71, 0x11, 0x2C, 0x74, 0xCF, 0x9A, 0x06, 0x34, 0x65, 0x2F,
0xBC, 0xA0, 0xE5, 0x98, 0x0C, 0x54, 0xA6, 0x47, 0x61, 0xEA, 0x10, 0x1A, 0x11, 0x4E, 0x0F, 0x0B,
0x55, 0x72, 0xAD, 0xD5, 0x7D, 0x01, 0x0B, 0x7C, 0x9C, 0x88, 0x7E, 0x10, 0x4C, 0xA4, 0xEE, 0x12,
0x72, 0xDA, 0x66, 0xD9, 0x97, 0xB9, 0xA9, 0x0B, 0x5A, 0x6D, 0x62, 0x4A, 0xB6, 0xC5, 0x7E, 0x73,
0xC8, 0xF9, 0x19, 0x00, 0x0E, 0xB5, 0xF6, 0x84, 0x89, 0x8E, 0xF8, 0xC3, 0xDB, 0xEF, 0xB3, 0x30,
0xC6, 0x26, 0x60, 0xBE, 0xD8, 0x8E, 0xA7, 0x8E, 0x90, 0x9A, 0xFF, 0x05, 0xF6, 0xDA, 0x62, 0x7B},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0xEE, 0x15, 0x11, 0xCE, 0xC7, 0x10, 0x20, 0xA9, 0xB9, 0x04, 0x43, 0xB3, 0x7B, 0x1D, 0x5F, 0x6E,
0x70, 0x30, 0x30, 0xF6}
};
EMV_CAPK capk_VISA_t98 = {
{0xA0, 0x00, 0x00, 0x00, 0x03}, //Registered Application Provider Identifier
0x98, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
112, //Length of Module
//Module
{0xCA, 0x02, 0x6E, 0x52, 0xA6, 0x95, 0xE7, 0x2B, 0xD3, 0x0A, 0xF9, 0x28, 0x19, 0x6E, 0xED, 0xC9,
0xFA, 0xF4, 0xA6, 0x19, 0xF2, 0x49, 0x2E, 0x3F, 0xB3, 0x11, 0x69, 0x78, 0x9C, 0x27, 0x6F, 0xFB,
0xB7, 0xD4, 0x31, 0x16, 0x64, 0x7B, 0xA9, 0xE0, 0xD1, 0x06, 0xA3, 0x54, 0x2E, 0x39, 0x65, 0x29,
0x2C, 0xF7, 0x78, 0x23, 0xDD, 0x34, 0xCA, 0x8E, 0xEC, 0x7D, 0xE3, 0x67, 0xE0, 0x80, 0x70, 0x89,
0x50, 0x77, 0xC7, 0xEF, 0xAD, 0x93, 0x99, 0x24, 0xCB, 0x18, 0x70, 0x67, 0xDB, 0xF9, 0x2C, 0xB1,
0xE7, 0x85, 0x91, 0x7B, 0xD3, 0x8B, 0xAC, 0xE0, 0xC1, 0x94, 0xCA, 0x12, 0xDF, 0x0C, 0xE5, 0xB7,
0xA5, 0x02, 0x75, 0xAC, 0x61, 0xBE, 0x7C, 0x3B, 0x43, 0x68, 0x87, 0xCA, 0x98, 0xC9, 0xFD, 0x39},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0xE7, 0xAC, 0x9A, 0xA8, 0xEE, 0xD1, 0xB5, 0xFF, 0x1B, 0xD5, 0x32, 0xCF, 0x14, 0x89, 0xA3, 0xE5,
0x55, 0x75, 0x72, 0xC1}
};
EMV_CAPK capk_VISA_t99 = {
{0xA0, 0x00, 0x00, 0x00, 0x03}, //Registered Application Provider Identifier
0x99, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
128, //Length of Module
//Module
{0xAB, 0x79, 0xFC, 0xC9, 0x52, 0x08, 0x96, 0x96, 0x7E, 0x77, 0x6E, 0x64, 0x44, 0x4E, 0x5D, 0xCD,
0xD6, 0xE1, 0x36, 0x11, 0x87, 0x4F, 0x39, 0x85, 0x72, 0x25, 0x20, 0x42, 0x52, 0x95, 0xEE, 0xA4,
0xBD, 0x0C, 0x27, 0x81, 0xDE, 0x7F, 0x31, 0xCD, 0x3D, 0x04, 0x1F, 0x56, 0x5F, 0x74, 0x73, 0x06,
0xEE, 0xD6, 0x29, 0x54, 0xB1, 0x7E, 0xDA, 0xBA, 0x3A, 0x6C, 0x5B, 0x85, 0xA1, 0xDE, 0x1B, 0xEB,
0x9A, 0x34, 0x14, 0x1A, 0xF3, 0x8F, 0xCF, 0x82, 0x79, 0xC9, 0xDE, 0xA0, 0xD5, 0xA6, 0x71, 0x0D,
0x08, 0xDB, 0x41, 0x24, 0xF0, 0x41, 0x94, 0x55, 0x87, 0xE2, 0x03, 0x59, 0xBA, 0xB4, 0x7B, 0x75,
0x75, 0xAD, 0x94, 0x26, 0x2D, 0x4B, 0x25, 0xF2, 0x64, 0xAF, 0x33, 0xDE, 0xDC, 0xF2, 0x8E, 0x09,
0x61, 0x5E, 0x93, 0x7D, 0xE3, 0x2E, 0xDC, 0x03, 0xC5, 0x44, 0x45, 0xFE, 0x7E, 0x38, 0x27, 0x77},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0x4A, 0xBF, 0xFD, 0x6B, 0x1C, 0x51, 0x21, 0x2D, 0x05, 0x55, 0x2E, 0x43, 0x1C, 0x5B, 0x17, 0x00,
0x7D, 0x2F, 0x5E, 0x6D}
};
EMV_CAPK capk_MASTER_tEF = {
{0xA0, 0x00, 0x00, 0x00, 0x04}, //Registered Application Provider Identifier
0xEF, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
248, //Length of Module
//Module
{0xA1, 0x91, 0xCB, 0x87, 0x47, 0x3F, 0x29, 0x34, 0x9B, 0x5D, 0x60, 0xA8, 0x8B, 0x3E, 0xAE, 0xE0,
0x97, 0x3A, 0xA6, 0xF1, 0xA0, 0x82, 0xF3, 0x58, 0xD8, 0x49, 0xFD, 0xDF, 0xF9, 0xC0, 0x91, 0xF8,
0x99, 0xED, 0xA9, 0x79, 0x2C, 0xAF, 0x09, 0xEF, 0x28, 0xF5, 0xD2, 0x24, 0x04, 0xB8, 0x8A, 0x22,
0x93, 0xEE, 0xBB, 0xC1, 0x94, 0x9C, 0x43, 0xBE, 0xA4, 0xD6, 0x0C, 0xFD, 0x87, 0x9A, 0x15, 0x39,
0x54, 0x4E, 0x09, 0xE0, 0xF0, 0x9F, 0x60, 0xF0, 0x65, 0xB2, 0xBF, 0x2A, 0x13, 0xEC, 0xC7, 0x05,
0xF3, 0xD4, 0x68, 0xB9, 0xD3, 0x3A, 0xE7, 0x7A, 0xD9, 0xD3, 0xF1, 0x9C, 0xA4, 0x0F, 0x23, 0xDC,
0xF5, 0xEB, 0x7C, 0x04, 0xDC, 0x8F, 0x69, 0xEB, 0xA5, 0x65, 0xB1, 0xEB, 0xCB, 0x46, 0x86, 0xCD,
0x27, 0x47, 0x85, 0x53, 0x0F, 0xF6, 0xF6, 0xE9, 0xEE, 0x43, 0xAA, 0x43, 0xFD, 0xB0, 0x2C, 0xE0,
0x0D, 0xAE, 0xC1, 0x5C, 0x7B, 0x8F, 0xD6, 0xA9, 0xB3, 0x94, 0xBA, 0xBA, 0x41, 0x9D, 0x3F, 0x6D,
0xC8, 0x5E, 0x16, 0x56, 0x9B, 0xE8, 0xE7, 0x69, 0x89, 0x68, 0x8E, 0xFE, 0xA2, 0xDF, 0x22, 0xFF,
0x7D, 0x35, 0xC0, 0x43, 0x33, 0x8D, 0xEA, 0xA9, 0x82, 0xA0, 0x2B, 0x86, 0x6D, 0xE5, 0x32, 0x85,
0x19, 0xEB, 0xBC, 0xD6, 0xF0, 0x3C, 0xDD, 0x68, 0x66, 0x73, 0x84, 0x7F, 0x84, 0xDB, 0x65, 0x1A,
0xB8, 0x6C, 0x28, 0xCF, 0x14, 0x62, 0x56, 0x2C, 0x57, 0x7B, 0x85, 0x35, 0x64, 0xA2, 0x90, 0xC8,
0x55, 0x6D, 0x81, 0x85, 0x31, 0x26, 0x8D, 0x25, 0xCC, 0x98, 0xA4, 0xCC, 0x6A, 0x0B, 0xDF, 0xFF,
0xDA, 0x2D, 0xCC, 0xA3, 0xA9, 0x4C, 0x99, 0x85, 0x59, 0xE3, 0x07, 0xFD, 0xDF, 0x91, 0x50, 0x06,
0xD9, 0xA9, 0x87, 0xB0, 0x7D, 0xDA, 0xEB, 0x3B},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0x21, 0x76, 0x6E, 0xBB, 0x0E, 0xE1, 0x22, 0xAF, 0xB6, 0x5D, 0x78, 0x45, 0xB7, 0x3D, 0xB4, 0x6B,
0xAB, 0x65, 0x42, 0x7A}
};
EMV_CAPK capk_MASTER_tF1 = {
{0xA0, 0x00, 0x00, 0x00, 0x04}, //Registered Application Provider Identifier
0xF1, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
176, //Length of Module
//Module
{0xA0, 0xDC, 0xF4, 0xBD, 0xE1, 0x9C, 0x35, 0x46, 0xB4, 0xB6, 0xF0, 0x41, 0x4D, 0x17, 0x4D, 0xDE,
0x29, 0x4A, 0xAB, 0xBB, 0x82, 0x8C, 0x5A, 0x83, 0x4D, 0x73, 0xAA, 0xE2, 0x7C, 0x99, 0xB0, 0xB0,
0x53, 0xA9, 0x02, 0x78, 0x00, 0x72, 0x39, 0xB6, 0x45, 0x9F, 0xF0, 0xBB, 0xCD, 0x7B, 0x4B, 0x9C,
0x6C, 0x50, 0xAC, 0x02, 0xCE, 0x91, 0x36, 0x8D, 0xA1, 0xBD, 0x21, 0xAA, 0xEA, 0xDB, 0xC6, 0x53,
0x47, 0x33, 0x7D, 0x89, 0xB6, 0x8F, 0x5C, 0x99, 0xA0, 0x9D, 0x05, 0xBE, 0x02, 0xDD, 0x1F, 0x8C,
0x5B, 0xA2, 0x0E, 0x2F, 0x13, 0xFB, 0x2A, 0x27, 0xC4, 0x1D, 0x3F, 0x85, 0xCA, 0xD5, 0xCF, 0x66,
0x68, 0xE7, 0x58, 0x51, 0xEC, 0x66, 0xED, 0xBF, 0x98, 0x85, 0x1F, 0xD4, 0xE4, 0x2C, 0x44, 0xC1,
0xD5, 0x9F, 0x59, 0x84, 0x70, 0x3B, 0x27, 0xD5, 0xB9, 0xF2, 0x1B, 0x8F, 0xA0, 0xD9, 0x32, 0x79,
0xFB, 0xBF, 0x69, 0xE0, 0x90, 0x64, 0x29, 0x09, 0xC9, 0xEA, 0x27, 0xF8, 0x98, 0x95, 0x95, 0x41,
0xAA, 0x67, 0x57, 0xF5, 0xF6, 0x24, 0x10, 0x4F, 0x6E, 0x1D, 0x3A, 0x95, 0x32, 0xF2, 0xA6, 0xE5,
0x15, 0x15, 0xAE, 0xAD, 0x1B, 0x43, 0xB3, 0xD7, 0x83, 0x50, 0x88, 0xA2, 0xFA, 0xFA, 0x7B, 0xE7},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0xD8, 0xE6, 0x8D, 0xA1, 0x67, 0xAB, 0x5A, 0x85, 0xD8, 0xC3, 0xD5, 0x5E, 0xCB, 0x9B, 0x05, 0x17,
0xA1, 0xA5, 0xB4, 0xBB}
};
EMV_CAPK capk_MASTER_tF3 = {
{0xA0, 0x00, 0x00, 0x00, 0x04}, //Registered Application Provider Identifier
0xF3, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
144, //Length of Module
//Module
{0x98, 0xF0, 0xC7, 0x70, 0xF2, 0x38, 0x64, 0xC2, 0xE7, 0x66, 0xDF, 0x02, 0xD1, 0xE8, 0x33, 0xDF,
0xF4, 0xFF, 0xE9, 0x2D, 0x69, 0x6E, 0x16, 0x42, 0xF0, 0xA8, 0x8C, 0x56, 0x94, 0xC6, 0x47, 0x9D,
0x16, 0xDB, 0x15, 0x37, 0xBF, 0xE2, 0x9E, 0x4F, 0xDC, 0x6E, 0x6E, 0x8A, 0xFD, 0x1B, 0x0E, 0xB7,
0xEA, 0x01, 0x24, 0x72, 0x3C, 0x33, 0x31, 0x79, 0xBF, 0x19, 0xE9, 0x3F, 0x10, 0x65, 0x8B, 0x2F,
0x77, 0x6E, 0x82, 0x9E, 0x87, 0xDA, 0xED, 0xA9, 0xC9, 0x4A, 0x8B, 0x33, 0x82, 0x19, 0x9A, 0x35,
0x0C, 0x07, 0x79, 0x77, 0xC9, 0x7A, 0xFF, 0x08, 0xFD, 0x11, 0x31, 0x0A, 0xC9, 0x50, 0xA7, 0x2C,
0x3C, 0xA5, 0x00, 0x2E, 0xF5, 0x13, 0xFC, 0xCC, 0x28, 0x6E, 0x64, 0x6E, 0x3C, 0x53, 0x87, 0x53,
0x5D, 0x50, 0x95, 0x14, 0xB3, 0xB3, 0x26, 0xE1, 0x23, 0x4F, 0x9C, 0xB4, 0x8C, 0x36, 0xDD, 0xD4,
0x4B, 0x41, 0x6D, 0x23, 0x65, 0x40, 0x34, 0xA6, 0x6F, 0x40, 0x3B, 0xA5, 0x11, 0xC5, 0xEF, 0xA3},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0xA6, 0x9A, 0xC7, 0x60, 0x3D, 0xAF, 0x56, 0x6E, 0x97, 0x2D, 0xED, 0xC2, 0xCB, 0x43, 0x3E, 0x07,
0xE8, 0xB0, 0x1A, 0x9A}
};
EMV_CAPK capk_MASTER_tF8 = {
{0xA0, 0x00, 0x00, 0x00, 0x04}, //Registered Application Provider Identifier
0xF8, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
128, //Length of Module
//Module
{0xA1, 0xF5, 0xE1, 0xC9, 0xBD, 0x86, 0x50, 0xBD, 0x43, 0xAB, 0x6E, 0xE5, 0x6B, 0x89, 0x1E, 0xF7,
0x45, 0x9C, 0x0A, 0x24, 0xFA, 0x84, 0xF9, 0x12, 0x7D, 0x1A, 0x6C, 0x79, 0xD4, 0x93, 0x0F, 0x6D,
0xB1, 0x85, 0x2E, 0x25, 0x10, 0xF1, 0x8B, 0x61, 0xCD, 0x35, 0x4D, 0xB8, 0x3A, 0x35, 0x6B, 0xD1,
0x90, 0xB8, 0x8A, 0xB8, 0xDF, 0x04, 0x28, 0x4D, 0x02, 0xA4, 0x20, 0x4A, 0x7B, 0x6C, 0xB7, 0xC5,
0x55, 0x19, 0x77, 0xA9, 0xB3, 0x63, 0x79, 0xCA, 0x3D, 0xE1, 0xA0, 0x8E, 0x69, 0xF3, 0x01, 0xC9,
0x5C, 0xC1, 0xC2, 0x05, 0x06, 0x95, 0x92, 0x75, 0xF4, 0x17, 0x23, 0xDD, 0x5D, 0x29, 0x25, 0x29,
0x05, 0x79, 0xE5, 0xA9, 0x5B, 0x0D, 0xF6, 0x32, 0x3F, 0xC8, 0xE9, 0x27, 0x3D, 0x6F, 0x84, 0x91,
0x98, 0xC4, 0x99, 0x62, 0x09, 0x16, 0x6D, 0x9B, 0xFC, 0x97, 0x3C, 0x36, 0x1C, 0xC8, 0x26, 0xE1},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0xF0, 0x6E, 0xCC, 0x6D, 0x2A, 0xAE, 0xBF, 0x25, 0x9B, 0x7E, 0x75, 0x5A, 0x38, 0xD9, 0xA9, 0xB2,
0x4E, 0x2F, 0xF3, 0xDD}
};
EMV_CAPK capk_MASTER_tFA = {
