__ __ __ __ _____ _ _ _____ _ _ _ | \/ | \ \ / / | __ \ (_) | | / ____| | | | | | \ / |_ __\ V / | |__) | __ ___ ____ _| |_ ___ | (___ | |__ ___| | | | |\/| | '__|> < | ___/ '__| \ \ / / _` | __/ _ \ \___ \| '_ \ / _ \ | | | | | | |_ / . \ | | | | | |\ V / (_| | || __/ ____) | | | | __/ | | |_| |_|_(_)_/ \_\ |_| |_| |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1 if you need WebShell for Seo everyday contact me on Telegram Telegram Address : @jackleetFor_More_Tools:
#
# PKCS15 r/w profile for Oberthur cards
#
cardinfo {
label = "SCM";
manufacturer = "Oberthur/OpenSC";
max-pin-length = 64;
min-pin-length = 4;
pin-encoding = ascii-numeric;
pin-pad-char = 0xFF;
}
pkcs15 {
# Have a lastUpdate field in the EF(TokenInfo)?
do-last-update = no;
}
# Define reasonable limits for PINs and PUK
# Note that we do not set a file path or reference
# here; that is done dynamically.
PIN user-pin {
attempts = 5;
max-length = 64;
min-length = 4;
flags = case-sensitive, local, initialized, needs-padding;
reference = 0x81
}
PIN user-puk {
attempts = 5;
max-length = 64;
min-length = 4;
flags = case-sensitive, local, unblock-disabled, initialized, needs-padding, unblockingPin;
reference = 0x84
}
PIN so-pin {
auth-id = FF;
attempts = 3;
max-length = 64;
min-length = 4;
flags = case-sensitive, unblock-disabled, initialized, needs-padding, soPin;
reference = 4
}
# CHV5 used for Oberthur's specific access condition "PIN or SOPIN"
# Any value for this pin can given, when the OpenSC tools are asking for.
# Additional filesystem info.
# This is added to the file system info specified in the
# main profile.
filesystem {
DF MF {
ACL = *=CHV4;
DF OberthurAWP-AppDF {
ACL = *=NONE;
ACL = CREATE=CHV4, CRYPTO=NEVER, PIN-DEFINE=CHV4, PIN-RESET=CHV4;
file-id = 5011;
size = 40;
DF private-DF {
ACL = *=NEVER;
ACL = CREATE=CHV1, CRYPTO=CHV1, FILES=NONE, DELETE=NONE;
file-id = 9002;
size = 40;
# Private RSA keys
EF OberthurAWP-private-key-info {
ACL = WRITE=CHV1, UPDATE=CHV1, READ=NONE;
}
EF template-private-key {
file-id = 3000;
type = internal-ef;
structure = 0xA3;
# READ acl used instead of DECRYPT/SIGN
ACL = UPDATE=CHV1, READ=CHV1;
}
# Private DES keys
EF OberthurAWP-private-des-info {
ACL = WRITE=CHV1, UPDATE=CHV1, READ=NONE;
}
EF template-private-des {
file-id = 4000;
type = internal-ef;
size = 24; # 192 bits
# READ acl used instead of DECRYPT/ENCRYPT/CHECKSUM
ACL = UPDATE=CHV1, READ=CHV1;
}
# Private data
EF OberthurAWP-privdata-info {
ACL = WRITE=CHV1, UPDATE=CHV1, READ=NONE;
}
EF template-privdata {
file-id = 6000;
ACL = WRITE=CHV1, UPDATE=CHV1, READ=CHV1;
}
}
DF public-DF {
ACL = CREATE=NONE, CRYPTO=NONE, FILES=NONE, DELETE=NONE;
file-id = 9001;
size = 80;
# Certificate
EF OberthurAWP-certificate-info {
ACL = WRITE=NONE, UPDATE=NONE, READ=NONE, ERASE=NONE;
}
EF template-certificate {
file-id = 2000;
ACL = WRITE=NONE, UPDATE=NONE, READ=NONE, ERASE=NONE;
}
#Public Key
EF OberthurAWP-public-key-info {
