CWA 16926-6:2022
(Main)Extensions for Financial Services (XFS) interface specification Release 3.50 - Part 6: PIN Keypad Device Class Interface - Programmer’s Reference
Extensions for Financial Services (XFS) interface specification Release 3.50 - Part 6: PIN Keypad Device Class Interface - Programmer’s Reference
This section describes the application program interface for personal identification number keypads (PIN pads) and other encryption/decryption devices. This description includes definitions of the service-specific commands that can be issued, using the WFSAsyncExecute, WFSExecute, WFSGetInfo and WFSAsyncGetInfo functions.
This section describes the general interface for the following functions:
• Administration of encryption devices
• Loading of encryption keys
• Encryption / decryption
• Entering Personal Identification Numbers (PINs)
• PIN verification
• PIN block generation (encrypted PIN)
• Clear text data handling
• Function key handling
• PIN presentation to chipcard
• Read and write safety critical Terminal Data from/to HSM
• HSM and Chipcard Authentication
• EMV 4.0 PIN blocks, EMV 4.0 public key loading, static and dynamic data verification
If the PIN pad device has local display capability, display handling should be handled using the Text Terminal Unit (TTU) interface.
The adoption of this specification does not imply the adoption of a specific security standard.
Important Notes:
• This revision of this specification does not define all key management procedures; some key management is still vendor-specific.
• Key space management is customer-specific, and is therefore handled by vendor-specific mechanisms.
• Only numeric PIN pads are handled in this specification.
This specification also supports the Hardware Security Module (HSM), which is necessary for the German ZKA Electronic Purse transactions. Furthermore, the HSM stores terminal specific data.
This data will be compared against the message data fields (Sent and Received ISO8583 messages) prior to HSM-MAC generation/verification. HSM-MACs are generated/verified only if the message fields match the data stored.
Keys used for cryptographic HSM functions are stored separate from other keys. This must be considered when importing keys.
This version of PIN pad complies to the current ZKA specification 3.0. It supports loading and unloading against card account for both card types (Type 0 and Type 1) of the ZKA electronic purse. It also covers the necessary functionality for ‘Loading against other legal tender’.
Key values are passed to the API as binary hexadecimal values. When hex values are passed to the API within strings, the hex digits 0xA to 0xF can be represented by characters in the ranges ‘a’ to ‘f’ or ‘A’ to ‘F’.
The following commands and events were initially added to support the German ZKA standard, but may also be used for other national standards:
• WFS_INF_PIN_HSM_TDATA
• WFS_CMD_PIN_HSM_SET_TDATA
• WFS_CMD_PIN_SECURE_MSG_SEND
• WFS_CMD_PIN_SECURE_MSG_RECEIVE
• WFS_CMD_PIN_GET_JOURNAL
• WFS_SRVE_PIN_OPT_REQUIRED
• WFS_CMD_PIN_HSM_INIT
• WFS_SRVE_PIN_HSM_TDATA_CHANGED
Specifikacija vmesnika razširitev za finančne storitve (XFS), izdaja 3.50 - 6. del: Vmesnik razreda naprave s tipkovnico PIN - Referenca za programerje
V tem razdelku je opisan vmesnik za programiranje aplikacij za tipkovnice za vnos osebne identifikacijske številke (tipkovnice PIN) in druge naprave za šifriranje/dešifriranje. V tem opisu so vključene definicije ukazov, značilnih za določeno storitev, ki jih je mogoče izdati s funkcijami WFSAsyncExecute, WFSExecute, WFSGetInfo in WFSAsyncGetInfo.
V tem razdelku je opisan splošni vmesnik za naslednje funkcije:
• skrbništvo nad napravami za šifriranje;
• nalaganje šifrirnih ključev;
• šifriranje/dešifriranje;
• vnašanje osebne identifikacijske številke (PIN);
• preverjanje številke PIN;
• generiranje blokade številke PIN (šifrirana številka PIN);
• obdelava podatkov z jasnim besedilom;
• obdelava funkcijskih ključev;
• predstavitev številke PIN kartici s čipom;
• branje in zapisovanje podatkov o terminalu, ključnih za varnost, v varnostni modul za strojno opremo (HSM) in iz njega;
• preverjanje pristnosti varnostnih modulov za strojno opremo in kartic s čipom;
• blokade številke PIN v skladu z EMV 4.0, nalaganje javnih ključev v skladu z EMV 4.0, statično in dinamično preverjanje podatkov.