{0xA0, 0x00, 0x00, 0x00, 0x04}, //Registered Application Provider Identifier
0xFA, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
144, //Length of Module
//Module
{0xA9, 0x0F, 0xCD, 0x55, 0xAA, 0x2D, 0x5D, 0x99, 0x63, 0xE3, 0x5E, 0xD0, 0xF4, 0x40, 0x17, 0x76,
0x99, 0x83, 0x2F, 0x49, 0xC6, 0xBA, 0xB1, 0x5C, 0xDA, 0xE5, 0x79, 0x4B, 0xE9, 0x3F, 0x93, 0x4D,
0x44, 0x62, 0xD5, 0xD1, 0x27, 0x62, 0xE4, 0x8C, 0x38, 0xBA, 0x83, 0xD8, 0x44, 0x5D, 0xEA, 0xA7,
0x41, 0x95, 0xA3, 0x01, 0xA1, 0x02, 0xB2, 0xF1, 0x14, 0xEA, 0xDA, 0x0D, 0x18, 0x0E, 0xE5, 0xE7,
0xA5, 0xC7, 0x3E, 0x0C, 0x4E, 0x11, 0xF6, 0x7A, 0x43, 0xDD, 0xAB, 0x5D, 0x55, 0x68, 0x3B, 0x14,
0x74, 0xCC, 0x06, 0x27, 0xF4, 0x4B, 0x8D, 0x30, 0x88, 0xA4, 0x92, 0xFF, 0xAA, 0xDA, 0xD4, 0xF4,
0x24, 0x22, 0xD0, 0xE7, 0x01, 0x35, 0x36, 0xC3, 0xC4, 0x9A, 0xD3, 0xD0, 0xFA, 0xE9, 0x64, 0x59,
0xB0, 0xF6, 0xB1, 0xB6, 0x05, 0x65, 0x38, 0xA3, 0xD6, 0xD4, 0x46, 0x40, 0xF9, 0x44, 0x67, 0xB1,
0x08, 0x86, 0x7D, 0xEC, 0x40, 0xFA, 0xAE, 0xCD, 0x74, 0x0C, 0x00, 0xE2, 0xB7, 0xA8, 0x85, 0x2D},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0x5B, 0xED, 0x40, 0x68, 0xD9, 0x6E, 0xA1, 0x6D, 0x2D, 0x77, 0xE0, 0x3D, 0x60, 0x36, 0xFC, 0x7A,
0x16, 0x0E, 0xA9, 0x9C}
};
EMV_CAPK capk_MASTER_tFE = {
{0xA0, 0x00, 0x00, 0x00, 0x04}, //Registered Application Provider Identifier
0xFE, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
128, //Length of Module
//Module
{0xA6, 0x53, 0xEA, 0xC1, 0xC0, 0xF7, 0x86, 0xC8, 0x72, 0x4F, 0x73, 0x7F, 0x17, 0x29, 0x97, 0xD6,
0x3D, 0x1C, 0x32, 0x51, 0xC4, 0x44, 0x02, 0x04, 0x9B, 0x86, 0x5B, 0xAE, 0x87, 0x7D, 0x0F, 0x39,
0x8C, 0xBF, 0xBE, 0x8A, 0x60, 0x35, 0xE2, 0x4A, 0xFA, 0x08, 0x6B, 0xEF, 0xDE, 0x93, 0x51, 0xE5,
0x4B, 0x95, 0x70, 0x8E, 0xE6, 0x72, 0xF0, 0x96, 0x8B, 0xCD, 0x50, 0xDC, 0xE4, 0x0F, 0x78, 0x33,
0x22, 0xB2, 0xAB, 0xA0, 0x4E, 0xF1, 0x37, 0xEF, 0x18, 0xAB, 0xF0, 0x3C, 0x7D, 0xBC, 0x58, 0x13,
0xAE, 0xAE, 0xF3, 0xAA, 0x77, 0x97, 0xBA, 0x15, 0xDF, 0x7D, 0x5B, 0xA1, 0xCB, 0xAF, 0x7F, 0xD5,
0x20, 0xB5, 0xA4, 0x82, 0xD8, 0xD3, 0xFE, 0xE1, 0x05, 0x07, 0x78, 0x71, 0x11, 0x3E, 0x23, 0xA4,
0x9A, 0xF3, 0x92, 0x65, 0x54, 0xA7, 0x0F, 0xE1, 0x0E, 0xD7, 0x28, 0xCF, 0x79, 0x3B, 0x62, 0xA1},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0x9A, 0x29, 0x5B, 0x05, 0xFB, 0x39, 0x0E, 0xF7, 0x92, 0x3F, 0x57, 0x61, 0x8A, 0x9F, 0xDA, 0x29,
0x41, 0xFC, 0x34, 0xE0}
};
EMV_CAPK capk_amex_live03 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0x03,
0x01, 0x01, 0x80,
{0xB0, 0xC2, 0xC6, 0xE2, 0xA6, 0x38, 0x69, 0x33, 0xCD, 0x17, 0xC2, 0x39, 0x49, 0x6B, 0xF4, 0x8C,
0x57, 0xE3, 0x89, 0x16, 0x4F, 0x2A, 0x96, 0xBF, 0xF1, 0x33, 0x43, 0x9A, 0xE8, 0xA7, 0x7B, 0x20,
0x49, 0x8B, 0xD4, 0xDC, 0x69, 0x59, 0xAB, 0x0C, 0x2D, 0x05, 0xD0, 0x72, 0x3A, 0xF3, 0x66, 0x89,
0x01, 0x93, 0x7B, 0x67, 0x4E, 0x5A, 0x2F, 0xA9, 0x2D, 0xDD, 0x5E, 0x78, 0xEA, 0x9D, 0x75, 0xD7,
0x96, 0x20, 0x17, 0x3C, 0xC2, 0x69, 0xB3, 0x5F, 0x46, 0x3B, 0x3D, 0x4A, 0xAF, 0xF2, 0x79, 0x4F,
0x92, 0xE6, 0xC7, 0xA3, 0xFB, 0x95, 0x32, 0x5D, 0x8A, 0xB9, 0x59, 0x60, 0xC3, 0x06, 0x6B, 0xE5,
0x48, 0x08, 0x7B, 0xCB, 0x6C, 0xE1, 0x26, 0x88, 0x14, 0x4A, 0x8B, 0x4A, 0x66, 0x22, 0x8A, 0xE4,
0x65, 0x9C, 0x63, 0x4C, 0x99, 0xE3, 0x60, 0x11, 0x58, 0x4C, 0x09, 0x50, 0x82, 0xA3, 0xA3, 0xE3},
1,{0x03},{0x09, 0x12, 0x31},
{0x87, 0x08, 0xA3, 0xE3, 0xBB, 0xC1, 0xBB, 0x0B, 0xE7, 0x3E, 0xBD, 0x8D, 0x19, 0xD4, 0xE5, 0xD2,
0x01, 0x66, 0xBF, 0x6C}
};
EMV_CAPK capk_amex_live04 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0x04,
0x01, 0x01, 0x60,
{0xD0, 0xF5, 0x43, 0xF0, 0x3F, 0x25, 0x17, 0x13, 0x3E, 0xF2, 0xBA, 0x4A, 0x11, 0x04, 0x48, 0x67,
0x58, 0x63, 0x0D, 0xCF, 0xE3, 0xA8, 0x83, 0xC7, 0x7B, 0x4E, 0x48, 0x44, 0xE3, 0x9A, 0x9B, 0xD6,
0x36, 0x0D, 0x23, 0xE6, 0x64, 0x4E, 0x1E, 0x07, 0x1F, 0x19, 0x6D, 0xDF, 0x2E, 0x4A, 0x68, 0xB4,
0xA3, 0xD9, 0x3D, 0x14, 0x26, 0x8D, 0x72, 0x40, 0xF6, 0xA1, 0x4F, 0x0D, 0x71, 0x4C, 0x17, 0x82,
0x7D, 0x27, 0x9D, 0x19, 0x2E, 0x88, 0x93, 0x1A, 0xF7, 0x30, 0x07, 0x27, 0xAE, 0x9D, 0xA8, 0x0A,
0x3F, 0x0E, 0x36, 0x6A, 0xEB, 0xA6, 0x17, 0x78, 0x17, 0x17, 0x37, 0x98, 0x9E, 0x1E, 0xE3, 0x09},
1,{0x03},{0x09, 0x12, 0x31},
{0xFD, 0xD7, 0x13, 0x9E, 0xC7, 0xE0, 0xC3, 0x31, 0x67, 0xFD, 0x61, 0xAD, 0x3C, 0xAD, 0xBD, 0x68,
0xD6, 0x6E, 0x91, 0xC5}
};
EMV_CAPK capk_amex_live0E = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0x0E,
0x01, 0x01,0x90,
{0xAA, 0x94, 0xA8, 0xC6, 0xDA, 0xD2, 0x4F, 0x9B, 0xA5, 0x6A, 0x27, 0xC0, 0x9B, 0x01, 0x02, 0x08,
0x19, 0x56, 0x8B, 0x81, 0xA0, 0x26, 0xBE, 0x9F, 0xD0, 0xA3, 0x41, 0x6C, 0xA9, 0xA7, 0x11, 0x66,
0xED, 0x50, 0x84, 0xED, 0x91, 0xCE, 0xD4, 0x7D, 0xD4, 0x57, 0xDB, 0x7E, 0x6C, 0xBC, 0xD5, 0x3E,
0x56, 0x0B, 0xC5, 0xDF, 0x48, 0xAB, 0xC3, 0x80, 0x99, 0x3B, 0x6D, 0x54, 0x9F, 0x51, 0x96, 0xCF,
0xA7, 0x7D, 0xFB, 0x20, 0xA0, 0x29, 0x61, 0x88, 0xE9, 0x69, 0xA2, 0x77, 0x2E, 0x8C, 0x41, 0x41,
0x66, 0x5F, 0x8B, 0xB2, 0x51, 0x6B, 0xA2, 0xC7, 0xB5, 0xFC, 0x91, 0xF8, 0xDA, 0x04, 0xE8, 0xD5,
0x12, 0xEB, 0x0F, 0x64, 0x11, 0x51, 0x6F, 0xB8, 0x6F, 0xC0, 0x21, 0xCE, 0x7E, 0x96, 0x9D, 0xA9,
0x4D, 0x33, 0x93, 0x79, 0x09, 0xA5, 0x3A, 0x57, 0xF9, 0x07, 0xC4, 0x0C, 0x22, 0x00, 0x9D, 0xA7,
0x53, 0x2C, 0xB3, 0xBE, 0x50, 0x9A, 0xE1, 0x73, 0xB3, 0x9A, 0xD6, 0xA0, 0x1B, 0xA5, 0xBB, 0x85},
1,{0x03},{0x12, 0x12, 0x31},
{0xA7, 0x26, 0x6A, 0xBA, 0xE6, 0x4B, 0x42, 0xA3, 0x66, 0x88, 0x51, 0x19, 0x1D, 0x49, 0x85, 0x6E,
0x17, 0xF8, 0xFB, 0xCD}
};
EMV_CAPK capk_amex_live15 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0x15,
0x01, 0x01,0xB0,
{0xC8, 0xD5, 0xAC, 0x27, 0xA5, 0xE1, 0xFB, 0x89, 0x97, 0x8C, 0x7C, 0x64, 0x79, 0xAF, 0x99, 0x3A,
0xB3, 0x80, 0x0E, 0xB2, 0x43, 0x99, 0x6F, 0xBB, 0x2A, 0xE2, 0x6B, 0x67, 0xB2, 0x3A, 0xC4, 0x82,
0xC4, 0xB7, 0x46, 0x00, 0x5A, 0x51, 0xAF, 0xA7, 0xD2, 0xD8, 0x3E, 0x89, 0x4F, 0x59, 0x1A, 0x23,
0x57, 0xB3, 0x0F, 0x85, 0xB8, 0x56, 0x27, 0xFF, 0x15, 0xDA, 0x12, 0x29, 0x0F, 0x70, 0xF0, 0x57,
0x66, 0x55, 0x2B, 0xA1, 0x1A, 0xD3, 0x4B, 0x71, 0x09, 0xFA, 0x49, 0xDE, 0x29, 0xDC, 0xB0, 0x10,
0x96, 0x70, 0x87, 0x5A, 0x17, 0xEA, 0x95, 0x54, 0x9E, 0x92, 0x34, 0x7B, 0x94, 0x8A, 0xA1, 0xF0,
0x45, 0x75, 0x6D, 0xE5, 0x6B, 0x70, 0x7E, 0x38, 0x63, 0xE5, 0x9A, 0x6C, 0xBE, 0x99, 0xC1, 0x27,
0x2E, 0xF6, 0x5F, 0xB6, 0x6C, 0xBB, 0x4C, 0xFF, 0x07, 0x0F, 0x36, 0x02, 0x9D, 0xD7, 0x62, 0x18,
0xB2, 0x12, 0x42, 0x64, 0x5B, 0x51, 0xCA, 0x75, 0x2A, 0xF3, 0x7E, 0x70, 0xBE, 0x1A, 0x84, 0xFF,
0x31, 0x07, 0x9D, 0xC0, 0x04, 0x8E, 0x92, 0x88, 0x83, 0xEC, 0x4F, 0xAD, 0xD4, 0x97, 0xA7, 0x19,
0x38, 0x5C, 0x2B, 0xBB, 0xEB, 0xC5, 0xA6, 0x6A, 0xA5, 0xE5, 0x65, 0x5D, 0x18, 0x03, 0x4E, 0xC5},
1,{0x03},{0x16, 0x12, 0x31},
{0xA7, 0x34, 0x72, 0xB3, 0xAB, 0x55, 0x74, 0x93, 0xA9, 0xBC, 0x21, 0x79, 0xCC, 0x80, 0x14, 0x05,
0x3B, 0x12, 0xBA, 0xB4}
};
EMV_CAPK capk_amex_live16 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0x16,
0x01, 0x01, 0xF8,
{0xCF, 0x98, 0xDF, 0xED, 0xB3, 0xD3, 0x72, 0x79, 0x65, 0xEE, 0x77, 0x97, 0x72, 0x33, 0x55, 0xE0,
0x75, 0x1C, 0x81, 0xD2, 0xD3, 0xDF, 0x4D, 0x18, 0xEB, 0xAB, 0x9F, 0xB9, 0xD4, 0x9F, 0x38, 0xC8,
0xC4, 0xA8, 0x26, 0xB9, 0x9D, 0xC9, 0xDE, 0xA3, 0xF0, 0x10, 0x43, 0xD4, 0xBF, 0x22, 0xAC, 0x35,
0x50, 0xE2, 0x96, 0x2A, 0x59, 0x63, 0x9B, 0x13, 0x32, 0x15, 0x64, 0x22, 0xF7, 0x88, 0xB9, 0xC1,
0x6D, 0x40, 0x13, 0x5E, 0xFD, 0x1B, 0xA9, 0x41, 0x47, 0x75, 0x05, 0x75, 0xE6, 0x36, 0xB6, 0xEB,
0xC6, 0x18, 0x73, 0x4C, 0x91, 0xC1, 0xD1, 0xBF, 0x3E, 0xDC, 0x2A, 0x46, 0xA4, 0x39, 0x01, 0x66,
0x8E, 0x0F, 0xFC, 0x13, 0x67, 0x74, 0x08, 0x0E, 0x88, 0x80, 0x44, 0xF6, 0xA1, 0xE6, 0x5D, 0xC9,
0xAA, 0xA8, 0x92, 0x8D, 0xAC, 0xBE, 0xB0, 0xDB, 0x55, 0xEA, 0x35, 0x14, 0x68, 0x6C, 0x6A, 0x73,
0x2C, 0xEF, 0x55, 0xEE, 0x27, 0xCF, 0x87, 0x7F, 0x11, 0x06, 0x52, 0x69, 0x4A, 0x0E, 0x34, 0x84,
0xC8, 0x55, 0xD8, 0x82, 0xAE, 0x19, 0x16, 0x74, 0xE2, 0x5C, 0x29, 0x62, 0x05, 0xBB, 0xB5, 0x99,
0x45, 0x51, 0x76, 0xFD, 0xD7, 0xBB, 0xC5, 0x49, 0xF2, 0x7B, 0xA5, 0xFE, 0x35, 0x33, 0x6F, 0x7E,
0x29, 0xE6, 0x8D, 0x78, 0x39, 0x73, 0x19, 0x94, 0x36, 0x63, 0x3C, 0x67, 0xEE, 0x5A, 0x68, 0x0F,
0x05, 0x16, 0x0E, 0xD1, 0x2D, 0x16, 0x65, 0xEC, 0x83, 0xD1, 0x99, 0x7F, 0x10, 0xFD, 0x05, 0xBB,
0xDB, 0xF9, 0x43, 0x3E, 0x8F, 0x79, 0x7A, 0xEE, 0x3E, 0x9F, 0x02, 0xA3, 0x42, 0x28, 0xAC, 0xE9,
0x27, 0xAB, 0xE6, 0x2B, 0x8B, 0x92, 0x81, 0xAD, 0x08, 0xD3, 0xDF, 0x5C, 0x73, 0x79, 0x68, 0x50,
0x45, 0xD7, 0xBA, 0x5F, 0xCD, 0xE5, 0x86, 0x37},
1,{0x03},{0x16, 0x12, 0x31},
{0xC7, 0x29, 0xCF, 0x2F, 0xD2, 0x62, 0x39, 0x4A, 0xBC, 0x4C, 0xC1, 0x73, 0x50, 0x65, 0x02, 0x44,
0x6A, 0xA9, 0xB9, 0xFD}
};
EMV_CAPK capk_amex_live62 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0x62,
0x01, 0x01,0x60,
{0xBA, 0x29, 0xDE, 0x83, 0x09, 0x0D, 0x8D, 0x5F, 0x4D, 0xFF, 0xCE, 0xB9, 0x89, 0x18, 0x99, 0x5A,
