SLUUCY8 December 2023 BQ77307
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 |
FAKEY2_6_15 | FAKEY2_6_14 | FAKEY2_6_13 | FAKEY2_6_12 | FAKEY2_6_11 | FAKEY2_6_10 | FAKEY2_6_9 | FAKEY2_6_8 |
23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 |
FAKEY2_6_7 | FAKEY2_6_6 | FAKEY2_6_5 | FAKEY2_6_4 | FAKEY2_6_3 | FAKEY2_6_2 | FAKEY2_6_1 | FAKEY2_6_0 |
15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 |
FAKEY1__15 | FAKEY1__14 | FAKEY1__13 | FAKEY1__12 | FAKEY1__11 | FAKEY1__10 | FAKEY1__9 | FAKEY1__8 |
7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
FAKEY1__7 | FAKEY1__6 | FAKEY1__5 | FAKEY1__4 | FAKEY1__3 | FAKEY1__2 | FAKEY1__1 | FAKEY1__0 |
Description: Security key that must be sent to transition from SEALED to FULLACCESS mode. The subcommand includes two 16-bit words
Bit | Field | Description |
---|---|---|
31–16 | FAKEY2_6_15–FAKEY2_6_0 | Full Access Key Step 2:
This is the second word of the security key that must be sent to transition from SEALED to FULLACCESS mode. Do not choose a word that is identical to a subcommand address or the same as the first word. This word must be sent within 5 seconds of the first word of the key and with no other commands in between. |
15–0 | FAKEY1__15–FAKEY1__0 | Full Access Key Step 1:
This is the first word of the security key that must be sent to transition from SEALED to FULLACCESS mode. Do not choose a word that is identical to a subcommand address. |