Če naprava s tipkovnico PIN omogoča lokalni prikaz, naj se to upravlja z vmesnikom tekstovne terminalne enote (TTU).
Sprejetje te specifikacije ne pomeni sprejetja določenega varnostnega standarda.
Pomembne opombe:
• Ta različica specifikacije ne določa vseh postopkov upravljanja ključev, saj je upravljanje ključev še vedno nekoliko vezano na dobavitelja.
• Upravljanje prostora za ključe je vezano na stranko, zato se obravnava z mehanizmi določenega dobavitelja.
• Ta specifikacija obravnava le številske tipkovnice PIN.
Ta specifikacija podpira tudi varnostni modul za strojno opremo, ki je potreben za transakcije prek nemške elektronske denarnice ZKA. V varnostnem modulu za strojno opremo so shranjeni tudi podatki o terminalu.
Ti podatki se pred generiranjem/preverjanjem kode HSM-MAC primerjajo s podatkovnimi polji za sporočila (poslana in prejeta sporočila v skladu s standardom ISO 8583). Kode HSM-MAC so generirane/preverjene le, če se podatkovna polja ujemajo s shranjenimi podatki.
Ključi, ki se uporabljajo za kriptografske funkcije varnostnega modula za strojno opremo, so shranjeni ločeno od drugih ključev. To je treba upoštevati pri uvozu ključev.
Ta različica tipkovnice PIN je skladna s trenutno specifikacijo ZKA 3.0. Podpira polnjenje in praznjenje kartičnega računa za obe vrsti kartic (tip 0 in tip 1) elektronske denarnice ZKA. Zajema tudi potrebne funkcije za »polnjenje drugih zakonitih plačilnih sredstev«.
Vrednosti ključev so posredovane vmesniku za programiranje aplikacij kot binarne šestnajstiške vrednosti. Če so šestnajstiške vrednosti posredovane vmesniku za programiranje aplikacij znotraj nizov, je mogoče šestnajstiške številke od 0xA do 0xF predstaviti z znaki v obsegu od »a« do »f« ali od »A« do »F«.
Naslednji ukazi in dogodki so bili prvotno dodani za podporo nemškega standarda ZKA, vendar se lahko uporabljajo tudi za druge nacionalne standarde:
• WFS_INF_PIN_HSM_TDATA
• WFS_CMD_PIN_HSM_SET_TDATA
• WFS_CMD_PIN_SECURE_MSG_SEND
• WFS_CMD_PIN_SECURE_MSG_RECEIVE
• WFS_CMD_PIN_GET_JOURNAL
• WFS_SRVE_PIN_OPT_REQUIRED
• WFS_CMD_PIN_HSM_INIT
• WFS_SRVE_PIN_HSM_TDATA_CHANGED
General Information
Standards Content (Sample)
SLOVENSKI STANDARD
SIST CWA 16926-6:2023
01-marec-2023
Specifikacija vmesnika razširitev za finančne storitve (XFS), izdaja 3.50 - 6. del:
Vmesnik razreda naprave s tipkovnico PIN - Referenca za programerje
Extensions for Financial Services (XFS) interface specification Release 3.50 - Part 6:
PIN Keypad Device Class Interface - Programmer’s Reference
Ta slovenski standard je istoveten z: CWA 16926-6:2022
ICS:
35.200 Vmesniška in povezovalna Interface and interconnection
oprema equipment
35.240.15 Identifikacijske kartice. Čipne Identification cards. Chip
kartice. Biometrija cards. Biometrics
35.240.40 Uporabniške rešitve IT v IT applications in banking
bančništvu
SIST CWA 16926-6:2023 en,fr,de
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
SIST CWA 16926-6:2023
SIST CWA 16926-6:2023
CEN
CWA 16926-6
WORKSHOP
December 2022
AGREEMENT
ICS 35.200; 35.240.15; 35.240.40
English version
Extensions for Financial Services (XFS) interface
specification Release 3.50 - Part 6: PIN Keypad Device
Class Interface - Programmer's Reference
This CEN Workshop Agreement has been drafted and approved by a Workshop of representatives of interested parties, the
constitution of which is indicated in the foreword of this Workshop Agreement.