0x76, 0x8F, 0x41, 0xD0, 0x18, 0x3E, 0x1A, 0xCA, 0x3E, 0xF8, 0xD5, 0xED, 0x90, 0x62, 0x85, 0x3E,
0x40, 0x80, 0xE0, 0xD2, 0x89, 0xA5, 0xCE, 0xDD, 0x4D, 0xD9, 0x6B, 0x1F, 0xEA, 0x2C, 0x53, 0x42,
0x84, 0x36, 0xCE, 0x15, 0xA2, 0xA1, 0xBF, 0xE6, 0x9D, 0x46, 0x19, 0x7D, 0x3F, 0x5A, 0x79, 0xBC,
0xF8, 0xF4, 0x85, 0x8B, 0xFF, 0xA0, 0x4E, 0xDB, 0x07, 0xFC, 0x5B, 0xE8, 0x56, 0x0D, 0x9C, 0xE3,
0x8F, 0x5C, 0x3C, 0xA3, 0xC7, 0x42, 0xED, 0xFD, 0xBA, 0xE3, 0xB5, 0xE6, 0xDD, 0xA4, 0x55, 0x57 },
1,{0x03},{0x16, 0x12, 0x31},
{0xCC, 0xC7, 0x30, 0x3F, 0xF2, 0x95, 0xA9, 0xF3, 0x5B, 0xA6, 0x1B, 0xD3, 0x1E, 0x27, 0xEA, 0xBD,
0x59, 0x65, 0x82, 0x65}
};
EMV_CAPK capk_amex_live64 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0x64,
0x01, 0x01,0x80,
{0xB0, 0xDD, 0x55, 0x10, 0x47, 0xDA, 0xFC, 0xD1, 0x0D, 0x9A, 0x5E, 0x33, 0xCF, 0x47, 0xA9, 0x33,
0x3E, 0x3B, 0x24, 0xEC, 0x57, 0xE8, 0xF0, 0x66, 0xA7, 0x2D, 0xED, 0x60, 0xE8, 0x81, 0xA8, 0xAD,
0x42, 0x77, 0x7C, 0x67, 0xAD, 0xDF, 0x07, 0x08, 0x04, 0x2A, 0xB9, 0x43, 0x60, 0x1E, 0xE6, 0x02,
0x48, 0x54, 0x0B, 0x67, 0xE0, 0x63, 0x70, 0x18, 0xEE, 0xB3, 0x91, 0x1A, 0xE9, 0xC8, 0x73, 0xDA,
0xD6, 0x6C, 0xB4, 0x0B, 0xC8, 0xF4, 0xDC, 0x77, 0xEB, 0x25, 0x95, 0x25, 0x2B, 0x61, 0xC2, 0x15,
0x18, 0xF7, 0x9B, 0x70, 0x6A, 0xAC, 0x29, 0xE7, 0xD3, 0xFD, 0x4D, 0x25, 0x9D, 0xB7, 0x2B, 0x6E,
0x6D, 0x44, 0x6D, 0xD6, 0x03, 0x86, 0xDB, 0x40, 0xF5, 0xFD, 0xB0, 0x76, 0xD8, 0x03, 0x74, 0xC9,
0x93, 0xB4, 0xBB, 0x2D, 0x1D, 0xB9, 0x77, 0xC3, 0x87, 0x08, 0x97, 0xF9, 0xDF, 0xA4, 0x54, 0xF5},
1,{0x03},{0x16, 0x12, 0x31},
{0x79, 0x2B, 0x12, 0x1D, 0x86, 0xD0, 0xF3, 0xA9, 0x95, 0x82, 0xDB, 0x06, 0x97, 0x44, 0x81, 0xF3,
0xB2, 0xE1, 0x84, 0x54}
};
EMV_CAPK capk_amex_live65 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0x65,
0x01, 0x01, 0x90,
{0xE5, 0x3E, 0xB4, 0x1F, 0x83, 0x9D, 0xDF, 0xB4, 0x74, 0xF2, 0x72, 0xCD, 0x0C, 0xBE, 0x37, 0x3D,
0x54, 0x68, 0xEB, 0x3F, 0x50, 0xF3, 0x9C, 0x95, 0xBD, 0xF4, 0xD3, 0x9F, 0xA8, 0x2B, 0x98, 0xDA,
0xBC, 0x94, 0x76, 0xB6, 0xEA, 0x35, 0x0C, 0x0D, 0xCE, 0x1C, 0xD9, 0x20, 0x75, 0xD8, 0xC4, 0x4D,
0x1E, 0x57, 0x28, 0x31, 0x90, 0xF9, 0x6B, 0x35, 0x37, 0xD9, 0xE6, 0x32, 0xC4, 0x61, 0x81, 0x5E,
0xBD, 0x2B, 0xAF, 0x36, 0x89, 0x1D, 0xF6, 0xBF, 0xB1, 0xD3, 0x0F, 0xA0, 0xB7, 0x52, 0xC4, 0x3D,
0xCA, 0x02, 0x57, 0xD3, 0x5D, 0xFF, 0x4C, 0xCF, 0xC9, 0x8F, 0x84, 0x19, 0x8D, 0x51, 0x52, 0xEC,
0x61, 0xD7, 0xB5, 0xF7, 0x4B, 0xD0, 0x93, 0x83, 0xBD, 0x0E, 0x2A, 0xA4, 0x22, 0x98, 0xFF, 0xB0,
0x2F, 0x0D, 0x79, 0xAD, 0xB7, 0x0D, 0x72, 0x24, 0x3E, 0xE5, 0x37, 0xF7, 0x55, 0x36, 0xA8, 0xA8,
0xDF, 0x96, 0x25, 0x82, 0xE9, 0xE6, 0x81, 0x2F, 0x3A, 0x0B, 0xE0, 0x2A, 0x43, 0x65, 0x40, 0x0D},
1,{0x03},{0x16, 0x12, 0x31},
{0x89, 0x4C, 0x5D, 0x08, 0xD4, 0xEA, 0x28, 0xBB, 0x79, 0xDC, 0x46, 0xCE, 0xAD, 0x99, 0x8B, 0x87,
0x73, 0x22, 0xF4, 0x16}
};
EMV_CAPK capk_amex_live66 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0x66,
0x01, 0x01, 0x80,
{0xBD, 0x14, 0x78, 0x87, 0x7B, 0x93, 0x33, 0x61, 0x2D, 0x25, 0x7D, 0x9E, 0x3C, 0x9C, 0x23, 0x50,
0x3E, 0x28, 0x33, 0x6B, 0x72, 0x3C, 0x71, 0xF4, 0x7C, 0x25, 0x83, 0x66, 0x70, 0x39, 0x53, 0x60,
0xF5, 0x3C, 0x10, 0x6F, 0xD7, 0x4D, 0xEE, 0xEA, 0x29, 0x12, 0x59, 0xC0, 0x01, 0xAF, 0xBE, 0x7B,
0x4A, 0x83, 0x65, 0x4F, 0x6E, 0x2D, 0x9E, 0x81, 0x48, 0xE2, 0xCB, 0x1D, 0x92, 0x23, 0xAC, 0x59,
0x03, 0xDA, 0x18, 0xB4, 0x33, 0xF8, 0xE3, 0x52, 0x92, 0x27, 0x50, 0x5D, 0xE8, 0x47, 0x48, 0xF2,
0x41, 0xF7, 0xBF, 0xCD, 0x21, 0x46, 0xE5, 0xE9, 0xA8, 0xC5, 0xD2, 0xA0, 0x6D, 0x19, 0x09, 0x70,
0x87, 0xA0, 0x69, 0xF9, 0xAE, 0x3D, 0x61, 0x0C, 0x7C, 0x8E, 0x12, 0x14, 0x48, 0x1A, 0x4F, 0x27,
0x02, 0x5A, 0x1A, 0x2E, 0xDB, 0x8A, 0x9C, 0xDA, 0xFA, 0x44, 0x56, 0x90, 0x51, 0x1D, 0xB8, 0x05},
1,{0x03},{0x16, 0x12, 0x31},
{0xF3, 0x67, 0xCB, 0x70, 0xF9, 0xC9, 0xB6, 0x7B, 0x58, 0x0F, 0x53, 0x38, 0x19, 0xE3, 0x02, 0xBA,
0xC0, 0x33, 0x00, 0x90}
};
EMV_CAPK capk_amex_live67 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0x67,
0x01, 0x01, 0xB0,
{0xC6, 0x87, 0xAD, 0xCC, 0xF3, 0xD5, 0x7D, 0x33, 0x60, 0xB1, 0x74, 0xE4, 0x71, 0xED, 0xA6, 0x93,
0xAA, 0x55, 0x5D, 0xFD, 0xC6, 0xC8, 0xCD, 0x39, 0x4C, 0x74, 0xBA, 0x25, 0xCC, 0xDF, 0x8E, 0xAB,
0xFD, 0x1F, 0x1C, 0xEA, 0xDF, 0xBE, 0x22, 0x80, 0xC9, 0xE8, 0x1F, 0x7A, 0x05, 0x89, 0x98, 0xDC,
0x22, 0xB7, 0xF2, 0x25, 0x76, 0xFE, 0x84, 0x71, 0x3D, 0x0B, 0xDD, 0x3D, 0x34, 0xCF, 0xCD, 0x12,
0xFC, 0xD0, 0xD2, 0x69, 0x01, 0xBA, 0x74, 0x10, 0x3D, 0x07, 0x5C, 0x66, 0x4D, 0xAB, 0xCC, 0xAF,
0x57, 0xBF, 0x78, 0x94, 0x94, 0x05, 0x1C, 0x5E, 0xC3, 0x03, 0xA2, 0xE1, 0xD7, 0x84, 0x30, 0x6D,
0x3D, 0xB3, 0xEB, 0x66, 0x5C, 0xD3, 0x60, 0xA5, 0x58, 0xF4, 0x0B, 0x7C, 0x05, 0xC9, 0x19, 0xB2,
0xF0, 0x28, 0x2F, 0xE1, 0xED, 0x9B, 0xF6, 0x26, 0x1A, 0xA8, 0x14, 0x64, 0x8F, 0xBC, 0x26, 0x3B,
0x14, 0x21, 0x44, 0x91, 0xDE, 0x42, 0x6D, 0x24, 0x2D, 0x65, 0xCD, 0x1F, 0xFF, 0x0F, 0xBE, 0x4D,
0x4D, 0xAF, 0xF5, 0xCF, 0xAC, 0xB2, 0xAD, 0xC7, 0x13, 0x1C, 0x9B, 0x14, 0x7E, 0xE7, 0x91, 0x95,
0x65, 0x51, 0x07, 0x62, 0x70, 0x69, 0x6B, 0x75, 0xFD, 0x97, 0x37, 0x3F, 0x1F, 0xD7, 0x80, 0x4F},
1,{0x03},{0x16, 0x12, 0x31},
{0x52, 0xA2, 0x90, 0x73, 0x00, 0xC8, 0x44, 0x5B, 0xF5, 0x4B, 0x97, 0x0C, 0x89, 0x46, 0x91, 0xFE,
0xAD, 0xF2, 0xD2, 0x8E}
};
EMV_CAPK capk_amex_live97 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0x97,
0x01, 0x01, 0x90,
{0xE1, 0x78, 0xFF, 0xE8, 0x34, 0xB4, 0xB7, 0x67, 0xAF, 0x3C, 0x9A, 0x51, 0x1F, 0x97, 0x3D, 0x8E,
0x85, 0x05, 0xC5, 0xFC, 0xB2, 0xD3, 0x76, 0x80, 0x75, 0xAB, 0x7C, 0xC9, 0x46, 0xA9, 0x55, 0x78,
0x99, 0x55, 0x87, 0x9A, 0xAF, 0x73, 0x74, 0x07, 0x15, 0x15, 0x21, 0x99, 0x6D, 0xFA, 0x43, 0xC5,
0x8E, 0x6B, 0x13, 0x0E, 0xB1, 0xD8, 0x63, 0xB8, 0x5D, 0xC9, 0xFF, 0xB4, 0x05, 0x09, 0x47, 0xA2,
0x67, 0x6A, 0xA6, 0xA0, 0x61, 0xA4, 0xA7, 0xAE, 0x1E, 0xDB, 0x0E, 0x36, 0xA6, 0x97, 0xE8, 0x7E,
0x03, 0x75, 0x17, 0xEB, 0x89, 0x23, 0x13, 0x68, 0x75, 0xBA, 0x2C, 0xA1, 0x08, 0x7C, 0xBA, 0x7E,
0xC7, 0x65, 0x3E, 0x5E, 0x28, 0xA0, 0xC2, 0x61, 0xA0, 0x33, 0xAF, 0x27, 0xE3, 0xA6, 0x7B, 0x64,
0xBB, 0xA2, 0x69, 0x56, 0x30, 0x7E, 0xC4, 0x7E, 0x67, 0x4E, 0x3F, 0x8B, 0x72, 0x2B, 0x3A, 0xE0,
0x49, 0x8D, 0xB1, 0x6C, 0x79, 0x85, 0x31, 0x0D, 0x9F, 0x3D, 0x11, 0x73, 0x00, 0xD3, 0x2B, 0x09},
1,{0x03},{0x20, 0x12, 0x31},
{0xEB, 0xDA, 0x52, 0x2B, 0x63, 0x1B, 0x3E, 0xB4, 0xF4, 0xCB, 0xFC, 0x06, 0x79, 0xC4, 0x50, 0x13,
0x9D, 0x2B, 0x69, 0xCD}
};
EMV_CAPK capk_amex_live98 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0x98,
0x01, 0x01, 0xB0,
{0xD3, 0x1A, 0x70, 0x94, 0xFB, 0x22, 0x1C, 0xBA, 0x66, 0x60, 0xFB, 0x97, 0x5A, 0xAF, 0xEA, 0x80,
0xDB, 0x7B, 0xB7, 0xEA, 0xFD, 0x73, 0x51, 0xE7, 0x48, 0x82, 0x7A, 0xB6, 0x2D, 0x4A, 0xEE, 0xCC,
0xFC, 0x17, 0x87, 0xFD, 0x47, 0xA0, 0x46, 0x99, 0xA0, 0x2D, 0xB0, 0x0D, 0x7C, 0x38, 0x2E, 0x80,
0xE8, 0x04, 0xB3, 0x5C, 0x59, 0x43, 0x4C, 0x60, 0x23, 0x89, 0xD6, 0x91, 0xB9, 0xCC, 0xD5, 0x1E,
0xD0, 0x6B, 0xE6, 0x7A, 0x27, 0x61, 0x19, 0xC4, 0xC1, 0x0E, 0x2E, 0x40, 0xFC, 0x4E, 0xDD, 0xF9,
0xDF, 0x39, 0xB9, 0xB0, 0xBD, 0xEE, 0x8D, 0x07, 0x6E, 0x2A, 0x01, 0x2E, 0x8A, 0x29, 0x2A, 0xF8,
0xEF, 0xE1, 0x85, 0x53, 0x47, 0x06, 0x39, 0xC1, 0xA0, 0x32, 0x25, 0x2E, 0x0E, 0x57, 0x48, 0xB2,
0x5A, 0x3F, 0x9B, 0xA4, 0xCF, 0xCE, 0xE0, 0x73, 0x03, 0x8B, 0x06, 0x18, 0x37, 0xF2, 0xAC, 0x1B,
0x04, 0xC2, 0x79, 0x64, 0x0F, 0x5B, 0xD1, 0x10, 0xA9, 0xDC, 0x66, 0x5E, 0xD2, 0xFA, 0x68, 0x28,
0xBD, 0x5D, 0x0F, 0xE8, 0x10, 0xA8, 0x92, 0xDE, 0xE6, 0xB0, 0xE7, 0x4C, 0xE8, 0x86, 0x3B, 0xDE,
0x08, 0xFD, 0x5F, 0xD6, 0x1A, 0x0F, 0x11, 0xFA, 0x0D, 0x14, 0x97, 0x8D, 0x8C, 0xED, 0x7D, 0xD3},
1,{0x03},{0x20, 0x12, 0x31},
{0xD4, 0xDB, 0xA4, 0x28, 0xCF, 0x11, 0xD4, 0x5B, 0xAE, 0xB0, 0xA3, 0x5C, 0xAE, 0xA8, 0x00, 0x7A,
0xD8, 0xBA, 0x8D, 0x71}
};
EMV_CAPK capk_amex_live99 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0x99,
0x01, 0x01, 0xF8,
{0xE1, 0x74, 0x00, 0x74, 0x22, 0x9F, 0xA0, 0xD2, 0x28, 0xA9, 0x62, 0x35, 0x81, 0xD7, 0xA3, 0x22,
0x90, 0x3F, 0xB8, 0x9B, 0xA7, 0x68, 0x67, 0x12, 0xE6, 0x01, 0xFA, 0x8A, 0xB2, 0x4A, 0x97, 0x89,
0x18, 0x6F, 0x15, 0xB7, 0x0C, 0xCB, 0xBE, 0x74, 0x21, 0xB1, 0xCB, 0x11, 0x0D, 0x45, 0x36, 0x16,
0x88, 0x13, 0x5F, 0xFD, 0x0D, 0xB1, 0x5A, 0x3F, 0x51, 0x6B, 0xB2, 0x91, 0xD4, 0xA1, 0x23, 0xEB,
0xF5, 0xA0, 0x6F, 0xBF, 0x7E, 0x1E, 0xE6, 0x31, 0x1B, 0x73, 0x7D, 0xAB, 0xB2, 0x89, 0x57, 0x0A,
0x79, 0x59, 0xD5, 0x32, 0xB2, 0x5F, 0x1D, 0xA6, 0x75, 0x8C, 0x84, 0xDD, 0xCC, 0xAD, 0xC0, 0x49,
0xBC, 0x76, 0x4C, 0x05, 0x39, 0x1A, 0xBD, 0x2C, 0xAD, 0xEF, 0xFA, 0x7E, 0x24, 0x2D, 0x5D, 0xD0,
0x6E, 0x56, 0x00, 0x1F, 0x0E, 0x68, 0x15, 0x1E, 0x33, 0x88, 0x07, 0x4B, 0xD9, 0x33, 0x0D, 0x6A,
0xFA, 0x57, 0xCB, 0xF3, 0x39, 0x46, 0xF5, 0x31, 0xE5, 0x1E, 0x0D, 0x49, 0x02, 0xEE, 0x23, 0x5C,
0x75, 0x6A, 0x90, 0x5F, 0xB7, 0x33, 0x94, 0x0E, 0x6E, 0xC8, 0x97, 0xB4, 0x94, 0x4A, 0x5E, 0xDC,