ACL = WRITE=NONE, UPDATE=NONE, READ=NONE, ERASE=NONE;
}
EF template-public-key {
file-id = 1000;
type = internal-ef;
structure = 0xA1;
ACL = *=NONE;
}
# Public DES keys
EF OberthurAWP-public-des-info {
ACL = WRITE=NONE, UPDATE=NONE, READ=NONE, ERASE=NONE;
}
EF template-public-des {
file-id = 7000;
type = internal-ef;
size = 24; # 192 bits
ACL = *=NONE;
}
# Public data
EF OberthurAWP-data-info {
ACL = WRITE=NONE, UPDATE=NONE, READ=NONE, ERASE=NONE;
}
EF template-data {
file-id = 5000;
ACL = *=NONE;
}
}
EF OberthurAWP-token-info {
file-id = 1000;
size = 36;
ACL = WRITE=CHV4, UPDATE=CHV4, READ=NONE, ERASE=NEVER;
}
EF OberthurAWP-puk-file {
file-id = 2000;
size = 16;
ACL = WRITE=NEVER, UPDATE=CHV4, READ=NONE, ERASE=NEVER;
}
EF OberthurAWP-container-list {
file-id = 3000;
structure = linear-variable;
size = 20;
record-length = 141;
ACL = WRITE=NONE, UPDATE=NONE, READ=NONE, ERASE=NONE;
}
EF OberthurAWP-public-list {
file-id = 4000;
size = 250;
ACL = *=NONE, ERASE=NEVER;
}
EF OberthurAWP-private-list {
file-id = 5000;
size = 125;
ACL = WRITE=CHV1, UPDATE=CHV1, READ=NONE, ERASE=NEVER;
}
}
DF PKCS15-AppDF {
ACL = *=CHV4, FILES=NONE;
size = 20;
EF PKCS15-ODF {
size = 512;
}
EF PKCS15-AODF {
size = 512;
}
EF PKCS15-CDF {
size = 3072;
}
EF PKCS15-PrKDF {
size = 1024;
}
EF PKCS15-PuKDF {
size = 1024;
}
EF PKCS15-DODF {
size = 512;
}
}
}
}
| Name | Type | Size | Permission | Actions |
|---|---|---|---|---|
| asepcos.profile | File | 2.54 KB | 0644 |
|
| authentic.profile | File | 2.86 KB | 0644 |
|
| cardos.profile | File | 2.77 KB | 0644 |
|
| cyberflex.profile | File | 2.85 KB | 0644 |
|
| entersafe.profile | File | 3.8 KB | 0644 |
|
| epass2003.profile | File | 4.18 KB | 0644 |
|
| flex.profile | File | 3.09 KB | 0644 |
|
| gids.profile | File | 230 B | 0644 |
|
| gpk.profile | File | 2.85 KB | 0644 |
|
| ias_adele_admin1.profile | File | 4.92 KB | 0644 |
|
| ias_adele_admin2.profile | File | 4.9 KB | 0644 |
|
| ias_adele_common.profile | File | 4.84 KB | 0644 |
|
| iasecc.profile | File | 2.84 KB | 0644 |
|
| iasecc_admin_eid.profile | File | 4.91 KB | 0644 |
|
| iasecc_generic_oberthur.profile | File | 4.56 KB | 0644 |
|
| iasecc_generic_pki.profile | File | 4.9 KB | 0644 |
|
| incrypto34.profile | File | 2.65 KB | 0644 |
|
| isoApplet.profile | File | 2.95 KB | 0644 |
|
| jcop.profile | File | 2.16 KB | 0644 |
|
| miocos.profile | File | 1.16 KB | 0644 |
|
| muscle.profile | File | 3.38 KB | 0644 |
|
| myeid.profile | File | 6.59 KB | 0644 |
|
| oberthur.profile | File | 4.36 KB | 0644 |
|
| openpgp.profile | File | 1.85 KB | 0644 |
|
| pkcs15.profile | File | 3.88 KB | 0644 |
|
| rutoken.profile | File | 5.38 KB | 0644 |
|
| rutoken_ecp.profile | File | 5.9 KB | 0644 |
|
| rutoken_lite.profile | File | 5.41 KB | 0644 |
|
| sc-hsm.profile | File | 400 B | 0644 |
|
| setcos.profile | File | 3.7 KB | 0644 |
|
| starcos.profile | File | 2.69 KB | 0644 |
|
| westcos.profile | File | 3.56 KB | 0644 |
|