The formal process followed by the Workshop in the development of this Workshop Agreement has been endorsed by the
National Members of CEN but neither the National Members of CEN nor the CEN-CENELEC Management Centre can be held
accountable for the technical content of this CEN Workshop Agreement or possible conflicts with standards or legislation.
This CEN Workshop Agreement can in no way be held as being an official standard developed by CEN and its Members.
This CEN Workshop Agreement is publicly available as a reference document from the CEN Members National Standard Bodies.
CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France,
Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North
Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Türkiye and United Kingdom.
EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION
EUROPÄISCHES KOMITEE FÜR NORMUNG
CEN-CENELEC Management Centre: Rue de la Science 23, B-1040 Brussels
© 2022 CEN All rights of exploitation in any form and by any means reserved worldwide for CEN national Members.
Ref. No.:CWA 16926-6:2022 E
SIST CWA 16926-6:2023
Table of Contents
European Foreword . 6
1. Introduction . 10
1.1 Background to Release 3.50 . 10
1.2 XFS Service-Specific Programming . 10
2. PIN Keypad . 12
2.1 Encrypting Touch Screen (ETS) . 14
3. References . 17
4. Info Commands . 19
4.1 WFS_INF_PIN_STATUS . 19
4.2 WFS_INF_PIN_CAPABILITIES . 23
4.3 WFS_INF_PIN_KEY_DETAIL . 44
4.4 WFS_INF_PIN_FUNCKEY_DETAIL . 46
4.5 WFS_INF_PIN_HSM_TDATA . 49
4.6 WFS_INF_PIN_KEY_DETAIL_EX . 50
4.7 WFS_INF_PIN_SECUREKEY_DETAIL . 53
4.8 WFS_INF_PIN_QUERY_LOGICAL_HSM_DETAIL . 57
4.9 WFS_INF_PIN_QUERY_PCIPTS_DEVICE_ID . 58
4.10 WFS_INF_PIN_GET_LAYOUT . 59
4.11 WFS_INF_PIN_KEY_DETAIL_340 . 63
5. Execute Commands . 65
5.1 Normal PIN Commands . 65
5.1.1 WFS_CMD_PIN_CRYPT . 65
5.1.2 WFS_CMD_PIN_IMPORT_KEY . 68
5.1.3 WFS_CMD_PIN_DERIVE_KEY . 71
5.1.4 WFS_CMD_PIN_GET_PIN . 73
5.1.5 WFS_CMD_PIN_LOCAL_DES . 76
5.1.6 WFS_CMD_PIN_CREATE_OFFSET . 78
5.1.7 WFS_CMD_PIN_LOCAL_EUROCHEQUE . 80
5.1.8 WFS_CMD_PIN_LOCAL_VISA . 82
5.1.9 WFS_CMD_PIN_PRESENT_IDC . 84
5.1.10 WFS_CMD_PIN_GET_PINBLOCK . 86
5.1.11 WFS_CMD_PIN_GET_DATA . 88
5.1.12 WFS_CMD_PIN_INITIALIZATION . 91
5.1.13 WFS_CMD_PIN_LOCAL_BANKSYS . 93
5.1.14 WFS_CMD_PIN_BANKSYS_IO . 94
5.1.15 WFS_CMD_PIN_RESET . 95
5.1.16 WFS_CMD_PIN_HSM_SET_TDATA . 96