0x76, 0x57, 0x05, 0xE2, 0xAC, 0xF7, 0x6C, 0x78, 0xEA, 0xD7, 0x8D, 0xD9, 0xB0, 0x66, 0xDF, 0x0B,
0x2C, 0x88, 0x75, 0x0B, 0x8A, 0xEE, 0x00, 0xC9, 0xB4, 0xD4, 0x09, 0x1F, 0xA7, 0x33, 0x84, 0x49,
0xDA, 0x92, 0xDB, 0xFC, 0x90, 0x8F, 0xA0, 0x78, 0x1C, 0x01, 0x28, 0xC4, 0x92, 0xDB, 0x99, 0x3C,
0x88, 0xBA, 0x8B, 0xB7, 0xCA, 0xDF, 0xE2, 0x38, 0xD4, 0x77, 0xF2, 0x51, 0x7E, 0x0E, 0x7E, 0x3D,
0x2B, 0x11, 0x79, 0x6A, 0x03, 0x18, 0xCE, 0x2A, 0xD4, 0xDA, 0x1D, 0xB8, 0xE5, 0x4A, 0xB0, 0xD9,
0x4F, 0x10, 0x9D, 0xB9, 0xCA, 0xEE, 0xFB, 0xEF},
1,{0x03},{0x20, 0x12, 0x31},
{0x94, 0x79, 0x0D, 0x02, 0x0F, 0x4F, 0x69, 0x2D, 0x59, 0x28, 0x9F, 0x36, 0x45, 0x18, 0x72, 0x07,
0x80, 0x05, 0xB6, 0x3B}
};
EMV_CAPK capk_amex_liveA1 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0xA1,
0x01, 0x01, 0xB0,
{0xA1, 0x1A, 0x7A, 0x12, 0x9E, 0x15, 0xAD, 0x81, 0x2D, 0x5E, 0x18, 0x2D, 0x18, 0x73, 0xA0, 0x22,
0xD0, 0x01, 0x4D, 0x50, 0x60, 0xCE, 0xDC, 0x07, 0xBB, 0x4E, 0x9F, 0x42, 0xD2, 0xBE, 0x99, 0x5F,
0x40, 0x26, 0xA3, 0xC5, 0xC8, 0xB7, 0x27, 0xD5, 0x60, 0xC4, 0x01, 0x13, 0x14, 0x27, 0xA7, 0x6D,
0xDD, 0x23, 0xE4, 0x2B, 0xF9, 0x07, 0x8A, 0xB9, 0xAE, 0x95, 0x40, 0x74, 0x08, 0xDB, 0x89, 0x20,
0x03, 0xF3, 0x3B, 0x7D, 0xD9, 0xB0, 0x62, 0x05, 0xC7, 0xD9, 0x36, 0x18, 0x39, 0x1B, 0x47, 0x72,
0x64, 0x54, 0xE7, 0xB9, 0x78, 0xC9, 0xAD, 0x67, 0x74, 0xB9, 0xB8, 0xB8, 0x40, 0x77, 0x48, 0x93,
0xD2, 0x51, 0x66, 0x6B, 0xD1, 0xA9, 0x61, 0xB0, 0x61, 0x52, 0xE7, 0xD0, 0x9A, 0xA0, 0xA6, 0x0B,
0x9F, 0x3B, 0xC4, 0x75, 0x37, 0x01, 0xB4, 0x31, 0x16, 0x6F, 0x28, 0x5C, 0xE0, 0x87, 0x3C, 0xD8,
0x11, 0x28, 0xE0, 0xA4, 0xF5, 0x6D, 0x58, 0x73, 0x3E, 0x98, 0xEC, 0x62, 0x4F, 0x98, 0xA7, 0xA8,
0x1D, 0x40, 0x39, 0x00, 0xD0, 0xE2, 0xF6, 0x15, 0x28, 0x5D, 0x0C, 0xAE, 0xEC, 0x5E, 0xDC, 0xED,
0x4E, 0xDE, 0xAC, 0x62, 0xE3, 0x90, 0x78, 0xAC, 0xF8, 0xF2, 0x96, 0x6D, 0x70, 0x10, 0x1C, 0xAD},
1,{0x03},{0x20, 0x12, 0x31},
{0x50, 0xD9, 0xE2, 0x95, 0xD8, 0x0E, 0xF1, 0x93, 0xA0, 0x3C, 0xA4, 0x01, 0xF0, 0x4F, 0xE3, 0x39,
0x4B, 0x9C, 0xFF, 0x1E}
};
EMV_CAPK capk_amex_liveC1 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0xC1,
0x01, 0x01, 0x90,
{0xE6, 0x9E, 0x31, 0x9C, 0x34, 0xD1, 0xB4, 0xFB, 0x43, 0xAE, 0xD4, 0xBD, 0x8B, 0xBA, 0x6F, 0x7A,
0x8B, 0x76, 0x3F, 0x2F, 0x6E, 0xE5, 0xDD, 0xF7, 0xC9, 0x25, 0x79, 0xA9, 0x84, 0xF8, 0x9C, 0x4A,
0x9C, 0x15, 0xB2, 0x70, 0x37, 0x76, 0x4C, 0x58, 0xAC, 0x7E, 0x45, 0xEF, 0xBC, 0x34, 0xE1, 0x38,
0xE5, 0x6B, 0xA3, 0x8F, 0x76, 0xE8, 0x03, 0x12, 0x9A, 0x8D, 0xDE, 0xB5, 0xE1, 0xCC, 0x8C, 0x6B,
0x30, 0xCF, 0x63, 0x4A, 0x9C, 0x9C, 0x12, 0x24, 0xBF, 0x1F, 0x0A, 0x9A, 0x18, 0xD7, 0x9E, 0xD4,
0x1E, 0xBC, 0xF1, 0xBE, 0x78, 0x08, 0x7A, 0xE8, 0xB7, 0xD2, 0xF8, 0x96, 0xB1, 0xDE, 0x8B, 0x7E,
0x78, 0x41, 0x61, 0xA1, 0x38, 0xA0, 0xF2, 0x16, 0x9A, 0xD3, 0x3E, 0x14, 0x6D, 0x1B, 0x16, 0xAB,
0x59, 0x5F, 0x9D, 0x7D, 0x98, 0xBE, 0x67, 0x10, 0x62, 0xD2, 0x17, 0xF4, 0x4E, 0xB6, 0x8C, 0x68,
0x64, 0x0C, 0x7D, 0x57, 0x46, 0x5A, 0x06, 0x3F, 0x6B, 0xAC, 0x77, 0x6D, 0x3E, 0x2D, 0xAC, 0x61},
1,{0x03},{0x20, 0x12, 0x31},
{0xDC, 0x79, 0xD6, 0xB5, 0xFC, 0x87, 0x93, 0x62, 0x29, 0x9B, 0xC5, 0xA6, 0x37, 0xDA, 0xD2, 0xE0,
0xD9, 0x96, 0x56, 0xB8}
};
EMV_CAPK capk_amex_liveC2 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0xC2,
0x01, 0x01, 0xB0,
{0xB8, 0x75, 0x00, 0x2F, 0x38, 0xBA, 0x26, 0xD6, 0x11, 0x67, 0xC5, 0xD4, 0x40, 0x36, 0x76, 0x04,
0xAD, 0x38, 0xDF, 0x2E, 0x93, 0xD8, 0xEE, 0x8D, 0xA0, 0xE8, 0xD9, 0xC0, 0xCF, 0x4C, 0xC5, 0x78,
0x8D, 0x11, 0xDE, 0xA6, 0x89, 0xE5, 0xF4, 0x1D, 0x23, 0xA3, 0xDA, 0x3E, 0x0B, 0x1F, 0xA5, 0x87,
0x5A, 0xE2, 0x56, 0x20, 0xF5, 0xA6, 0xBC, 0xCE, 0xE0, 0x98, 0xC1, 0xB3, 0x5C, 0x69, 0x18, 0x89,
0xD7, 0xD0, 0xEF, 0x67, 0x0E, 0xB8, 0x31, 0x2E, 0x71, 0x23, 0xFC, 0xC5, 0xDC, 0x7D, 0x2F, 0x07,
0x19, 0xCC, 0x80, 0xE1, 0xA9, 0x30, 0x17, 0xF9, 0x44, 0xD0, 0x97, 0x33, 0x0E, 0xDF, 0x94, 0x57,
0x62, 0xFE, 0xE6, 0x2B, 0x7B, 0x0B, 0xA0, 0x34, 0x82, 0x28, 0xDB, 0xF3, 0x8D, 0x42, 0x16, 0xE5,
0xA6, 0x7A, 0x7E, 0xF7, 0x4F, 0x5D, 0x31, 0x11, 0xC4, 0x4A, 0xA3, 0x13, 0x20, 0xF6, 0x23, 0xCB,
0x3C, 0x53, 0xE6, 0x09, 0x66, 0xD6, 0x92, 0x00, 0x67, 0xC9, 0xE0, 0x82, 0xB7, 0x46, 0x11, 0x7E,
0x48, 0xE4, 0xF0, 0x0E, 0x11, 0x09, 0x50, 0xCA, 0x54, 0xDA, 0x3E, 0x38, 0xE5, 0x45, 0x3B, 0xD5,
0x54, 0x4E, 0x3A, 0x67, 0x60, 0xE3, 0xA6, 0xA4, 0x27, 0x66, 0xAD, 0x22, 0x84, 0xE0, 0xC9, 0xAF},
1,{0x03},{0x20, 0x12, 0x31},
{0x8E, 0x74, 0x82, 0x96, 0x35, 0x9A, 0x74, 0x28, 0xF5, 0x36, 0xAD, 0xDA, 0x8E, 0x2C, 0x03, 0x7E,
0x2B, 0x69, 0x7E, 0xF6}
};
EMV_CAPK capk_amex_liveC3 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0xC3,
0x01, 0x01, 0xF8,
{0xB9, 0x31, 0x82, 0xAB, 0xE3, 0x43, 0xDF, 0xBF, 0x38, 0x8C, 0x71, 0xC4, 0xD6, 0x74, 0x7D, 0xCD,
0xEC, 0x60, 0x36, 0x7F, 0xE6, 0x3C, 0xFA, 0xA9, 0x42, 0xD7, 0xD3, 0x23, 0xE6, 0x88, 0xD0, 0x83,
0x28, 0x36, 0x54, 0x8B, 0xF0, 0xED, 0xFF, 0x1E, 0xDE, 0xEB, 0x88, 0x2C, 0x75, 0x09, 0x9F, 0xF8,
0x1A, 0x93, 0xFA, 0x52, 0x5C, 0x32, 0x42, 0x5B, 0x36, 0x02, 0x3E, 0xA0, 0x2A, 0x88, 0x99, 0xB9,
0xBF, 0x7D, 0x79, 0x34, 0xE8, 0x6F, 0x99, 0x78, 0x91, 0x82, 0x30, 0x06, 0xCE, 0xAA, 0x93, 0x09,
0x1A, 0x73, 0xC1, 0xFD, 0xE1, 0x8A, 0xBD, 0x4F, 0x87, 0xA2, 0x23, 0x08, 0x64, 0x0C, 0x06, 0x4C,
0x8C, 0x02, 0x76, 0x85, 0xF1, 0xB2, 0xDB, 0x7B, 0x74, 0x1B, 0x67, 0xAB, 0x0D, 0xE0, 0x5E, 0x87,
0x04, 0x81, 0xC5, 0xF9, 0x72, 0x50, 0x8C, 0x17, 0xF5, 0x7E, 0x4F, 0x83, 0x3D, 0x63, 0x22, 0x0F,
0x6E, 0xA2, 0xCF, 0xBB, 0x87, 0x87, 0x28, 0xAA, 0x58, 0x87, 0xDE, 0x40, 0x7D, 0x10, 0xC6, 0xB8,
0xF5, 0x8D, 0x46, 0x77, 0x9E, 0xCE, 0xC1, 0xE2, 0x15, 0x54, 0x87, 0xD5, 0x2C, 0x78, 0xA5, 0xC0,
0x38, 0x97, 0xF2, 0xBB, 0x58, 0x0E, 0x0A, 0x2B, 0xBD, 0xE8, 0xEA, 0x2E, 0x1C, 0x18, 0xF6, 0xAA,
0xF3, 0xEB, 0x3D, 0x04, 0xC3, 0x47, 0x7D, 0xEA, 0xB8, 0x8F, 0x15, 0x0C, 0x88, 0x10, 0xFD, 0x1E,
0xF8, 0xEB, 0x05, 0x96, 0x86, 0x63, 0x36, 0xFE, 0x2C, 0x1F, 0xBC, 0x6B, 0xEC, 0x22, 0xB4, 0xFE,
0x5D, 0x88, 0x56, 0x47, 0x72, 0x6D, 0xB5, 0x97, 0x09, 0xA5, 0x05, 0xF7, 0x5C, 0x49, 0xE0, 0xD8,
0xD7, 0x1B, 0xF5, 0x1E, 0x41, 0x81, 0x21, 0x2B, 0xE2, 0x14, 0x2A, 0xB2, 0xA1, 0xE8, 0xC0, 0xD3,
0xB7, 0x13, 0x6C, 0xD7, 0xB7, 0x70, 0x8E, 0x4D},
1,{0x03},{0x22, 0x12, 0x31},
{0x12, 0xF1, 0x79, 0x0C, 0xB0, 0x27, 0x3D, 0xC7, 0x3C, 0x6E, 0x70, 0x78, 0x4B, 0xC2, 0x4C, 0x12,
0xE8, 0xDB, 0x71, 0xF6}
};
EMV_CAPK capk_amex_liveC7 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0xC7,
0x01, 0x01, 0x90,
{0xCD, 0x23, 0x7E, 0x34, 0xE0, 0x29, 0x9D, 0xE4, 0x8F, 0x1A, 0x2C, 0x94, 0xF4, 0x78, 0xFE, 0x97,
0x28, 0x96, 0x01, 0x1E, 0x1C, 0xA6, 0xAB, 0x46, 0x2B, 0x68, 0xFE, 0x0F, 0x61, 0x09, 0xC9, 0xA9,
0x7C, 0x2D, 0xBE, 0xEA, 0x65, 0x93, 0x2C, 0xDE, 0x06, 0x25, 0x13, 0x8B, 0x9F, 0x16, 0x2B, 0x92,
0x97, 0x9D, 0xAA, 0xB0, 0x19, 0xD3, 0xB5, 0x56, 0x1D, 0x31, 0xEB, 0x2D, 0x4F, 0x09, 0xF1, 0x2F,
0x92, 0x7E, 0xA8, 0xF7, 0x40, 0xCE, 0x0E, 0x87, 0x15, 0x49, 0x65, 0x50, 0x5E, 0x22, 0x72, 0xF6,
0x90, 0x42, 0xB1, 0x5D, 0x57, 0xCC, 0xC7, 0xF7, 0x71, 0x91, 0x91, 0x23, 0x97, 0x82, 0x83, 0xB3,
0xCC, 0xE5, 0x24, 0xD9, 0x71, 0x52, 0x07, 0xBF, 0x5F, 0x5A, 0xD3, 0x69, 0x10, 0x21, 0x76, 0xF0,
0xF7, 0xA7, 0x8A, 0x6D, 0xEB, 0x2B, 0xFF, 0x0E, 0xDC, 0xE1, 0x65, 0xF3, 0xB1, 0x4F, 0x14, 0xD0,
0x03, 0x5B, 0x27, 0x56, 0x86, 0x1F, 0xE0, 0x3C, 0x43, 0x39, 0x6E, 0xD0, 0x02, 0xC8, 0x94, 0xA3},
1,{0x03},{0x15, 0x12, 0x31},
{0x62, 0x21, 0xE0, 0xC7, 0x26, 0xBA, 0xC8, 0xF8, 0xAC, 0x25, 0xF8, 0xF9, 0x3B, 0x81, 0x1D, 0x1F,
0xFD, 0x4C, 0x13, 0x1C}
};
EMV_CAPK capk_amex_liveC8 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0xC8,
0x01, 0x01, 0x90,
{0xBF, 0x0C, 0xFC, 0xED, 0x70, 0x8F, 0xB6, 0xB0, 0x48, 0xE3, 0x01, 0x43, 0x36, 0xEA, 0x24, 0xAA,
0x00, 0x7D, 0x79, 0x67, 0xB8, 0xAA, 0x4E, 0x61, 0x3D, 0x26, 0xD0, 0x15, 0xC4, 0xFE, 0x78, 0x05,
0xD9, 0xDB, 0x13, 0x1C, 0xED, 0x0D, 0x2A, 0x8E, 0xD5, 0x04, 0xC3, 0xB5, 0xCC, 0xD4, 0x8C, 0x33,
0x19, 0x9E, 0x5A, 0x5B, 0xF6, 0x44, 0xDA, 0x04, 0x3B, 0x54, 0xDB, 0xF6, 0x02, 0x76, 0xF0, 0x5B,
0x17, 0x50, 0xFA, 0xB3, 0x90, 0x98, 0xC7, 0x51, 0x1D, 0x04, 0xBA, 0xBC, 0x64, 0x94, 0x82, 0xDD,
0xCF, 0x7C, 0xC4, 0x2C, 0x8C, 0x43, 0x5B, 0xAB, 0x8D, 0xD0, 0xEB, 0x1A, 0x62, 0x0C, 0x31, 0x11,
0x1D, 0x1A, 0xAA, 0xF9, 0xAF, 0x65, 0x71, 0xEE, 0xBD, 0x4C, 0xF5, 0xA0, 0x84, 0x96, 0xD5, 0x7E,
0x7A, 0xBD, 0xBB, 0x51, 0x80, 0xE0, 0xA4, 0x2D, 0xA8, 0x69, 0xAB, 0x95, 0xFB, 0x62, 0x0E, 0xFF,
0x26, 0x41, 0xC3, 0x70, 0x2A, 0xF3, 0xBE, 0x0B, 0x0C, 0x13, 0x8E, 0xAE, 0xF2, 0x02, 0xE2, 0x1D},
1,{0x03},{0x17, 0x12, 0x31},
{0x33, 0xBD, 0x7A, 0x05, 0x9F, 0xAB, 0x09, 0x49, 0x39, 0xB9, 0x0A, 0x8F, 0x35, 0x84, 0x5C, 0x9D,
0xC7, 0x79, 0xBD, 0x50}
};
EMV_CAPK capk_amex_liveC9 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0xC9,
0x01, 0x01, 0xB0,
{0xB3, 0x62, 0xDB, 0x57, 0x33, 0xC1, 0x5B, 0x87, 0x97, 0xB8, 0xEC, 0xEE, 0x55, 0xCB, 0x1A, 0x37,
