013/12/29 21:59:14 B85EF0 r skyV13 [videoguard2] IFD: Receive succesful
2013/12/29 21:59:14 B85EF0 r ICC_Async_InvertBuffer: size=1 buf[0]=ff
2013/12/29 21:59:14 B85EF0 r skyV13 [videoguard2] TRACE: SW2: 00
2013/12/29 21:59:14 B85EF0 r skyV13 [videoguard2] Answer from cardreader:
2013/12/29 21:59:14 B85EF0 09 FE D8 CC 03 43 00 86 F9 36 94 51 61 31 CC 8F
2013/12/29 21:59:14 B85EF0 30 7C 07 1E 2E 6E 2B A4 F4 49 DE B6 3C 43 0E 15
2013/12/29 21:59:14 B85EF0 A8 F5 09 F4 BD B9 A6 37 8A C9 B6 0D AE AD 63 72
2013/12/29 21:59:14 B85EF0 AD DA E5 B9 77 87 5A FE BA DD 06 BD 06 DA 6E AB
2013/12/29 21:59:14 B85EF0 86 3A 8B EE 39 F4 2C 5A DE 2A E8 BF 6B 69 A2 46
2013/12/29 21:59:14 B85EF0 8C 7B BF 62 7D DB A5 E8 90 00
2013/12/29 21:59:14 B85EF0 r skyV13 [videoguard2] INS54:
2013/12/29 21:59:14 B85EF0 D3 54 00 00 48
2013/12/29 21:59:14 B85EF0 r skyV13 [videoguard2] Decrypted payload
2013/12/29 21:59:14 B85EF0 93 3C B9 88 0F B2 F5 B6 00 00 00 C7 00 01 22 02
2013/12/29 21:59:14 B85EF0 00 80 0E 02 01 00 0F 04 00 00 00 00 20 04 00 00
2013/12/29 21:59:14 B85EF0 00 00 25 11 00 00 00 00 00 00 00 00 00 00 00 00
2013/12/29 21:59:14 B85EF0 00 00 00 00 00 2A 04 00 C7 00 00 55 01 80 56 08
2013/12/29 21:59:14 B85EF0 00 00 00 00 00 00 00 00
2013/12/29 21:59:14 B85EF0 r skyV13 [videoguard2] cardreader_do_ecm: after csystem.do_ecm rc=1
2013/12/29 21:59:14 B85EF0 r skyV13 [videoguard2] cardreader_do_ecm: ret rc=1
2013/12/29 21:59:14 B85EF0 r skyV13 [videoguard2] cardreader_process_ecm: cardreader_do_ecm returned rc=1 (ERROR=0)
2013/12/29 21:59:14 B85EF0 r skyV13 [videoguard2] ecm hash: 4C50F61A324DCDD32891EB53BBE2B89F real time: 140 ms
2013/12/29 21:59:14 B85EF0 r {client serverbox, caid 09C4, srvid 001D} [write_ecm_answer] cyclecheck passed! Reader: skyV13 rc: 0
2013/12/29 21:59:14 B85EF0 r {client serverbox, caid 09C4, prid 000000, srvid 001D} [write_ecm_answer] reader skyV13 rc 0, ecm time 145 ms (146 ms)
2013/12/29 21:59:14 B85EF0 r start client thread action 32
2013/12/29 21:59:14 B85EF0 r skyV13 [videoguard2] TRACE: ecm answer for ecm hash 4C50F61A324DCDD32891EB53BBE2B89F rc=0
2013/12/29 21:59:14 B941D0 c data from add_job action=32 client c serverbox
2013/12/29 21:59:14 B941D0 c {client serverbox, caid 09C4, prid 000000, srvid 001D} [send_dcw] rc 0 from reader skyV13
2013/12/29 21:59:14 B941D0 c Client serverbox csphash 7F134B63 cw 933CB9880FB2F5B60000000000000000 rc 0 09C4&000000/01F6/001D/B3:4C50F61A324DCDD32891EB53BBE2B89F
2013/12/29 21:59:14 B941D0 c [DVBAPI] Demuxer #0 controlword received for PID #3 CAID 09C4 PROVID 000000 ECMPID 1B4A CHID 01F6 VPID 00FF
2013/12/29 21:59:14 B941D0 c [DVBAPI] Demuxer #0 requested controlword for ecm 4C50F61A324DCDD32891EB53BBE2B89F on fd 16
2013/12/29 21:59:14 B941D0 c [DVBAPI] Demuxer #0 stream #1 CA_SET_PID pid=0x0020 index=0
2013/12/29 21:59:14 B941D0 c [DVBAPI] Demuxer #0 stream #2 CA_SET_PID pid=0x00ff index=0
2013/12/29 21:59:14 B941D0 c [DVBAPI] Demuxer #0 stream #3 CA_SET_PID pid=0x0100 index=0
2013/12/29 21:59:14 B941D0 c [DVBAPI] Demuxer #0 writing odd part (933CB9880FB2F5B6) of controlword, replacing expired (DC355869F0F08A6A)
2013/12/29 21:59:14 B941D0 c [DVBAPI] Demuxer #0 write cw0 index: 0 (ca3)
2013/12/29 21:59:14 B941D0 c serverbox (09C4&000000/01F6/001D/B3:4C50F61A324DCDD32891EB53BBE2B89F): found (148 ms) by skyV13 - RTL Passion
2013/12/29 21:59:14 B941D0 c cw:
2013/12/29 21:59:14 B941D0 93 3C B9 88 0F B2 F5 B6 00 00 00 00 00 00 00 00
2013/12/29 21:59:15 B761B0 h all debug_level=0