__ __ __ __ _____ _ _ _____ _ _ _ | \/ | \ \ / / | __ \ (_) | | / ____| | | | | | \ / |_ __\ V / | |__) | __ ___ ____ _| |_ ___ | (___ | |__ ___| | | | |\/| | '__|> < | ___/ '__| \ \ / / _` | __/ _ \ \___ \| '_ \ / _ \ | | | | | | |_ / . \ | | | | | |\ V / (_| | || __/ ____) | | | | __/ | | |_| |_|_(_)_/ \_\ |_| |_| |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1 if you need WebShell for Seo everyday contact me on Telegram Telegram Address : @jackleetFor_More_Tools:
#
# PKCS15 r/w profile for Incard's Incrypto34 (aka Italian CIE/CNS)
#
cardinfo {
max-pin-length = 8;
pin-encoding = ascii-numeric;
pin-pad-char = 0x00;
}
# Define reasonable limits for PINs and PUK
# We set the reference for SO pin+puk here, because
# those are hard-coded (if a PUK us assigned).
PIN so-pin {
reference = 0;
}
PIN so-puk {
reference = 1;
}
PIN user-pin {
attempts = 3;
}
PIN user-puk {
attempts = 10;
}
# Additional filesystem info.
# This is added to the file system info specified in the
# main profile.
filesystem {
DF MF {
DF PKCS15-AppDF {
size = 2048;
# Prevent unauthorized updates of basic security
# objects via PUT DATA OCI.
ACL = UPDATE=NEVER;
# Bump the size of the EF(PrKDF) - with split
# keys, we may need a little more room.
EF PKCS15-PrKDF {
size = 256;
}
# This template defines files for keys, certificates etc.
#
# When instantiating the template, each file id will be
# combined with the last octet of the object's pkcs15 id
# to form a unique file ID.
template key-domain {
BSO private-key {
# here ACLs should be defined
}
EF public-key {
file-id = 3003;
structure = transparent;
ACL = *=NEVER,
READ=NONE,
UPDATE=$PIN,
ERASE=$PIN;
}
# Certificate template
EF certificate {
file-id = 3104;
structure = transparent;
ACL = *=NEVER,
READ=NONE,
UPDATE=$PIN,
ERASE=$PIN;
}
# Extractable private keys are stored in transparent EFs.
# Encryption of the content is performed by libopensc.
EF extractable-key {
file-id = 3201;
structure = transparent;
ACL = *=NEVER,
READ=$PIN,
UPDATE=$PIN,
ERASE=$PIN;
}
# data objects are stored in transparent EFs.
EF data {
file-id = 3302;
structure = transparent;
ACL = *=NEVER,
READ=NONE,
UPDATE=$PIN,
ERASE=$PIN;
}
# private data objects are stored in transparent EFs.
EF privdata {
file-id = 3402;
structure = transparent;
ACL = *=NEVER,
READ=$PIN,
UPDATE=$PIN,
ERASE=$PIN;
}
}
# This is needed when generating a key on-card.
EF tempfile {
file-id = 7EAD;
structure = linear-variable-tlv;
ACL = *=NONE;
size = 512;
}
}
}
}
| Name | Type | Size | Permission | Actions |
|---|---|---|---|---|
| asepcos.profile | File | 2.54 KB | 0644 |
|
| authentic.profile | File | 2.86 KB | 0644 |
|
| cardos.profile | File | 2.77 KB | 0644 |
|
| cyberflex.profile | File | 2.85 KB | 0644 |
|
| entersafe.profile | File | 3.8 KB | 0644 |
|
| epass2003.profile | File | 4.18 KB | 0644 |
|
| flex.profile | File | 3.09 KB | 0644 |
|
| gids.profile | File | 230 B | 0644 |
|
| gpk.profile | File | 2.85 KB | 0644 |
|
| ias_adele_admin1.profile | File | 4.92 KB | 0644 |
|
| ias_adele_admin2.profile | File | 4.9 KB | 0644 |
|
| ias_adele_common.profile | File | 4.84 KB | 0644 |
|
| iasecc.profile | File | 2.84 KB | 0644 |
|
| iasecc_admin_eid.profile | File | 4.91 KB | 0644 |
|
| iasecc_generic_oberthur.profile | File | 4.56 KB | 0644 |
|
| iasecc_generic_pki.profile | File | 4.9 KB | 0644 |
|
| incrypto34.profile | File | 2.65 KB | 0644 |
|
| isoApplet.profile | File | 2.95 KB | 0644 |
|
| jcop.profile | File | 2.16 KB | 0644 |
|
| miocos.profile | File | 1.16 KB | 0644 |
|
| muscle.profile | File | 3.38 KB | 0644 |
|
| myeid.profile | File | 6.59 KB | 0644 |
|
| oberthur.profile | File | 4.36 KB | 0644 |
|
| openpgp.profile | File | 1.85 KB | 0644 |
|
| pkcs15.profile | File | 3.88 KB | 0644 |
|
| rutoken.profile | File | 5.38 KB | 0644 |
|
| rutoken_ecp.profile | File | 5.9 KB | 0644 |
|
| rutoken_lite.profile | File | 5.41 KB | 0644 |
|
| sc-hsm.profile | File | 400 B | 0644 |
|
| setcos.profile | File | 3.7 KB | 0644 |
|
| starcos.profile | File | 2.69 KB | 0644 |
|
| westcos.profile | File | 3.56 KB | 0644 |
|