0x1F, 0x76, 0x0E, 0x0B, 0xED, 0xD3, 0x71, 0x5B, 0xB2, 0x70, 0x42, 0x4F, 0xD4, 0xEA, 0x26, 0x06,
0x2C, 0x38, 0xC3, 0xF4, 0xAA, 0xA3, 0x73, 0x2A, 0x83, 0xD3, 0x6E, 0xA8, 0xE9, 0x60, 0x2F, 0x66,
0x83, 0xEE, 0xCC, 0x6B, 0xAF, 0xF6, 0x3D, 0xD2, 0xD4, 0x90, 0x14, 0xBD, 0xE4, 0xD6, 0xD6, 0x03,
0xCD, 0x74, 0x42, 0x06, 0xB0, 0x5B, 0x4B, 0xAD, 0x0C, 0x64, 0xC6, 0x3A, 0xB3, 0x97, 0x6B, 0x5C,
0x8C, 0xAA, 0xF8, 0x53, 0x95, 0x49, 0xF5, 0x92, 0x1C, 0x0B, 0x70, 0x0D, 0x5B, 0x0F, 0x83, 0xC4,
0xE7, 0xE9, 0x46, 0x06, 0x8B, 0xAA, 0xAB, 0x54, 0x63, 0x54, 0x4D, 0xB1, 0x8C, 0x63, 0x80, 0x11,
0x18, 0xF2, 0x18, 0x2E, 0xFC, 0xC8, 0xA1, 0xE8, 0x5E, 0x53, 0xC2, 0xA7, 0xAE, 0x83, 0x9A, 0x5C,
0x6A, 0x3C, 0xAB, 0xE7, 0x37, 0x62, 0xB7, 0x0D, 0x17, 0x0A, 0xB6, 0x4A, 0xFC, 0x6C, 0xA4, 0x82,
0x94, 0x49, 0x02, 0x61, 0x1F, 0xB0, 0x06, 0x1E, 0x09, 0xA6, 0x7A, 0xCB, 0x77, 0xE4, 0x93, 0xD9,
0x98, 0xA0, 0xCC, 0xF9, 0x3D, 0x81, 0xA4, 0xF6, 0xC0, 0xDC, 0x6B, 0x7D, 0xF2, 0x2E, 0x62, 0xDB},
1,{0x03},{0x22, 0x12, 0x31},
{0x8E, 0x8D, 0xFF, 0x44, 0x3D, 0x78, 0xCD, 0x91, 0xDE, 0x88, 0x82, 0x1D, 0x70, 0xC9, 0x8F, 0x06,
0x38, 0xE5, 0x1E, 0x49}
};
EMV_CAPK capk_amex_liveCA = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0xCA,
0x01, 0x01, 0xF8,
{0xC2, 0x3E, 0xCB, 0xD7, 0x11, 0x9F, 0x47, 0x9C, 0x2E, 0xE5, 0x46, 0xC1, 0x23, 0xA5, 0x85, 0xD6,
0x97, 0xA7, 0xD1, 0x0B, 0x55, 0xC2, 0xD2, 0x8B, 0xEF, 0x0D, 0x29, 0x9C, 0x01, 0xDC, 0x65, 0x42,
0x0A, 0x03, 0xFE, 0x52, 0x27, 0xEC, 0xDE, 0xCB, 0x80, 0x25, 0xFB, 0xC8, 0x6E, 0xEB, 0xC1, 0x93,
0x52, 0x98, 0xC1, 0x75, 0x3A, 0xB8, 0x49, 0x93, 0x67, 0x49, 0x71, 0x95, 0x91, 0x75, 0x8C, 0x31,
0x5F, 0xA1, 0x50, 0x40, 0x07, 0x89, 0xBB, 0x14, 0xFA, 0xDD, 0x6E, 0xAE, 0x2A, 0xD6, 0x17, 0xDA,
0x38, 0x16, 0x31, 0x99, 0xD1, 0xBA, 0xD5, 0xD3, 0xF8, 0xF6, 0xA7, 0xA2, 0x0A, 0xEF, 0x42, 0x0A,
0xDF, 0xE2, 0x40, 0x4D, 0x30, 0xB2, 0x19, 0x35, 0x9C, 0x6A, 0x49, 0x52, 0x56, 0x5C, 0xCC, 0xA6,
0xF1, 0x1E, 0xC5, 0xBE, 0x56, 0x4B, 0x49, 0xB0, 0xEA, 0x5B, 0xF5, 0xB3, 0xDC, 0x8C, 0x5C, 0x64,
0x01, 0x20, 0x8D, 0x00, 0x29, 0xC3, 0x95, 0x7A, 0x8C, 0x59, 0x22, 0xCB, 0xDE, 0x39, 0xD3, 0xA5,
0x64, 0xC6, 0xDE, 0xBB, 0x6B, 0xD2, 0xAE, 0xF9, 0x1F, 0xC2, 0x7B, 0xB3, 0xD3, 0x89, 0x2B, 0xEB,
0x96, 0x46, 0xDC, 0xE2, 0xE1, 0xEF, 0x85, 0x81, 0xEF, 0xFA, 0x71, 0x21, 0x58, 0xAA, 0xEC, 0x54,
0x1C, 0x0B, 0xBB, 0x4B, 0x3E, 0x27, 0x9D, 0x7D, 0xA5, 0x4E, 0x45, 0xA0, 0xAC, 0xC3, 0x57, 0x0E,
0x71, 0x2C, 0x9F, 0x7C, 0xDF, 0x98, 0x5C, 0xFA, 0xFD, 0x38, 0x2A, 0xE1, 0x3A, 0x3B, 0x21, 0x4A,
0x9E, 0x8E, 0x1E, 0x71, 0xAB, 0x1E, 0xA7, 0x07, 0x89, 0x51, 0x12, 0xAB, 0xC3, 0xA9, 0x7D, 0x0F,
0xCB, 0x0A, 0xE2, 0xEE, 0x5C, 0x85, 0x49, 0x2B, 0x6C, 0xFD, 0x54, 0x88, 0x5C, 0xDD, 0x63, 0x37,
0xE8, 0x95, 0xCC, 0x70, 0xFB, 0x32, 0x55, 0xE3},
1,{0x03},{0x22, 0x12, 0x31},
{0x6B, 0xDA, 0x32, 0xB1, 0xAA, 0x17, 0x14, 0x44, 0xC7, 0xE8, 0xF8, 0x80, 0x75, 0xA7, 0x4F, 0xBF,
0xE8, 0x45, 0x76, 0x5F}
};
EMV_CAPK capk_DPAS_t5A = {
{0xA0, 0x00, 0x00, 0x01, 0x52}, //Registered Application Provider Identifier
0x5A, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
128, //Length of Module
//Module
{0xED, 0xD8, 0x25, 0x24, 0x68, 0xA7, 0x05, 0x61, 0x4B, 0x4D, 0x07, 0xDE, 0x32, 0x11, 0xB3, 0x00,
0x31, 0xAE, 0xDB, 0x6D, 0x33, 0xA4, 0x31, 0x5F, 0x2C, 0xFF, 0x7C, 0x97, 0xDB, 0x91, 0x89, 0x93,
0xC2, 0xDC, 0x02, 0xE7, 0x9E, 0x2F, 0xF8, 0xA2, 0x68, 0x3D, 0x5B, 0xBD, 0x0F, 0x61, 0x4B, 0xC9,
0xAB, 0x36, 0x0A, 0x44, 0x82, 0x83, 0xEF, 0x8B, 0x9C, 0xF6, 0x73, 0x1D, 0x71, 0xD6, 0xBE, 0x93,
0x9B, 0x7C, 0x5D, 0x0B, 0x04, 0x52, 0xD6, 0x60, 0xCF, 0x24, 0xC2, 0x1C, 0x47, 0xCA, 0xC8, 0xE2,
0x69, 0x48, 0xC8, 0xEE, 0xD8, 0xE3, 0xD0, 0x0C, 0x01, 0x68, 0x28, 0xD6, 0x42, 0x81, 0x6E, 0x65,
0x8D, 0xC2, 0xCF, 0xC6, 0x1E, 0x7E, 0x7D, 0x77, 0x40, 0x63, 0x3B, 0xEF, 0xE3, 0x41, 0x07, 0xC1,
0xFB, 0x55, 0xDE, 0xA7, 0xFA, 0xAE, 0xA2, 0xB2, 0x5E, 0x85, 0xBE, 0xD9, 0x48, 0x89, 0x3D, 0x07},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0xCC, 0x95, 0x85, 0xE8, 0xE6, 0x37, 0x19, 0x1C, 0x10, 0xFC, 0xEC, 0xB3, 0x2B, 0x5A, 0xE1, 0xB9,
0xD4, 0x10, 0xB5, 0x2D}
};
EMV_CAPK capk_DPAS_t5B = {
{0xA0, 0x00, 0x00, 0x01, 0x52}, //Registered Application Provider Identifier
0x5B, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
144, //Length of Module
//Module
{0xD3, 0xF4, 0x5D, 0x06, 0x5D, 0x4D, 0x90, 0x0F, 0x68, 0xB2, 0x12, 0x9A, 0xFA, 0x38, 0xF5, 0x49,
0xAB, 0x9A, 0xE4, 0x61, 0x9E, 0x55, 0x45, 0x81, 0x4E, 0x46, 0x8F, 0x38, 0x20, 0x49, 0xA0, 0xB9,
0x77, 0x66, 0x20, 0xDA, 0x60, 0xD6, 0x25, 0x37, 0xF0, 0x70, 0x5A, 0x2C, 0x92, 0x6D, 0xBE, 0xAD,
0x4C, 0xA7, 0xCB, 0x43, 0xF0, 0xF0, 0xDD, 0x80, 0x95, 0x84, 0xE9, 0xF7, 0xEF, 0xBD, 0xA3, 0x77,
0x87, 0x47, 0xBC, 0x9E, 0x25, 0xC5, 0x60, 0x65, 0x26, 0xFA, 0xB5, 0xE4, 0x91, 0x64, 0x6D, 0x4D,
0xD2, 0x82, 0x78, 0x69, 0x1C, 0x25, 0x95, 0x6C, 0x8F, 0xED, 0x5E, 0x45, 0x2F, 0x24, 0x42, 0xE2,
0x5E, 0xDC, 0x6B, 0x0C, 0x1A, 0xA4, 0xB2, 0xE9, 0xEC, 0x4A, 0xD9, 0xB2, 0x5A, 0x1B, 0x83, 0x62,
0x95, 0xB8, 0x23, 0xED, 0xDC, 0x5E, 0xB6, 0xE1, 0xE0, 0xA3, 0xF4, 0x1B, 0x28, 0xDB, 0x8C, 0x3B,
0x7E, 0x3E, 0x9B, 0x59, 0x79, 0xCD, 0x7E, 0x07, 0x9E, 0xF0, 0x24, 0x09, 0x5A, 0x1D, 0x19, 0xDD},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0x4D, 0xC5, 0xC6, 0xCA, 0xB6, 0xAE, 0x96, 0x97, 0x4D, 0x9D, 0xC8, 0xB2, 0x43, 0x5E, 0x21, 0xF5,
0x26, 0xBC, 0x7A, 0x60}
};
EMV_CAPK capk_DPAS_t5C = {
{0xA0, 0x00, 0x00, 0x01, 0x52}, //Registered Application Provider Identifier
0x5C, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
176, //Length of Module
//Module
{0x83, 0x3F, 0x27, 0x5F, 0xCF, 0x5C, 0xA4, 0xCB, 0x6F, 0x1B, 0xF8, 0x80, 0xE5, 0x4D, 0xCF, 0xEB,
0x72, 0x1A, 0x31, 0x66, 0x92, 0xCA, 0xFE, 0xB2, 0x8B, 0x69, 0x8C, 0xAE, 0xCA, 0xFA, 0x2B, 0x2D,
0x2A, 0xD8, 0x51, 0x7B, 0x1E, 0xFB, 0x59, 0xDD, 0xEF, 0xC3, 0x9F, 0x9C, 0x3B, 0x33, 0xDD, 0xEE,
0x40, 0xE7, 0xA6, 0x3C, 0x03, 0xE9, 0x0A, 0x4D, 0xD2, 0x61, 0xBC, 0x0F, 0x28, 0xB4, 0x2E, 0xA6,
0xE7, 0xA1, 0xF3, 0x07, 0x17, 0x8E, 0x2D, 0x63, 0xFA, 0x16, 0x49, 0x15, 0x5C, 0x3A, 0x5F, 0x92,
0x6B, 0x4C, 0x7D, 0x7C, 0x25, 0x8B, 0xCA, 0x98, 0xEF, 0x90, 0xC7, 0xF4, 0x11, 0x7C, 0x20, 0x5E,
0x8E, 0x32, 0xC4, 0x5D, 0x10, 0xE3, 0xD4, 0x94, 0x05, 0x9D, 0x2F, 0x29, 0x33, 0x89, 0x1B, 0x97,
0x9C, 0xE4, 0xA8, 0x31, 0xB3, 0x01, 0xB0, 0x55, 0x0C, 0xDA, 0xE9, 0xB6, 0x70, 0x64, 0xB3, 0x1D,
0x8B, 0x48, 0x1B, 0x85, 0xA5, 0xB0, 0x46, 0xBE, 0x8F, 0xFA, 0x7B, 0xDB, 0x58, 0xDC, 0x0D, 0x70,
0x32, 0x52, 0x52, 0x97, 0xF2, 0x6F, 0xF6, 0x19, 0xAF, 0x7F, 0x15, 0xBC, 0xEC, 0x0C, 0x92, 0xBC,
0xDC, 0xBC, 0x4F, 0xB2, 0x07, 0xD1, 0x15, 0xAA, 0x65, 0xCD, 0x04, 0xC1, 0xCF, 0x98, 0x21, 0x91},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0x60, 0x15, 0x40, 0x98, 0xCB, 0xBA, 0x35, 0x0F, 0x5F, 0x48, 0x6C, 0xA3, 0x10, 0x83, 0xD1, 0xFC,
0x47, 0x4E, 0x31, 0xF8}
};
EMV_CAPK capk_DPAS_t5D = {
{0xA0, 0x00, 0x00, 0x01, 0x52}, //Registered Application Provider Identifier
0x5D, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
248, //Length of Module
//Module
{0xAD, 0x93, 0x8E, 0xA9, 0x88, 0x8E, 0x51, 0x55, 0xF8, 0xCD, 0x27, 0x27, 0x49, 0x17, 0x2B, 0x3A,
0x8C, 0x50, 0x4C, 0x17, 0x46, 0x0E, 0xFA, 0x0B, 0xED, 0x7C, 0xBC, 0x5F, 0xD3, 0x2C, 0x4A, 0x80,
0xFD, 0x81, 0x03, 0x12, 0x28, 0x1B, 0x5A, 0x35, 0x56, 0x28, 0x00, 0xCD, 0xC3, 0x25, 0x35, 0x8A,
0x96, 0x39, 0xC5, 0x01, 0xA5, 0x37, 0xB7, 0xAE, 0x43, 0xDF, 0x26, 0x3E, 0x6D, 0x23, 0x2B, 0x81,
0x1A, 0xCD, 0xB6, 0xDD, 0xE9, 0x79, 0xD5, 0x5D, 0x6C, 0x91, 0x11, 0x73, 0x48, 0x39, 0x93, 0xA4,
0x23, 0xA0, 0xA5, 0xB1, 0xE1, 0xA7, 0x02, 0x37, 0x88, 0x5A, 0x24, 0x1B, 0x8E, 0xEB, 0xB5, 0x57,
0x1E, 0x2D, 0x32, 0xB4, 0x1F, 0x9C, 0xC5, 0x51, 0x4D, 0xF8, 0x3F, 0x0D, 0x69, 0x27, 0x0E, 0x10,
0x9A, 0xF1, 0x42, 0x2F, 0x98, 0x5A, 0x52, 0xCC, 0xE0, 0x4F, 0x3D, 0xF2, 0x69, 0xB7, 0x95, 0x15,
0x5A, 0x68, 0xAD, 0x2D, 0x6B, 0x66, 0x0D, 0xDC, 0xD7, 0x59, 0xF0, 0xA5, 0xDA, 0x7B, 0x64, 0x10,
0x4D, 0x22, 0xC2, 0x77, 0x1E, 0xCE, 0x7A, 0x5F, 0xFD, 0x40, 0xC7, 0x74, 0xE4, 0x41, 0x37, 0x9D,
0x11, 0x32, 0xFA, 0xF0, 0x4C, 0xDF, 0x55, 0xB9, 0x50, 0x4C, 0x6D, 0xCE, 0x9F, 0x61, 0x77, 0x6D,
0x81, 0xC7, 0xC4, 0x5F, 0x19, 0xB9, 0xEF, 0xB3, 0x74, 0x9A, 0xC7, 0xD4, 0x86, 0xA5, 0xAD, 0x2E,
0x78, 0x1F, 0xA9, 0xD0, 0x82, 0xFB, 0x26, 0x77, 0x66, 0x5B, 0x99, 0xFA, 0x5F, 0x15, 0x53, 0x13,
0x5A, 0x1F, 0xD2, 0xA2, 0xA9, 0xFB, 0xF6, 0x25, 0xCA, 0x84, 0xA7, 0xD7, 0x36, 0x52, 0x14, 0x31,
0x17, 0x8F, 0x13, 0x10, 0x0A, 0x25, 0x16, 0xF9, 0xA4, 0x3C, 0xE0, 0x95, 0xB0, 0x32, 0xB8, 0x86,
0xC7, 0xA6, 0xAB, 0x12, 0x6E, 0x20, 0x3B, 0xE7},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0xB5, 0x1E, 0xC5, 0xF7, 0xDE, 0x9B, 0xB6, 0xD8, 0xBC, 0xE8, 0xFB, 0x5F, 0x69, 0xBA, 0x57, 0xA0,
0x42, 0x21, 0xF3, 0x9B}
};
EMV_CAPK capk_CARNET_tC1 = {
{0xA0, 0x00, 0x00, 0x07, 0x24}, //Registered Application Provider Identifier