5.1.17 WFS_CMD_PIN_SECURE_MSG_SEND . 98
5.1.18 WFS_CMD_PIN_SECURE_MSG_RECEIVE . 100
5.1.19 WFS_CMD_PIN_GET_JOURNAL . 102
5.1.20 WFS_CMD_PIN_IMPORT_KEY_EX . 103
5.1.21 WFS_CMD_PIN_ENC_IO . 106
5.1.22 WFS_CMD_PIN_HSM_INIT. 108
5.1.23 WFS_CMD_PIN_SECUREKEY_ENTRY . 109
SIST CWA 16926-6:2023
5.1.24 WFS_CMD_PIN_GENERATE_KCV . 112
5.1.25 WFS_CMD_PIN_SET_GUIDANCE_LIGHT . 113
5.1.26 WFS_CMD_PIN_MAINTAIN_PIN . 115
5.1.27 WFS_CMD_PIN_KEYPRESS_BEEP . 116
5.1.28 WFS_CMD_PIN_SET_PINBLOCK_DATA . 117
5.1.29 WFS_CMD_PIN_SET_LOGICAL_HSM . 118
5.1.30 WFS_CMD_PIN_IMPORT_KEYBLOCK . 119
5.1.31 WFS_CMD_PIN_POWER_SAVE_CONTROL . 120
5.1.32 WFS_CMD_PIN_DEFINE_LAYOUT . 121
5.1.33 WFS_CMD_PIN_START_AUTHENTICATE . 122
5.1.34 WFS_CMD_PIN_AUTHENTICATE . 124
5.1.35 WFS_CMD_PIN_GET_PINBLOCK_EX . 127
5.1.36 WFS_CMD_PIN_SYNCHRONIZE_COMMAND . 129
5.1.37 WFS_CMD_PIN_CRYPT_340 . 130
5.1.38 WFS_CMD_PIN_GET_PINBLOCK_340. 134
5.1.39 WFS_CMD_PIN_IMPORT_KEY_340 . 136
5.2 Common commands for Remote Key Loading Schemes . 139
5.2.1 WFS_CMD_PIN_START_KEY_EXCHANGE. 139
5.3 Remote Key Loading Using Signatures . 140
5.3.1 WFS_CMD_PIN_IMPORT_RSA_PUBLIC_KEY . 140
5.3.2 WFS_CMD_PIN_EXPORT_RSA_ISSUER_SIGNED_ITEM . 143
5.3.3 WFS_CMD_PIN_IMPORT_RSA_SIGNED_DES_KEY . 145
5.3.4 WFS_CMD_PIN_GENERATE_RSA_KEY_PAIR . 148
5.3.5 WFS_CMD_PIN_EXPORT_RSA_EPP_SIGNED_ITEM . 150
5.4 Remote Key Loading with Certificates . 152
5.4.1 WFS_CMD_PIN_LOAD_CERTIFICATE . 152
5.4.2 WFS_CMD_PIN_GET_CERTIFICATE . 153
5.4.3 WFS_CMD_PIN_REPLACE_CERTIFICATE . 154
5.4.4 WFS_CMD_PIN_IMPORT_RSA_ENCIPHERED_PKCS7_KEY . 155
5.4.5 WFS_CMD_PIN_LOAD_CERTIFICATE_EX . 157
5.4.6 WFS_CMD_PIN_IMPORT_RSA_ENCIPHERED_PKCS7_KEY_EX . 159
5.5 EMV . 162
5.5.1 WFS_CMD_PIN_EMV_IMPORT_PUBLIC_KEY . 162
5.5.2 WFS_CMD_PIN_DIGEST . 165
5.6 Entering and Changing a Password . 166
5.6.1 WFS_CMD_PIN_PASSWORD_ENTRY . 166
6. Events . 170
6.1 WFS_EXEE_PIN_KEY . 170
6.2 WFS_SRVE_PIN_INITIALIZED . 171
6.3 WFS_SRVE_PIN_ILLEGAL_KEY_ACCESS . 172
6.4 WFS_SRVE_PIN_OPT_REQUIRED . 173
6.5 WFS_SRVE_PIN_CERTIFICATE_CHANGE . 174
6.6 WFS_SRVE_PIN_HSM_TDATA_CHANGED . 175
6.7 WFS_SRVE_PIN_HSM_CHANGED . 176
6.8 WFS_EXEE_PIN_ENTERDATA . 177
6.9 WFS_SRVE_PIN_DEVICEPOSITION . 178
6.10 WFS_SRVE_PIN_POWER_SAVE_CHANGE . 179
6.11 WFS_EXEE_PIN_LAYOUT . 180
6.12 WFS_EXEE_PIN_DUKPT_KSN . 181
6.13 WFS_SRVE_PIN_PASSWORD_CLEARED . 182
...
