Hi @Kan_Li
RE
ex_sss_boot_open_on_id() can work with any Auth ID not limited to AES Key, you may provision an EC key or a UserID as Authenticated secure object and pass the ID to this API to open an ECKey session or UserID session.
[VZ] I do not consider EC in the question. For UserID you need to supply the UserID at the host side. As ex_sss_boot_open_on_id() does not take UserID as its argument it cannot be possibly used for this. UserID was not in the question either but FYI the best way to open authenticated session on UserID is using these two calls:
Se05x_API_CreateSession()
Se05x_API_VerifySessionUserID()
The workflow is documented in APDU reference document.
For AES ex_sss_boot_open_on_id() cannot be used because it does not take AES key as its argument. So, I have to re-iterate this question. Perhaps you could share working call-flow.
RE
you may create symmetric key in host, sss_key_store_set_key() would check if the key store is a host key store or se05x key store, but the symmetric key in host key store can not be used to open an authenticated session.
[VZ] I will check if I can change the type of the keystore - thanks for this. AES authenticated session is the equivalent of SCP03. You have to have the AES key in host memory to authenticate with a symmetric key. If host key store isn't suitable for this, then which key store is?