0xC1, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
176, //Length of Module
//Module
{0xC7, 0x1B, 0x64, 0x53, 0x81, 0x63, 0x5A, 0x88, 0x87, 0xE4, 0xFF, 0x56, 0xC8, 0x66, 0xEA, 0x5F,
0x6E, 0x4B, 0xBE, 0x1C, 0x1C, 0xA0, 0xA5, 0x20, 0xEB, 0x1D, 0xFB, 0x94, 0x15, 0x0B, 0x50, 0xEA,
0x36, 0x68, 0x85, 0x93, 0xF7, 0xF6, 0xF5, 0x18, 0x9E, 0x74, 0x7F, 0x22, 0x45, 0x4C, 0xA6, 0x42,
0x1E, 0xE8, 0x3B, 0x33, 0x4F, 0x39, 0xC9, 0x9F, 0x59, 0x80, 0x53, 0x19, 0x4A, 0xE5, 0xB1, 0x55,
0xCD, 0x8D, 0xB5, 0xFE, 0x9B, 0x3A, 0x86, 0xDE, 0x5F, 0x41, 0x62, 0xA2, 0x73, 0xBD, 0xB8, 0xFD,
0x1A, 0x03, 0x14, 0xDD, 0xD3, 0x15, 0x66, 0x5B, 0x3D, 0xAD, 0x51, 0xF2, 0x4F, 0xDF, 0xDA, 0xA6,
0x6F, 0xF4, 0x9B, 0x30, 0x81, 0x90, 0x6C, 0xDC, 0x1C, 0x5A, 0xF7, 0xAF, 0xE7, 0xC4, 0xD0, 0xF0,
0x21, 0x22, 0x50, 0xC5, 0xC6, 0xFA, 0x41, 0x59, 0xB2, 0xC9, 0x37, 0xB3, 0xED, 0x00, 0xB5, 0xE5,
0x52, 0x47, 0x96, 0xF0, 0x6C, 0xF7, 0x9C, 0xE1, 0x91, 0xFF, 0xDC, 0x0A, 0x6E, 0x6D, 0x70, 0x04,
0xCA, 0xFD, 0xCA, 0x1B, 0x8B, 0xDA, 0xF2, 0xDF, 0x32, 0xDB, 0x86, 0xDE, 0x45, 0xCD, 0x7F, 0xB4,
0x77, 0x60, 0x74, 0x19, 0xE9, 0xC1, 0x2E, 0x29, 0xBA, 0xDC, 0xA9, 0xFB, 0x70, 0x11, 0xDA, 0xFF},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0x65, 0x50, 0x56, 0xA4, 0x91, 0x91, 0xFA, 0x5B, 0xE0, 0x42, 0x0D, 0x40, 0x98, 0x5C, 0xAD, 0x67,
0x31, 0x9F, 0xEE, 0x24}
};
EMV_CAPK capk_CARNET_tC2 = {
{0xA0, 0x00, 0x00, 0x07, 0x24}, //Registered Application Provider Identifier
0xC2, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
248, //Length of Module
//Module
{0x91, 0xE3, 0x21, 0x5B, 0x11, 0x7D, 0x30, 0x01, 0x96, 0xF5, 0xA1, 0x69, 0xF6, 0x51, 0x1B, 0x63,
0x69, 0x69, 0x91, 0xEA, 0xA6, 0xE2, 0xA6, 0x24, 0x3C, 0x60, 0xE5, 0x11, 0xA5, 0xCA, 0xCF, 0x6C,
0xBB, 0xE0, 0x20, 0x69, 0xAD, 0x4B, 0xF5, 0x10, 0x37, 0xF8, 0x9A, 0x02, 0x79, 0x3D, 0xB5, 0xEC,
0x5F, 0xBA, 0xC5, 0x13, 0x3A, 0xFF, 0x2A, 0x80, 0x4E, 0xDA, 0x69, 0x2B, 0xE6, 0xB6, 0x97, 0x39,
0x07, 0x59, 0x7D, 0x7E, 0x8B, 0x58, 0x47, 0xC4, 0x98, 0xFB, 0xFC, 0xE7, 0x11, 0xC5, 0xC2, 0x51,
0x33, 0x70, 0x17, 0x24, 0x26, 0xD4, 0x3E, 0x88, 0xC1, 0xC9, 0xDD, 0xA1, 0x1E, 0xC2, 0x92, 0xF1,
0xFD, 0x3B, 0xCE, 0xD0, 0x17, 0x5E, 0x72, 0x96, 0x61, 0x95, 0x2A, 0x9A, 0xE7, 0x05, 0x3F, 0x7D,
0xEE, 0x34, 0xED, 0x39, 0xC6, 0x30, 0x74, 0x7E, 0xD3, 0xED, 0x2A, 0x5A, 0xDA, 0x6E, 0xD5, 0xB8,
0x15, 0x05, 0x69, 0x7B, 0x21, 0x89, 0x62, 0x3C, 0xFA, 0x24, 0x2E, 0xC0, 0xDD, 0x6D, 0xEC, 0x01,
0xFD, 0x58, 0x31, 0xF4, 0x43, 0x62, 0x5C, 0x57, 0x97, 0x6E, 0x95, 0xCC, 0xB4, 0xC7, 0xB3, 0x61,
0x6D, 0xBB, 0x91, 0x4B, 0xB6, 0xE9, 0x35, 0x49, 0x8C, 0xB1, 0xC5, 0x4D, 0xFA, 0x3E, 0x8D, 0xCD,
0xB6, 0x5B, 0xD5, 0x00, 0x47, 0x62, 0xA8, 0xB7, 0xB6, 0xF8, 0x8F, 0xE4, 0x2B, 0xA0, 0xD4, 0x2A,
0x79, 0x0D, 0xA4, 0x00, 0xA4, 0x33, 0x40, 0x7A, 0x3C, 0x6B, 0x96, 0x80, 0x83, 0x7B, 0xB3, 0xA7,
0x52, 0x9E, 0x54, 0xF1, 0x3D, 0x2D, 0xB8, 0xD4, 0x00, 0x68, 0x85, 0x70, 0x0C, 0x3A, 0x48, 0x76,
0x2B, 0xA3, 0x9B, 0x2D, 0xC9, 0x03, 0x96, 0x23, 0x48, 0xE1, 0x3E, 0x06, 0x89, 0x42, 0x85, 0xA6,
0x1E, 0x6B, 0xF0, 0x3A, 0xC6, 0xF8, 0xC5, 0xDF},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0xA6, 0x64, 0xB9, 0x2A, 0xCD, 0xA5, 0x13, 0x0F, 0x44, 0x4A, 0x58, 0x4A, 0xF7, 0x22, 0x01, 0x66,
0x4E, 0xFB, 0xC9, 0xF6}
};
#ifdef EMV_PROD_VERSION
/************************************************
Belows are EMV prod data
************************************************/
EMV_CAPK capk_VISA_v08 = {
{0xA0, 0x00, 0x00, 0x00, 0x03}, //Registered Application Provider Identifier
0x08, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
176, //Length of Module
//Module
{0xD9, 0xFD, 0x6E, 0xD7, 0x5D, 0x51, 0xD0, 0xE3, 0x06, 0x64, 0xBD, 0x15, 0x70, 0x23, 0xEA, 0xA1,
0xFF, 0xA8, 0x71, 0xE4, 0xDA, 0x65, 0x67, 0x2B, 0x86, 0x3D, 0x25, 0x5E, 0x81, 0xE1, 0x37, 0xA5,
0x1D, 0xE4, 0xF7, 0x2B, 0xCC, 0x9E, 0x44, 0xAC, 0xE1, 0x21, 0x27, 0xF8, 0x7E, 0x26, 0x3D, 0x3A,
0xF9, 0xDD, 0x9C, 0xF3, 0x5C, 0xA4, 0xA7, 0xB0, 0x1E, 0x90, 0x70, 0x00, 0xBA, 0x85, 0xD2, 0x49,
0x54, 0xC2, 0xFC, 0xA3, 0x07, 0x48, 0x25, 0xDD, 0xD4, 0xC0, 0xC8, 0xF1, 0x86, 0xCB, 0x02, 0x0F,
0x68, 0x3E, 0x02, 0xF2, 0xDE, 0xAD, 0x39, 0x69, 0x13, 0x3F, 0x06, 0xF7, 0x84, 0x51, 0x66, 0xAC,
0xEB, 0x57, 0xCA, 0x0F, 0xC2, 0x60, 0x34, 0x45, 0x46, 0x98, 0x11, 0xD2, 0x93, 0xBF, 0xEF, 0xBA,
0xFA, 0xB5, 0x76, 0x31, 0xB3, 0xDD, 0x91, 0xE7, 0x96, 0xBF, 0x85, 0x0A, 0x25, 0x01, 0x2F, 0x1A,
0xE3, 0x8F, 0x05, 0xAA, 0x5C, 0x4D, 0x6D, 0x03, 0xB1, 0xDC, 0x2E, 0x56, 0x86, 0x12, 0x78, 0x59,
0x38, 0xBB, 0xC9, 0xB3, 0xCD, 0x3A, 0x91, 0x0C, 0x1D, 0xA5, 0x5A, 0x5A, 0x92, 0x18, 0xAC, 0xE0,
0xF7, 0xA2, 0x12, 0x87, 0x75, 0x26, 0x82, 0xF1, 0x58, 0x32, 0xA6, 0x78, 0xD6, 0xE1, 0xED, 0x0B},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0x20, 0xD2, 0x13, 0x12, 0x69, 0x55, 0xDE, 0x20, 0x5A, 0xDC, 0x2F, 0xD2, 0x82, 0x2B, 0xD2, 0x2D,
0xE2, 0x1C, 0xF9, 0xA8}
};
EMV_CAPK capk_VISA_v09 = {
{0xA0, 0x00, 0x00, 0x00, 0x03}, //Registered Application Provider Identifier
0x09, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
248, //Length of Module
//Module
{0x9D, 0x91, 0x22, 0x48, 0xDE, 0x0A, 0x4E, 0x39, 0xC1, 0xA7, 0xDD, 0xE3, 0xF6, 0xD2, 0x58, 0x89,
0x92, 0xC1, 0xA4, 0x09, 0x5A, 0xFB, 0xD1, 0x82, 0x4D, 0x1B, 0xA7, 0x48, 0x47, 0xF2, 0xBC, 0x49,
0x26, 0xD2, 0xEF, 0xD9, 0x04, 0xB4, 0xB5, 0x49, 0x54, 0xCD, 0x18, 0x9A, 0x54, 0xC5, 0xD1, 0x17,
0x96, 0x54, 0xF8, 0xF9, 0xB0, 0xD2, 0xAB, 0x5F, 0x03, 0x57, 0xEB, 0x64, 0x2F, 0xED, 0xA9, 0x5D,
0x39, 0x12, 0xC6, 0x57, 0x69, 0x45, 0xFA, 0xB8, 0x97, 0xE7, 0x06, 0x2C, 0xAA, 0x44, 0xA4, 0xAA,
0x06, 0xB8, 0xFE, 0x6E, 0x3D, 0xBA, 0x18, 0xAF, 0x6A, 0xE3, 0x73, 0x8E, 0x30, 0x42, 0x9E, 0xE9,
0xBE, 0x03, 0x42, 0x7C, 0x9D, 0x64, 0xF6, 0x95, 0xFA, 0x8C, 0xAB, 0x4B, 0xFE, 0x37, 0x68, 0x53,
0xEA, 0x34, 0xAD, 0x1D, 0x76, 0xBF, 0xCA, 0xD1, 0x59, 0x08, 0xC0, 0x77, 0xFF, 0xE6, 0xDC, 0x55,
0x21, 0xEC, 0xEF, 0x5D, 0x27, 0x8A, 0x96, 0xE2, 0x6F, 0x57, 0x35, 0x9F, 0xFA, 0xED, 0xA1, 0x94,
0x34, 0xB9, 0x37, 0xF1, 0xAD, 0x99, 0x9D, 0xC5, 0xC4, 0x1E, 0xB1, 0x19, 0x35, 0xB4, 0x4C, 0x18,
0x10, 0x0E, 0x85, 0x7F, 0x43, 0x1A, 0x4A, 0x5A, 0x6B, 0xB6, 0x51, 0x14, 0xF1, 0x74, 0xC2, 0xD7,
0xB5, 0x9F, 0xDF, 0x23, 0x7D, 0x6B, 0xB1, 0xDD, 0x09, 0x16, 0xE6, 0x44, 0xD7, 0x09, 0xDE, 0xD5,
0x64, 0x81, 0x47, 0x7C, 0x75, 0xD9, 0x5C, 0xDD, 0x68, 0x25, 0x46, 0x15, 0xF7, 0x74, 0x0E, 0xC0,
0x7F, 0x33, 0x0A, 0xC5, 0xD6, 0x7B, 0xCD, 0x75, 0xBF, 0x23, 0xD2, 0x8A, 0x14, 0x08, 0x26, 0xC0,
0x26, 0xDB, 0xDE, 0x97, 0x1A, 0x37, 0xCD, 0x3E, 0xF9, 0xB8, 0xDF, 0x64, 0x4A, 0xC3, 0x85, 0x01,
0x05, 0x01, 0xEF, 0xC6, 0x50, 0x9D, 0x7A, 0x41},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0x1F, 0xF8, 0x0A, 0x40, 0x17, 0x3F, 0x52, 0xD7, 0xD2, 0x7E, 0x0F, 0x26, 0xA1, 0x46, 0xA1, 0xC8,
0xCC, 0xB2, 0x90, 0x46}
};
EMV_CAPK capk_VISA_v50 = {
{0xA0, 0x00, 0x00, 0x00, 0x03}, //Registered Application Provider Identifier
0x09, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
128, //Length of Module
//Module
{0xD1, 0x11, 0x97, 0x59, 0x00, 0x57, 0xB8, 0x41, 0x96, 0xC2, 0xF4, 0xD1, 0x1A, 0x8F, 0x3C, 0x05,
0x40, 0x8F, 0x42, 0x2A, 0x35, 0xD7, 0x02, 0xF9, 0x01, 0x06, 0xEA, 0x5B, 0x01, 0x9B, 0xB2, 0x8A,
0xE6, 0x07, 0xAA, 0x9C, 0xDE, 0xBC, 0xD0, 0xD8, 0x1A, 0x38, 0xD4, 0x8C, 0x7E, 0xBB, 0x00, 0x62,
0xD2, 0x87, 0x36, 0x9E, 0xC0, 0xC4, 0x21, 0x24, 0x24, 0x6A, 0xC3, 0x0D, 0x80, 0xCD, 0x60, 0x2A,
0xB7, 0x23, 0x8D, 0x51, 0x08, 0x4D, 0xED, 0x46, 0x98, 0x16, 0x2C, 0x59, 0xD2, 0x5E, 0xAC, 0x1E,
0x66, 0x25, 0x5B, 0x4D, 0xB2, 0x35, 0x25, 0x26, 0xEF, 0x09, 0x82, 0xC3, 0xB8, 0xAD, 0x3D, 0x1C,
0xCE, 0x85, 0xB0, 0x1D, 0xB5, 0x78, 0x8E, 0x75, 0xE0, 0x9F, 0x44, 0xBE, 0x73, 0x61, 0x36, 0x6D,
0xEF, 0x9D, 0x1E, 0x13, 0x17, 0xB0, 0x5E, 0x5D, 0x0F, 0xF5, 0x29, 0x0F, 0x88, 0xA0, 0xDB, 0x47},
1, //Length of exponent
{0x01, 0x00, 0x01}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0xB7, 0x69, 0x77, 0x56, 0x68, 0xCA, 0xCB, 0x5D, 0x22, 0xA6, 0x47, 0xD1, 0xD9, 0x93, 0x14, 0x1E,
0xDA, 0xB7, 0x23, 0x7B}
};
EMV_CAPK capk_MASTER_v05 = {
{0xA0, 0x00, 0x00, 0x00, 0x04}, //Registered Application Provider Identifier
0x05, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
176, //Length of Module
//Module
{0xB8, 0x04, 0x8A, 0xBC, 0x30, 0xC9, 0x0D, 0x97, 0x63, 0x36, 0x54, 0x3E, 0x3F, 0xD7, 0x09, 0x1C,
0x8F, 0xE4, 0x80, 0x0D, 0xF8, 0x20, 0xED, 0x55, 0xE7, 0xE9, 0x48, 0x13, 0xED, 0x00, 0x55, 0x5B,
0x57, 0x3F, 0xEC, 0xA3, 0xD8, 0x4A, 0xF6, 0x13, 0x1A, 0x65, 0x1D, 0x66, 0xCF, 0xF4, 0x28, 0x4F,
0xB1, 0x3B, 0x63, 0x5E, 0xDD, 0x0E, 0xE4, 0x01, 0x76, 0xD8, 0xBF, 0x04, 0xB7, 0xFD, 0x1C, 0x7B,
0xAC, 0xF9, 0xAC, 0x73, 0x27, 0xDF, 0xAA, 0x8A, 0xA7, 0x2D, 0x10, 0xDB, 0x3B, 0x8E, 0x70, 0xB2,
0xDD, 0xD8, 0x11, 0xCB, 0x41, 0x96, 0x52, 0x5E, 0xA3, 0x86, 0xAC, 0xC3, 0x3C, 0x0D, 0x9D, 0x45,