SLOVENSKI STANDARD
01-marec-2023
Specifikacija vmesnika razširitev za finančne storitve (XFS), izdaja 3.50 - 6. del:
Vmesnik razreda naprave s tipkovnico PIN - Referenca za programerje
Extensions for Financial Services (XFS) interface specification Release 3.50 - Part 6:
PIN Keypad Device Class Interface - Programmer’s Reference
Ta slovenski standard je istoveten z: CWA 16926-6:2022
ICS:
35.200 Vmesniška in povezovalna Interface and interconnection
oprema equipment
35.240.15 Identifikacijske kartice. Čipne Identification cards. Chip
kartice. Biometrija cards. Biometrics
35.240.40 Uporabniške rešitve IT v IT applications in banking
bančništvu
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
CEN
CWA 16926-6
WORKSHOP
December 2022
AGREEMENT
ICS 35.200; 35.240.15; 35.240.40
English version
Extensions for Financial Services (XFS) interface
specification Release 3.50 - Part 6: PIN Keypad Device
Class Interface - Programmer's Reference
This CEN Workshop Agreement has been drafted and approved by a Workshop of representatives of interested parties, the
constitution of which is indicated in the foreword of this Workshop Agreement.
The formal process followed by the Workshop in the development of this Workshop Agreement has been endorsed by the
National Members of CEN but neither the National Members of CEN nor the CEN-CENELEC Management Centre can be held
accountable for the technical content of this CEN Workshop Agreement or possible conflicts with standards or legislation.
This CEN Workshop Agreement can in no way be held as being an official standard developed by CEN and its Members.
This CEN Workshop Agreement is publicly available as a reference document from the CEN Members National Standard Bodies.
CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France,
Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North
Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Türkiye and United Kingdom.
EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION
EUROPÄISCHES KOMITEE FÜR NORMUNG
CEN-CENELEC Management Centre: Rue de la Science 23, B-1040 Brussels
© 2022 CEN All rights of exploitation in any form and by any means reserved worldwide for CEN national Members.
Ref. No.:CWA 16926-6:2022 E
Table of Contents
European Foreword . 6
1. Introduction . 10
1.1 Background to Release 3.50 . 10
1.2 XFS Service-Specific Programming . 10
2. PIN Keypad . 12
2.1 Encrypting Touch Screen (ETS) . 14
3. References . 17
4. Info Commands . 19
4.1 WFS_INF_PIN_STATUS . 19
4.2 WFS_INF_PIN_CAPABILITIES . 23
4.3 WFS_INF_PIN_KEY_DETAIL . 44
4.4 WFS_INF_PIN_FUNCKEY_DETAIL . 46
4.5 WFS_INF_PIN_HSM_TDATA . 49
4.6 WFS_INF_PIN_KEY_DETAIL_EX . 50
4.7 WFS_INF_PIN_SECUREKEY_DETAIL . 53
4.8 WFS_INF_PIN_QUERY_LOGICAL_HSM_DETAIL . 57
4.9 WFS_INF_PIN_QUERY_PCIPTS_DEVICE_ID . 58
4.10 WFS_INF_PIN_GET_LAYOUT . 59
4.11 WFS_INF_PIN_KEY_DETAIL_340 . 63
5. Execute Commands . 65
5.1 Normal PIN Commands . 65
