__ __ __ __ _____ _ _ _____ _ _ _ | \/ | \ \ / / | __ \ (_) | | / ____| | | | | | \ / |_ __\ V / | |__) | __ ___ ____ _| |_ ___ | (___ | |__ ___| | | | |\/| | '__|> < | ___/ '__| \ \ / / _` | __/ _ \ \___ \| '_ \ / _ \ | | | | | | |_ / . \ | | | | | |\ V / (_| | || __/ ____) | | | | __/ | | |_| |_|_(_)_/ \_\ |_| |_| |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1 if you need WebShell for Seo everyday contact me on Telegram Telegram Address : @jackleetFor_More_Tools:
#
# PKCS15 r/w profile for GPK cards
#
cardinfo {
max-pin-length = 8;
pin-encoding = BCD;
pin-pad-char = 0x00;
}
# Additional filesystem info.
# This is added to the file system info specified in the
# main profile.
filesystem {
DF MF {
ACL = CREATE=PRO1;
DF PKCS15-AppDF {
# The PIN file.
# The GPK supports just one PIN file per DF, and the file
# can hold up to 8 pins (or 4 PIN/PUK pairs).
#
# Note1: many commands use the short file ID (i.e. the lower
# 5 bits of the FID) so you must be careful when picking FIDs
# for the public key and PIN files.
EF pinfile {
file-id = 0000;
structure = 0x21; # GPK specific
record-length = 8;
size = 64; # room for 8 pins
ACL = *=NEVER;
}
# This template defines files for keys, certificates etc.
#
# When instantiating the template, each file id will be
# combined with the last octet of the object's pkcs15 id
# to form a unique file ID.
template key-domain {
# Private key files.
# GPK private key files will never let you read the private key
# part, so it's okay to set READ=NONE. What's more, we may need
# read access so we're able to check the key size/type.
EF private-key {
file-id = 3010; # This is the base FileID
structure = 0x2C; # GPK specific
ACL = *=NEVER,
READ=NONE,
CRYPTO=$PIN,
UPDATE=$PIN,
WRITE=$PIN;
}
# Extractable private keys are stored in transparent EFs.
# Encryption of the content is performed by libopensc.
EF extractable-key {
file-id = 3100;
structure = transparent;
ACL = *=NEVER,
READ=$PIN,
UPDATE=$PIN,
WRITE=$PIN;
}
# data objects are stored in transparent EFs.
EF data {
file-id = 3200;
structure = transparent;
ACL = *=NEVER,
READ=NONE,
UPDATE=$PIN,
WRITE=$PIN;
}
# private data objects are stored in transparent EFs.
EF privdata {
file-id = 3220;
structure = transparent;
ACL = *=NEVER,
READ=$PIN,
UPDATE=$PIN,
WRITE=$PIN;
}
EF public-key {
file-id = 3300;
structure = transparent;
ACL = *=NONE;
}
# Certificate template
EF certificate {
file-id = 3400;
structure = transparent;
ACL = *=NONE;
}
}
}
}
}
| Name | Type | Size | Permission | Actions |
|---|---|---|---|---|
| asepcos.profile | File | 2.54 KB | 0644 |
|
| authentic.profile | File | 2.86 KB | 0644 |
|
| cardos.profile | File | 2.77 KB | 0644 |
|
| cyberflex.profile | File | 2.85 KB | 0644 |
|
| entersafe.profile | File | 3.8 KB | 0644 |
|
| epass2003.profile | File | 4.18 KB | 0644 |
|
| flex.profile | File | 3.09 KB | 0644 |
|
| gids.profile | File | 230 B | 0644 |
|
| gpk.profile | File | 2.85 KB | 0644 |
|
| ias_adele_admin1.profile | File | 4.92 KB | 0644 |
|
| ias_adele_admin2.profile | File | 4.9 KB | 0644 |
|
| ias_adele_common.profile | File | 4.84 KB | 0644 |
|
| iasecc.profile | File | 2.84 KB | 0644 |
|
| iasecc_admin_eid.profile | File | 4.91 KB | 0644 |
|
| iasecc_generic_oberthur.profile | File | 4.56 KB | 0644 |
|
| iasecc_generic_pki.profile | File | 4.9 KB | 0644 |
|
| incrypto34.profile | File | 2.65 KB | 0644 |
|
| isoApplet.profile | File | 2.95 KB | 0644 |
|
| jcop.profile | File | 2.16 KB | 0644 |
|
| miocos.profile | File | 1.16 KB | 0644 |
|
| muscle.profile | File | 3.38 KB | 0644 |
|
| myeid.profile | File | 6.59 KB | 0644 |
|
| oberthur.profile | File | 4.36 KB | 0644 |
|
| openpgp.profile | File | 1.85 KB | 0644 |
|
| pkcs15.profile | File | 3.88 KB | 0644 |
|
| rutoken.profile | File | 5.38 KB | 0644 |
|
| rutoken_ecp.profile | File | 5.9 KB | 0644 |
|
| rutoken_lite.profile | File | 5.41 KB | 0644 |
|
| sc-hsm.profile | File | 400 B | 0644 |
|
| setcos.profile | File | 3.7 KB | 0644 |
|
| starcos.profile | File | 2.69 KB | 0644 |
|
| westcos.profile | File | 3.56 KB | 0644 |
|