0x75, 0x91, 0x64, 0x69, 0xC4, 0xE4, 0xF5, 0x3E, 0x8E, 0x1C, 0x91, 0x2C, 0xC6, 0x18, 0xCB, 0x22,
0xDD, 0xE7, 0xC3, 0x56, 0x8E, 0x90, 0x02, 0x2E, 0x6B, 0xBA, 0x77, 0x02, 0x02, 0xE4, 0x52, 0x2A,
0x2D, 0xD6, 0x23, 0xD1, 0x80, 0xE2, 0x15, 0xBD, 0x1D, 0x15, 0x07, 0xFE, 0x3D, 0xC9, 0x0C, 0xA3,
0x10, 0xD2, 0x7B, 0x3E, 0xFC, 0xCD, 0x8F, 0x83, 0xDE, 0x30, 0x52, 0xCA, 0xD1, 0xE4, 0x89, 0x38,
0xC6, 0x8D, 0x09, 0x5A, 0xAC, 0x91, 0xB5, 0xF3, 0x7E, 0x28, 0xBB, 0x49, 0xEC, 0x7E, 0xD5, 0x97},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0xEB, 0xFA, 0x0D, 0x5D, 0x06, 0xD8, 0xCE, 0x70, 0x2D, 0xA3, 0xEA, 0xE8, 0x90, 0x70, 0x1D, 0x45,
0xE2, 0x74, 0xC8, 0x45}
};
EMV_CAPK capk_MASTER_v06 = {
{0xA0, 0x00, 0x00, 0x00, 0x04}, //Registered Application Provider Identifier
0x06, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
248, //Length of Module
//Module
{0xCB, 0x26, 0xFC, 0x83, 0x0B, 0x43, 0x78, 0x5B, 0x2B, 0xCE, 0x37, 0xC8, 0x1E, 0xD3, 0x34, 0x62,
0x2F, 0x96, 0x22, 0xF4, 0xC8, 0x9A, 0xAE, 0x64, 0x10, 0x46, 0xB2, 0x35, 0x34, 0x33, 0x88, 0x3F,
0x30, 0x7F, 0xB7, 0xC9, 0x74, 0x16, 0x2D, 0xA7, 0x2F, 0x7A, 0x4E, 0xC7, 0x5D, 0x9D, 0x65, 0x73,
0x36, 0x86, 0x5B, 0x8D, 0x30, 0x23, 0xD3, 0xD6, 0x45, 0x66, 0x76, 0x25, 0xC9, 0xA0, 0x7A, 0x6B,
0x7A, 0x13, 0x7C, 0xF0, 0xC6, 0x41, 0x98, 0xAE, 0x38, 0xFC, 0x23, 0x80, 0x06, 0xFB, 0x26, 0x03,
0xF4, 0x1F, 0x4F, 0x3B, 0xB9, 0xDA, 0x13, 0x47, 0x27, 0x0F, 0x2F, 0x5D, 0x8C, 0x60, 0x6E, 0x42,
0x09, 0x58, 0xC5, 0xF7, 0xD5, 0x0A, 0x71, 0xDE, 0x30, 0x14, 0x2F, 0x70, 0xDE, 0x46, 0x88, 0x89,
0xB5, 0xE3, 0xA0, 0x86, 0x95, 0xB9, 0x38, 0xA5, 0x0F, 0xC9, 0x80, 0x39, 0x3A, 0x9C, 0xBC, 0xE4,
0x4A, 0xD2, 0xD6, 0x4F, 0x63, 0x0B, 0xB3, 0x3A, 0xD3, 0xF5, 0xF5, 0xFD, 0x49, 0x5D, 0x31, 0xF3,
0x78, 0x18, 0xC1, 0xD9, 0x40, 0x71, 0x34, 0x2E, 0x07, 0xF1, 0xBE, 0xC2, 0x19, 0x4F, 0x60, 0x35,
0xBA, 0x5D, 0xED, 0x39, 0x36, 0x50, 0x0E, 0xB8, 0x2D, 0xFD, 0xA6, 0xE8, 0xAF, 0xB6, 0x55, 0xB1,
0xEF, 0x3D, 0x0D, 0x7E, 0xBF, 0x86, 0xB6, 0x6D, 0xD9, 0xF2, 0x9F, 0x6B, 0x1D, 0x32, 0x4F, 0xE8,
0xB2, 0x6C, 0xE3, 0x8A, 0xB2, 0x01, 0x3D, 0xD1, 0x3F, 0x61, 0x1E, 0x7A, 0x59, 0x4D, 0x67, 0x5C,
0x44, 0x32, 0x35, 0x0E, 0xA2, 0x44, 0xCC, 0x34, 0xF3, 0x87, 0x3C, 0xBA, 0x06, 0x59, 0x29, 0x87,
0xA1, 0xD7, 0xE8, 0x52, 0xAD, 0xC2, 0x2E, 0xF5, 0xA2, 0xEE, 0x28, 0x13, 0x20, 0x31, 0xE4, 0x8F,
0x74, 0x03, 0x7E, 0x3B, 0x34, 0xAB, 0x74, 0x7F},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0xF9, 0x10, 0xA1, 0x50, 0x4D, 0x5F, 0xFB, 0x79, 0x3D, 0x94, 0xF3, 0xB5, 0x00, 0x76, 0x5E, 0x1A,
0xBC, 0xAD, 0x72, 0xD9}
};
EMV_CAPK capk_amex_live0F = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0x0F,
0x01, 0x01,0xB0,
{0xC8, 0xD5, 0xAC, 0x27, 0xA5, 0xE1, 0xFB, 0x89, 0x97, 0x8C, 0x7C, 0x64, 0x79, 0xAF, 0x99, 0x3A,
0xB3, 0x80, 0x0E, 0xB2, 0x43, 0x99, 0x6F, 0xBB, 0x2A, 0xE2, 0x6B, 0x67, 0xB2, 0x3A, 0xC4, 0x82,
0xC4, 0xB7, 0x46, 0x00, 0x5A, 0x51, 0xAF, 0xA7, 0xD2, 0xD8, 0x3E, 0x89, 0x4F, 0x59, 0x1A, 0x23,
0x57, 0xB3, 0x0F, 0x85, 0xB8, 0x56, 0x27, 0xFF, 0x15, 0xDA, 0x12, 0x29, 0x0F, 0x70, 0xF0, 0x57,
0x66, 0x55, 0x2B, 0xA1, 0x1A, 0xD3, 0x4B, 0x71, 0x09, 0xFA, 0x49, 0xDE, 0x29, 0xDC, 0xB0, 0x10,
0x96, 0x70, 0x87, 0x5A, 0x17, 0xEA, 0x95, 0x54, 0x9E, 0x92, 0x34, 0x7B, 0x94, 0x8A, 0xA1, 0xF0,
0x45, 0x75, 0x6D, 0xE5, 0x6B, 0x70, 0x7E, 0x38, 0x63, 0xE5, 0x9A, 0x6C, 0xBE, 0x99, 0xC1, 0x27,
0x2E, 0xF6, 0x5F, 0xB6, 0x6C, 0xBB, 0x4C, 0xFF, 0x07, 0x0F, 0x36, 0x02, 0x9D, 0xD7, 0x62, 0x18,
0xB2, 0x12, 0x42, 0x64, 0x5B, 0x51, 0xCA, 0x75, 0x2A, 0xF3, 0x7E, 0x70, 0xBE, 0x1A, 0x84, 0xFF,
0x31, 0x07, 0x9D, 0xC0, 0x04, 0x8E, 0x92, 0x88, 0x83, 0xEC, 0x4F, 0xAD, 0xD4, 0x97, 0xA7, 0x19,
0x38, 0x5C, 0x2B, 0xBB, 0xEB, 0xC5, 0xA6, 0x6A, 0xA5, 0xE5, 0x65, 0x5D, 0x18, 0x03, 0x4E, 0xC5},
1,{0x03},{0x14, 0x12, 0x31},
{0xA7, 0x34, 0x72, 0xB3, 0xAB, 0x55, 0x74, 0x93, 0xA9, 0xBC, 0x21, 0x79, 0xCC, 0x80, 0x14, 0x05,
0x3B, 0x12, 0xBA, 0xB4}
};
//AMEX 1984 bits Live Key 10
EMV_CAPK capk_amex_live10 = { {0xA0, 0x00, 0x00, 0x00, 0x25}, 0x10,
0x01, 0x01,0xF8,
{0xCF, 0x98, 0xDF, 0xED, 0xB3, 0xD3, 0x72, 0x79, 0x65, 0xEE, 0x77, 0x97, 0x72, 0x33, 0x55, 0xE0,
0x75, 0x1C, 0x81, 0xD2, 0xD3, 0xDF, 0x4D, 0x18, 0xEB, 0xAB, 0x9F, 0xB9, 0xD4, 0x9F, 0x38, 0xC8,
0xC4, 0xA8, 0x26, 0xB9, 0x9D, 0xC9, 0xDE, 0xA3, 0xF0, 0x10, 0x43, 0xD4, 0xBF, 0x22, 0xAC, 0x35,
0x50, 0xE2, 0x96, 0x2A, 0x59, 0x63, 0x9B, 0x13, 0x32, 0x15, 0x64, 0x22, 0xF7, 0x88, 0xB9, 0xC1,
0x6D, 0x40, 0x13, 0x5E, 0xFD, 0x1B, 0xA9, 0x41, 0x47, 0x75, 0x05, 0x75, 0xE6, 0x36, 0xB6, 0xEB,
0xC6, 0x18, 0x73, 0x4C, 0x91, 0xC1, 0xD1, 0xBF, 0x3E, 0xDC, 0x2A, 0x46, 0xA4, 0x39, 0x01, 0x66,
0x8E, 0x0F, 0xFC, 0x13, 0x67, 0x74, 0x08, 0x0E, 0x88, 0x80, 0x44, 0xF6, 0xA1, 0xE6, 0x5D, 0xC9,
0xAA, 0xA8, 0x92, 0x8D, 0xAC, 0xBE, 0xB0, 0xDB, 0x55, 0xEA, 0x35, 0x14, 0x68, 0x6C, 0x6A, 0x73,
0x2C, 0xEF, 0x55, 0xEE, 0x27, 0xCF, 0x87, 0x7F, 0x11, 0x06, 0x52, 0x69, 0x4A, 0x0E, 0x34, 0x84,
0xC8, 0x55, 0xD8, 0x82, 0xAE, 0x19, 0x16, 0x74, 0xE2, 0x5C, 0x29, 0x62, 0x05, 0xBB, 0xB5, 0x99,
0x45, 0x51, 0x76, 0xFD, 0xD7, 0xBB, 0xC5, 0x49, 0xF2, 0x7B, 0xA5, 0xFE, 0x35, 0x33, 0x6F, 0x7E,
0x29, 0xE6, 0x8D, 0x78, 0x39, 0x73, 0x19, 0x94, 0x36, 0x63, 0x3C, 0x67, 0xEE, 0x5A, 0x68, 0x0F,
0x05, 0x16, 0x0E, 0xD1, 0x2D, 0x16, 0x65, 0xEC, 0x83, 0xD1, 0x99, 0x7F, 0x10, 0xFD, 0x05, 0xBB,
0xDB, 0xF9, 0x43, 0x3E, 0x8F, 0x79, 0x7A, 0xEE, 0x3E, 0x9F, 0x02, 0xA3, 0x42, 0x28, 0xAC, 0xE9,
0x27, 0xAB, 0xE6, 0x2B, 0x8B, 0x92, 0x81, 0xAD, 0x08, 0xD3, 0xDF, 0x5C, 0x73, 0x79, 0x68, 0x50,
0x45, 0xD7, 0xBA, 0x5F, 0xCD, 0xE5, 0x86, 0x37},
1,{0x03},{0x16, 0x12, 0x31},
{0xC7, 0x29, 0xCF, 0x2F, 0xD2, 0x62, 0x39, 0x4A, 0xBC, 0x4C, 0xC1, 0x73, 0x50, 0x65, 0x02, 0x44,
0x6A, 0xA9, 0xB9, 0xFD}
};
EMV_CAPK capk_DPAS_v04 = {
{0xA0, 0x00, 0x00, 0x01, 0x52}, //Registered Application Provider Identifier
0x04, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
176, //Length of Module
//Module
{0x8E, 0xEE, 0xC0, 0xD6, 0xD3, 0x85, 0x7F, 0xD5, 0x58, 0x28, 0x5E, 0x49, 0xB6, 0x23, 0xB1, 0x09,
0xE6, 0x77, 0x4E, 0x06, 0xE9, 0x47, 0x6F, 0xE1, 0xB2, 0xFB, 0x27, 0x36, 0x85, 0xB5, 0xA2, 0x35,
0xE9, 0x55, 0x81, 0x0A, 0xDD, 0xB5, 0xCD, 0xCC, 0x2C, 0xB6, 0xE1, 0xA9, 0x7A, 0x07, 0x08, 0x9D,
0x7F, 0xDE, 0x0A, 0x54, 0x8B, 0xDC, 0x62, 0x21, 0x45, 0xCA, 0x2D, 0xE3, 0xC7, 0x3D, 0x6B, 0x14,
0xF2, 0x84, 0xB3, 0xDC, 0x1F, 0xA0, 0x56, 0xFC, 0x0F, 0xB2, 0x81, 0x8B, 0xCD, 0x7C, 0x85, 0x2F,
0x0C, 0x97, 0x96, 0x31, 0x69, 0xF0, 0x14, 0x83, 0xCE, 0x1A, 0x63, 0xF0, 0xBF, 0x89, 0x9D, 0x41,
0x2A, 0xB6, 0x7C, 0x5B, 0xBD, 0xC8, 0xB4, 0xF6, 0xFB, 0x9A, 0xBB, 0x57, 0xE9, 0x51, 0x25, 0x36,
0x3D, 0xBD, 0x8F, 0x5E, 0xBA, 0xA9, 0xB7, 0x4A, 0xDB, 0x93, 0x20, 0x20, 0x50, 0x34, 0x18, 0x33,
0xDE, 0xE8, 0xE3, 0x8D, 0x28, 0xBD, 0x17, 0x5C, 0x83, 0xA6, 0xEA, 0x72, 0x0C, 0x26, 0x26, 0x82,
0xBE, 0xAB, 0xEA, 0x8E, 0x95, 0x5F, 0xE6, 0x7B, 0xD9, 0xC2, 0xEF, 0xF7, 0xCB, 0x9A, 0x9F, 0x45,
0xDD, 0x5B, 0xDA, 0x4A, 0x1E, 0xEF, 0xB1, 0x48, 0xBC, 0x44, 0xFF, 0xF6, 0x8D, 0x93, 0x29, 0xFD},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0x17, 0xF9, 0x71, 0xCA, 0xF6, 0xB7, 0x08, 0xE5, 0xB9, 0x16, 0x53, 0x31, 0xFB, 0xA9, 0x15, 0x93,
0xD0, 0xC0, 0xBF, 0x66}
};
EMV_CAPK capk_DPAS_v05 = {
{0xA0, 0x00, 0x00, 0x01, 0x52}, //Registered Application Provider Identifier
0x05, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
248, //Length of Module
//Module
{0xE1, 0x20, 0x0E, 0x9F, 0x44, 0x28, 0xEB, 0x71, 0xA5, 0x26, 0xD6, 0xBB, 0x44, 0xC9, 0x57, 0xF1,
0x8F, 0x27, 0xB2, 0x0B, 0xAC, 0xE9, 0x78, 0x06, 0x1C, 0xCE, 0xF2, 0x35, 0x32, 0xDB, 0xEB, 0xFA,
0xF6, 0x54, 0xA1, 0x49, 0x70, 0x1C, 0x14, 0xE6, 0xA2, 0xA7, 0xC2, 0xEC, 0xAC, 0x4C, 0x92, 0x13,
0x5B, 0xE3, 0xE9, 0x25, 0x83, 0x31, 0xDD, 0xB0, 0x96, 0x7C, 0x3D, 0x1D, 0x37, 0x5B, 0x99, 0x6F,
0x25, 0xB7, 0x78, 0x11, 0xCC, 0xCC, 0x06, 0xA1, 0x53, 0xB4, 0xCE, 0x69, 0x90, 0xA5, 0x1A, 0x02,
0x58, 0xEA, 0x84, 0x37, 0xED, 0xBE, 0xB7, 0x01, 0xCB, 0x1F, 0x33, 0x59, 0x93, 0xE3, 0xF4, 0x84,
0x58, 0xBC, 0x11, 0x94, 0xBA, 0xD2, 0x9B, 0xF6, 0x83, 0xD5, 0xF3, 0xEC, 0xB9, 0x84, 0xE3, 0x1B,
0x7B, 0x9D, 0x2F, 0x6D, 0x94, 0x7B, 0x39, 0xDE, 0xDE, 0x02, 0x79, 0xEE, 0x45, 0xB4, 0x7F, 0x2F,
0x3D, 0x4E, 0xEE, 0xF9, 0x3F, 0x92, 0x61, 0xF8, 0xF5, 0xA5, 0x71, 0xAF, 0xBF, 0xB5, 0x69, 0xC1,
0x50, 0x37, 0x0A, 0x78, 0xF6, 0x68, 0x3D, 0x68, 0x7C, 0xB6, 0x77, 0x77, 0x7B, 0x2E, 0x7A, 0xBE,
0xFC, 0xFC, 0x8F, 0x5F, 0x93, 0x50, 0x17, 0x36, 0x99, 0x7E, 0x83, 0x10, 0xEE, 0x0F, 0xD8, 0x7A,
0xFA, 0xC5, 0xDA, 0x77, 0x2B, 0xA2, 0x77, 0xF8, 0x8B, 0x44, 0x45, 0x9F, 0xCA, 0x56, 0x35, 0x55,
0x01, 0x7C, 0xD0, 0xD6, 0x67, 0x71, 0x43, 0x7F, 0x8B, 0x66, 0x08, 0xAA, 0x1A, 0x66, 0x5F, 0x88,
0xD8, 0x46, 0x40, 0x3E, 0x4C, 0x41, 0xAF, 0xEE, 0xDB, 0x97, 0x29, 0xC2, 0xB2, 0x51, 0x1C, 0xFE,
0x22, 0x8B, 0x50, 0xC1, 0xB1, 0x52, 0xB2, 0xA6, 0x0B, 0xBF, 0x61, 0xD8, 0x91, 0x3E, 0x08, 0x62,