5.1.1 WFS_CMD_PIN_CRYPT . 65
5.1.2 WFS_CMD_PIN_IMPORT_KEY . 68
5.1.3 WFS_CMD_PIN_DERIVE_KEY . 71
5.1.4 WFS_CMD_PIN_GET_PIN . 73
5.1.5 WFS_CMD_PIN_LOCAL_DES . 76
5.1.6 WFS_CMD_PIN_CREATE_OFFSET . 78
5.1.7 WFS_CMD_PIN_LOCAL_EUROCHEQUE . 80
5.1.8 WFS_CMD_PIN_LOCAL_VISA . 82
5.1.9 WFS_CMD_PIN_PRESENT_IDC . 84
5.1.10 WFS_CMD_PIN_GET_PINBLOCK . 86
5.1.11 WFS_CMD_PIN_GET_DATA . 88
5.1.12 WFS_CMD_PIN_INITIALIZATION . 91
5.1.13 WFS_CMD_PIN_LOCAL_BANKSYS . 93
5.1.14 WFS_CMD_PIN_BANKSYS_IO . 94
5.1.15 WFS_CMD_PIN_RESET . 95
5.1.16 WFS_CMD_PIN_HSM_SET_TDATA . 96
5.1.17 WFS_CMD_PIN_SECURE_MSG_SEND . 98
5.1.18 WFS_CMD_PIN_SECURE_MSG_RECEIVE . 100
5.1.19 WFS_CMD_PIN_GET_JOURNAL . 102
5.1.20 WFS_CMD_PIN_IMPORT_KEY_EX . 103
5.1.21 WFS_CMD_PIN_ENC_IO . 106
5.1.22 WFS_CMD_PIN_HSM_INIT. 108
5.1.23 WFS_CMD_PIN_SECUREKEY_ENTRY . 109
5.1.24 WFS_CMD_PIN_GENERATE_KCV . 112
5.1.25 WFS_CMD_PIN_SET_GUIDANCE_LIGHT . 113
5.1.26 WFS_CMD_PIN_MAINTAIN_PIN . 115
5.1.27 WFS_CMD_PIN_KEYPRESS_BEEP . 116
5.1.28 WFS_CMD_PIN_SET_PINBLOCK_DATA . 117
5.1.29 WFS_CMD_PIN_SET_LOGICAL_HSM . 118
5.1.30 WFS_CMD_PIN_IMPORT_KEYBLOCK . 119
5.1.31 WFS_CMD_PIN_POWER_SAVE_CONTROL . 120
5.1.32 WFS_CMD_PIN_DEFINE_LAYOUT . 121
5.1.33 WFS_CMD_PIN_START_AUTHENTICATE . 122
5.1.34 WFS_CMD_PIN_AUTHENTICATE . 124
5.1.35 WFS_CMD_PIN_GET_PINBLOCK_EX . 127
5.1.36 WFS_CMD_PIN_SYNCHRONIZE_COMMAND . 129
5.1.37 WFS_CMD_PIN_CRYPT_340 . 130
5.1.38 WFS_CMD_PIN_GET_PINBLOCK_340. 134
5.1.39 WFS_CMD_PIN_IMPORT_KEY_340 . 136
5.2 Common commands for Remote Key Loading Schemes . 139
5.2.1 WFS_CMD_PIN_START_KEY_EXCHANGE. 139
5.3 Remote Key Loading Using Signatures . 140
5.3.1 WFS_CMD_PIN_IMPORT_RSA_PUBLIC_KEY . 140
5.3.2 WFS_CMD_PIN_EXPORT_RSA_ISSUER_SIGNED_ITEM . 143
5.3.3 WFS_CMD_PIN_IMPORT_RSA_SIGNED_DES_KEY . 145
5.3.4 WFS_CMD_PIN_GENERATE_RSA_KEY_PAIR . 148
5.3.5 WFS_CMD_PIN_EXPORT_RSA_EPP_SIGNED_ITEM . 150
5.4 Remote Key Loading with Certificates . 152
5.4.1 WFS_CMD_PIN_LOAD_CERTIFICATE . 152
5.4.2 WFS_CMD_PIN_GET_CERTIFICATE . 153
5.4.3 WFS_CMD_PIN_REPLACE_CERTIFICATE . 154
5.4.4 WFS_CMD_PIN_IMPORT_RSA_ENCIPHERED_PKCS7_KEY . 155
5.4.5 WFS_CMD_PIN_LOAD_CERTIFICATE_EX . 157
5.4.6 WFS_CMD_PIN_IMPORT_RSA_ENCIPHERED_PKCS7_KEY_EX . 159
5.5 EMV . 162
5.5.1 WFS_CMD_PIN_EMV_IMPORT_PUBLIC_KEY . 162
5.5.2 WFS_CMD_PIN_DIGEST . 165
5.6 Entering and Changing a Password . 166
5.6.1 WFS_CMD_PIN_PASSWORD_ENTRY . 166
6. Events . 170
6.1 WFS_EXEE_PIN_KEY . 170
6.2 WFS_SRVE_PIN_INITIALIZED . 171
6.3 WFS_SRVE_PIN_ILLEGAL_KEY_ACCESS . 172
6.4 WFS_SRVE_PIN_OPT_REQUIRED . 173
6.5 WFS_SRVE_PIN_CERTIFICATE_CHANGE . 174
6.6 WFS_SRVE_PIN_HSM_TDATA_CHANGED . 175
6.7 WFS_SRVE_PIN_HSM_CHANGED . 176
6.8 WFS_EXEE_PIN_ENTERDATA . 177
6.9 WFS_SRVE_PIN_DEVICEPOSITION . 178
6.10 WFS_SRVE_PIN_POWER_SAVE_CHANGE . 179
6.11 WFS_EXEE_PIN_LAYOUT . 180
6.12 WFS_EXEE_PIN_DUKPT_KSN . 181
6.13 WFS_SRVE_PIN_PASSWORD_CLEARED .
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.