diff doc/GrcardSIM2-security-model @ 190:f756bafde7a9

doc/GrcardSIM2-security-model: new grcard2-set-adm5 command
author Mychaela Falconia <falcon@freecalypso.org>
date Sat, 06 Mar 2021 21:14:17 +0000
parents c925f7808285
children 7c24ae2ca648
line wrap: on
line diff
--- a/doc/GrcardSIM2-security-model	Sat Mar 06 21:11:21 2021 +0000
+++ b/doc/GrcardSIM2-security-model	Sat Mar 06 21:14:17 2021 +0000
@@ -45,8 +45,8 @@
 verify-ext 11 XXXXXXXX		# authenticate as ADM11, decimal format
 verify-hex 11 xxxxxxxxxxxxxxxx	# authenticate as ADM11, arbitrary hex format
 
-grcard2-set-adm XXXXXXXX		# set new ADM5, decimal format
-grcard2-set-adm-hex xxxxxxxxxxxxxxxx	# set new ADM5, arbitrary hex format
+grcard2-set-adm5 XXXXXXXX		# set new ADM5, decimal format
+grcard2-set-adm5-hex xxxxxxxxxxxxxxxx	# set new ADM5, arbitrary hex format
 
 grcard2-set-super XXXXXXXX		# set new ADM11, decimal format
 grcard2-set-super-hex xxxxxxxxxxxxxxxx	# set new ADM11, arbitrary hex format
@@ -91,7 +91,7 @@
 grcard2-set-pin2 6666
 grcard2-set-puk1 00099933
 grcard2-set-puk2 00099944
-grcard2-set-adm  55501234
+grcard2-set-adm5 55501234
 
 For as long as you keep the ADM11 secret code at its default of 88888888, there
 is no PIN security - even if you set PIN1/PIN2/PUK1/PUK2 to your own secrets,
@@ -123,7 +123,7 @@
 
 * If you enter ADM5 incorrectly 3 times in a row, you unrecoverably lose the
   ability to use ADM5 ever again - even if you successfully authenticate with
-  ADM11 and reset ADM5 with grcard2-set-adm, the attempt counter does not get
+  ADM11 and reset ADM5 with grcard2-set-adm5, the attempt counter does not get
   reset, and ADM5 remains blocked.
 
 * If you enter standard PUK1 or PUK2 incorrectly 10 times in a row, it is