UIC Bezel5 Programmer’s Manual
Page.132/166
UDN PM098 Rev. 1.0
Copyright © 2013, Uniform Industrial Corp. All Rights Reserved
6.7.7.
90H 10H – Get Challenge
This command is used to get challenge from the reader.
Command Pocket
Byte 0~1
Command, 90h 10h
RSA Encrypted Response
Response
Byte n
Byte 0~15 +n
Byte 16~35 +n
Padding Data
See Table 6-4
Random
SHA1 (P Exp Len + Exp + Modules
Modules)
Success
The return length is upon RSA key length.
Bad Parameters
*
Padding Frame
Byte 0~1
Byte 2+n
Byte 3+n
00h 02h
Var.
00h
Table 6-4. Get Challenge Padding Frame
6.7.8.
90H 11H – Load Encrypt Initial Key
This command is used to load initial key to device.
Command Pocket
Byte 0~1
Data
Command, 90h 11h
Var. Bytes
Data Format
Data Byte
Field Name
Length
Notes
n
Padding Data
Var.
Padding frame see Table 6-5
16+n
Random
16 Bytes
Issue 90h 10h command to get random.
17+n
Encrypt Mode
1 Byte
See Table 6-6
18+n
DUKPT Key Slot
1 Byte
See Table 6-7