0x10, 0x02, 0x3A, 0x3A, 0xA4, 0x99, 0xE4, 0x23},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0x12, 0xBC, 0xD4, 0x07, 0xB6, 0xE6, 0x27, 0xA7, 0x50, 0xFD, 0xF6, 0x29, 0xEE, 0x8C, 0x2C, 0x9C,
0xC7, 0xBA, 0x63, 0x6A}
};
EMV_CAPK capk_CARNET_v01 = {
{0xA0, 0x00, 0x00, 0x07, 0x24}, //Registered Application Provider Identifier
0x01, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
176, //Length of Module
//Module
{0xAE, 0x0B, 0x89, 0x75, 0x5F, 0x05, 0x09, 0xF1, 0x11, 0xFD, 0xF7, 0xCD, 0xBA, 0xBE, 0x04, 0x91,
0xA2, 0xE3, 0xA6, 0xA7, 0x78, 0xA0, 0xFC, 0xB1, 0x74, 0x4C, 0x54, 0x45, 0x74, 0x9F, 0xE9, 0x40,
0x7E, 0x5B, 0xDE, 0x86, 0xD4, 0x02, 0xDC, 0x63, 0xBA, 0xE9, 0x99, 0xBD, 0x66, 0x98, 0x13, 0x21,
0x81, 0xBE, 0x2A, 0xAD, 0x0B, 0x96, 0xC9, 0xBE, 0xBA, 0x11, 0xA5, 0x21, 0xB1, 0x65, 0x16, 0x5A,
0xA4, 0x00, 0x57, 0x29, 0x2F, 0x79, 0xF7, 0x32, 0x97, 0x24, 0xD1, 0x78, 0xAF, 0x18, 0xFC, 0x34,
0x2B, 0xB8, 0xB5, 0x8D, 0x1D, 0xD8, 0x4F, 0xF4, 0x48, 0x47, 0x05, 0x6B, 0xF1, 0x7F, 0x66, 0x30,
0x75, 0x00, 0x22, 0x85, 0x58, 0xD8, 0x47, 0x67, 0x8F, 0x9F, 0xA4, 0x62, 0xE2, 0x90, 0xF3, 0xDF,
0xD8, 0x98, 0xF1, 0x13, 0x81, 0xBA, 0x17, 0x10, 0xB9, 0x4D, 0x42, 0xF1, 0x60, 0x78, 0x0D, 0x0F,
0x60, 0xA9, 0x09, 0x51, 0x66, 0x53, 0x97, 0x8A, 0xE7, 0x50, 0x56, 0x8B, 0x39, 0x60, 0x07, 0x10,
0x92, 0x63, 0x35, 0x30, 0xC0, 0x53, 0xFF, 0xB7, 0x09, 0x7E, 0xFB, 0xF1, 0x40, 0xAF, 0xCB, 0x19,
0x68, 0x61, 0xA0, 0xDA, 0x94, 0xEC, 0xDA, 0xC8, 0xD3, 0x36, 0xBE, 0x97, 0xB8, 0xE9, 0xAF, 0xB7},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0x60, 0x2A, 0x4C, 0xAB, 0x60, 0x84, 0xC4, 0x93, 0xF0, 0x1B, 0x29, 0xAB, 0x41, 0xF3, 0x14, 0x0B,
0x85, 0xEA, 0xBB, 0xEF}
};
EMV_CAPK capk_CARNET_v02 = {
{0xA0, 0x00, 0x00, 0x07, 0x24}, //Registered Application Provider Identifier
0x02, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
248, //Length of Module
//Module
{0xAA, 0xBB, 0x50, 0x4E, 0x3B, 0x2C, 0xC6, 0x1F, 0x24, 0x3A, 0x6B, 0xE3, 0xBF, 0xB1, 0x8B, 0x64,
0x9E, 0x17, 0xED, 0x62, 0x5F, 0x1F, 0x8E, 0xE0, 0x47, 0x04, 0x87, 0x3A, 0xD6, 0x05, 0x64, 0xB2,
0x2A, 0x1B, 0x02, 0x58, 0xEA, 0x1D, 0x25, 0xBA, 0x7A, 0x19, 0xF5, 0x3D, 0x59, 0xE5, 0xFC, 0x60,
0xE8, 0x5C, 0xE1, 0x53, 0x5F, 0x99, 0x77, 0x4A, 0xCA, 0x94, 0xA6, 0x36, 0xF4, 0x30, 0xF0, 0xA0,
0xE7, 0xE9, 0x8B, 0xD5, 0x73, 0x84, 0x75, 0xC6, 0x6E, 0xBF, 0xED, 0x3F, 0xF4, 0x22, 0x0E, 0xF8,
0x34, 0x7D, 0x20, 0x3B, 0xF3, 0x64, 0x07, 0x14, 0xD4, 0x71, 0x32, 0xAA, 0xC8, 0x27, 0x61, 0x45,
0xDB, 0xA2, 0x9A, 0x05, 0x5C, 0xFE, 0x14, 0x76, 0xCF, 0x8C, 0xB0, 0xAD, 0x90, 0xA4, 0xFF, 0xA7,
0x6F, 0x58, 0xA8, 0xCD, 0x24, 0x33, 0xB8, 0x02, 0x82, 0x9C, 0xD7, 0xE4, 0x9A, 0xB1, 0x01, 0x23,
0xB8, 0x3E, 0x8B, 0xA1, 0xE9, 0x0D, 0x55, 0x66, 0x07, 0xDF, 0x12, 0x8F, 0x73, 0x42, 0x46, 0x72,
0x30, 0xE3, 0x0B, 0x8C, 0x34, 0x71, 0x37, 0xCD, 0x10, 0x6E, 0x21, 0x2D, 0x30, 0xE9, 0xBD, 0x58,
0x67, 0xD7, 0x23, 0x2B, 0x42, 0x5B, 0x3F, 0x64, 0x4F, 0x02, 0xD7, 0x1F, 0xED, 0x7A, 0x3C, 0x3C,
0xCA, 0x67, 0xBE, 0x4C, 0x04, 0xBC, 0x71, 0x1C, 0x4B, 0x32, 0xDF, 0x8F, 0x71, 0x94, 0x76, 0x5C,
0x65, 0x56, 0x6B, 0x2E, 0x27, 0xCB, 0x86, 0xDE, 0xB4, 0x9E, 0xA0, 0xE2, 0xF6, 0x5B, 0x80, 0xD5,
0x4D, 0xBE, 0x92, 0x3C, 0x42, 0x10, 0x27, 0x41, 0x3B, 0xAA, 0x3B, 0x93, 0x51, 0x7E, 0xE0, 0x86,
0x31, 0xD5, 0x8D, 0x00, 0x09, 0x8B, 0xA2, 0x23, 0x72, 0x92, 0x13, 0x21, 0xC4, 0x0C, 0xC5, 0x11,
0x53, 0x46, 0x58, 0x7E, 0xD4, 0x36, 0xA1, 0x81},
1, //Length of exponent
{0x03}, //Exponent
{0x49, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0x15, 0xC4, 0x8D, 0xAD, 0x19, 0xDB, 0x50, 0x2A, 0xB3, 0x97, 0x64, 0x7A, 0x38, 0xA0, 0x75, 0x5E,
0x0F, 0xD0, 0xCB, 0x39}
};
//CARNET Live Key C1
EMV_CAPK capk_CARNET_vC1 = {
{0xA0, 0x00, 0x00, 0x07, 0x24}, //Registered Application Provider Identifier
0xC1, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
176, //Length of Module
//Module
{0xC7, 0x1B, 0x64, 0x53, 0x81, 0x63, 0x5A, 0x88, 0x87, 0xE4, 0xFF, 0x56, 0xC8, 0x66, 0xEA, 0x5F,
0x6E, 0x4B, 0xBE, 0x1C, 0x1C, 0xA0, 0xA5, 0x20, 0xEB, 0x1D, 0xFB, 0x94, 0x15, 0x0B, 0x50, 0xEA,
0x36, 0x68, 0x85, 0x93, 0xF7, 0xF6, 0xF5, 0x18, 0x9E, 0x74, 0x7F, 0x22, 0x45, 0x4C, 0xA6, 0x42,
0x1E, 0xE8, 0x3B, 0x33, 0x4F, 0x39, 0xC9, 0x9F, 0x59, 0x80, 0x53, 0x19, 0x4A, 0xE5, 0xB1, 0x55,
0xCD, 0x8D, 0xB5, 0xFE, 0x9B, 0x3A, 0x86, 0xDE, 0x5F, 0x41, 0x62, 0xA2, 0x73, 0xBD, 0xB8, 0xFD,
0x1A, 0x03, 0x14, 0xDD, 0xD3, 0x15, 0x66, 0x5B, 0x3D, 0xAD, 0x51, 0xF2, 0x4F, 0xDF, 0xDA, 0xA6,
0x6F, 0xF4, 0x9B, 0x30, 0x81, 0x90, 0x6C, 0xDC, 0x1C, 0x5A, 0xF7, 0xAF, 0xE7, 0xC4, 0xD0, 0xF0,
0x21, 0x22, 0x50, 0xC5, 0xC6, 0xFA, 0x41, 0x59, 0xB2, 0xC9, 0x37, 0xB3, 0xED, 0x00, 0xB5, 0xE5,
0x52, 0x47, 0x96, 0xF0, 0x6C, 0xF7, 0x9C, 0xE1, 0x91, 0xFF, 0xDC, 0x0A, 0x6E, 0x6D, 0x70, 0x04,
0xCA, 0xFD, 0xCA, 0x1B, 0x8B, 0xDA, 0xF2, 0xDF, 0x32, 0xDB, 0x86, 0xDE, 0x45, 0xCD, 0x7F, 0xB4,
0x77, 0x60, 0x74, 0x19, 0xE9, 0xC1, 0x2E, 0x29, 0xBA, 0xDC, 0xA9, 0xFB, 0x70, 0x11, 0xDA, 0xFF},
1, //Length of exponent
{0x03}, //Exponent
{0x35, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0x65, 0x50, 0x56, 0xA4, 0x91, 0x91, 0xFA, 0x5B, 0xE0, 0x42, 0x0D, 0x40, 0x98, 0x5C, 0xAD, 0x67,
0x31, 0x9F, 0xEE, 0x24}
};
//CARNET Live Key C2
EMV_CAPK capk_CARNET_vC2 = {
{0xA0, 0x00, 0x00, 0x07, 0x24}, //Registered Application Provider Identifier
0xC2, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
248, //Length of Module
//Module
{0x91, 0xE3, 0x21, 0x5B, 0x11, 0x7D, 0x30, 0x01, 0x96, 0xF5, 0xA1, 0x69, 0xF6, 0x51, 0x1B, 0x63,
0x69, 0x69, 0x91, 0xEA, 0xA6, 0xE2, 0xA6, 0x24, 0x3C, 0x60, 0xE5, 0x11, 0xA5, 0xCA, 0xCF, 0x6C,
0xBB, 0xE0, 0x20, 0x69, 0xAD, 0x4B, 0xF5, 0x10, 0x37, 0xF8, 0x9A, 0x02, 0x79, 0x3D, 0xB5, 0xEC,
0x5F, 0xBA, 0xC5, 0x13, 0x3A, 0xFF, 0x2A, 0x80, 0x4E, 0xDA, 0x69, 0x2B, 0xE6, 0xB6, 0x97, 0x39,
0x07, 0x59, 0x7D, 0x7E, 0x8B, 0x58, 0x47, 0xC4, 0x98, 0xFB, 0xFC, 0xE7, 0x11, 0xC5, 0xC2, 0x51,
0x33, 0x70, 0x17, 0x24, 0x26, 0xD4, 0x3E, 0x88, 0xC1, 0xC9, 0xDD, 0xA1, 0x1E, 0xC2, 0x92, 0xF1,
0xFD, 0x3B, 0xCE, 0xD0, 0x17, 0x5E, 0x72, 0x96, 0x61, 0x95, 0x2A, 0x9A, 0xE7, 0x05, 0x3F, 0x7D,
0xEE, 0x34, 0xED, 0x39, 0xC6, 0x30, 0x74, 0x7E, 0xD3, 0xED, 0x2A, 0x5A, 0xDA, 0x6E, 0xD5, 0xB8,
0x15, 0x05, 0x69, 0x7B, 0x21, 0x89, 0x62, 0x3C, 0xFA, 0x24, 0x2E, 0xC0, 0xDD, 0x6D, 0xEC, 0x01,
0xFD, 0x58, 0x31, 0xF4, 0x43, 0x62, 0x5C, 0x57, 0x97, 0x6E, 0x95, 0xCC, 0xB4, 0xC7, 0xB3, 0x61,
0x6D, 0xBB, 0x91, 0x4B, 0xB6, 0xE9, 0x35, 0x49, 0x8C, 0xB1, 0xC5, 0x4D, 0xFA, 0x3E, 0x8D, 0xCD,
0xB6, 0x5B, 0xD5, 0x00, 0x47, 0x62, 0xA8, 0xB7, 0xB6, 0xF8, 0x8F, 0xE4, 0x2B, 0xA0, 0xD4, 0x2A,
0x79, 0x0D, 0xA4, 0x00, 0xA4, 0x33, 0x40, 0x7A, 0x3C, 0x6B, 0x96, 0x80, 0x83, 0x7B, 0xB3, 0xA7,
0x52, 0x9E, 0x54, 0xF1, 0x3D, 0x2D, 0xB8, 0xD4, 0x00, 0x68, 0x85, 0x70, 0x0C, 0x3A, 0x48, 0x76,
0x2B, 0xA3, 0x9B, 0x2D, 0xC9, 0x03, 0x96, 0x23, 0x48, 0xE1, 0x3E, 0x06, 0x89, 0x42, 0x85, 0xA6,
0x1E, 0x6B, 0xF0, 0x3A, 0xC6, 0xF8, 0xC5, 0xDF},
1, //Length of exponent
{0x03}, //Exponent
{0x35, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0xA6, 0x64, 0xB9, 0x2A, 0xCD, 0xA5, 0x13, 0x0F, 0x44, 0x4A, 0x58, 0x4A, 0xF7, 0x22, 0x01, 0x66,
0x4E, 0xFB, 0xC9, 0xF6}
};
//CARNET Live Key 12
EMV_CAPK capk_CARNET_v12 = {
{0xA0, 0x00, 0x00, 0x07, 0x24}, //Registered Application Provider Identifier
0x12, //Key Index
0x01, //Hash arithmetic indicator
0x01, //RSA arithmetic indicator
176, //Length of Module
//Module
{0xAD, 0xF0, 0x5C, 0xD4, 0xC5, 0xB4, 0x90, 0xB0, 0x87, 0xC3, 0x46, 0x7B, 0x0F, 0x30, 0x43, 0x75,
0x04, 0x38, 0x84, 0x84, 0x61, 0x28, 0x8B, 0xFE, 0xFD, 0x61, 0x98, 0xDD, 0x57, 0x6D, 0xC3, 0xAD,
0x7A, 0x7C, 0xFA, 0x07, 0xDB, 0xA1, 0x28, 0xC2, 0x47, 0xA8, 0xEA, 0xB3, 0x0D, 0xC3, 0xA3, 0x0B,
0x02, 0xFC, 0xD7, 0xF1, 0xC8, 0x16, 0x79, 0x65, 0x46, 0x36, 0x26, 0xFE, 0xFF, 0x8A, 0xB1, 0xAA,
0x61, 0xA4, 0xB9, 0xAE, 0xF0, 0x9E, 0xE1, 0x2B, 0x00, 0x98, 0x42, 0xA1, 0xAB, 0xA0, 0x1A, 0xDB,
0x4A, 0x2B, 0x17, 0x06, 0x68, 0x78, 0x1E, 0xC9, 0x2B, 0x60, 0xF6, 0x05, 0xFD, 0x12, 0xB2, 0xB2,
0xA6, 0xF1, 0xFE, 0x73, 0x4B, 0xE5, 0x10, 0xF6, 0x0D, 0xC5, 0xD1, 0x89, 0xE4, 0x01, 0x45, 0x1B,
0x62, 0xB4, 0xE0, 0x68, 0x51, 0xEC, 0x20, 0xEB, 0xFF, 0x45, 0x22, 0xAA, 0xCC, 0x2E, 0x9C, 0xDC,
0x89, 0xBC, 0x5D, 0x8C, 0xDE, 0x5D, 0x63, 0x3C, 0xFD, 0x77, 0x22, 0x0F, 0xF6, 0xBB, 0xD4, 0xA9,
0xB4, 0x41, 0x47, 0x3C, 0xC3, 0xC6, 0xFE, 0xFC, 0x8D, 0x13, 0xE5, 0x7C, 0x3D, 0xE9, 0x7E, 0x12,
0x69, 0xFA, 0x19, 0xF6, 0x55, 0x21, 0x5B, 0x23, 0x56, 0x3E, 0xD1, 0xD1, 0x86, 0x0D, 0x86, 0x81},
1, //Length of exponent
{0x03}, //Exponent
{0x35, 0x12, 0x31}, //Expiration Date (YYMMDD)
//Check Sum of Key
{0x87, 0x4B, 0x37, 0x9B, 0x7F, 0x60, 0x7D, 0xC1, 0xCA, 0xF8, 0x7A, 0x19, 0xE4, 0x00, 0xB6, 0xA9,
0xE2, 0x51, 0x63, 0xE8}
};
Editor is loading...
Leave a Comment