[ Avaa Bypassed ]




Upload:

Command:

www-data@18.188.29.0: ~ $
#
# PKCS15 r/w profile for Incard's Incrypto34 (aka Italian CIE/CNS)
#
cardinfo {
    max-pin-length	= 8;
    pin-encoding	= ascii-numeric;
    pin-pad-char	= 0x00;
}

# Define reasonable limits for PINs and PUK
# We set the reference for SO pin+puk here, because
# those are hard-coded (if a PUK us assigned).
PIN so-pin {
    reference = 0;
}
PIN so-puk {
    reference = 1;
}
PIN user-pin {
    attempts	= 3;
}
PIN user-puk {
    attempts	= 10;
}

# Additional filesystem info.
# This is added to the file system info specified in the
# main profile.
filesystem {
    DF MF {
        DF PKCS15-AppDF {
	    size		= 2048;

	    # Prevent unauthorized updates of basic security
	    # objects via PUT DATA OCI.
	    ACL			= UPDATE=NEVER;

	    # Bump the size of the EF(PrKDF) - with split
	    # keys, we may need a little more room.
	    EF PKCS15-PrKDF {
		size		= 256;
	    }

	    # This template defines files for keys, certificates etc.
	    #
	    # When instantiating the template, each file id will be
	    # combined with the last octet of the object's pkcs15 id
	    # to form a unique file ID.
	    template key-domain {
		BSO private-key {
			# here ACLs should be defined
		}
                EF public-key {
    	            file-id	= 3003;
    	            structure	= transparent;
		    ACL		= *=NEVER,
		    			READ=NONE,
					UPDATE=$PIN,
					ERASE=$PIN;
                }

                # Certificate template
                EF certificate {
    	            file-id	= 3104;
    	            structure	= transparent;
		    ACL		= *=NEVER,
		    			READ=NONE,
					UPDATE=$PIN,
					ERASE=$PIN;
                }

	        # Extractable private keys are stored in transparent EFs.
	        # Encryption of the content is performed by libopensc.
                EF extractable-key {
    	            file-id	= 3201;
    	            structure	= transparent;
    	            ACL		= *=NEVER,
		    			READ=$PIN,
					UPDATE=$PIN,
					ERASE=$PIN;
                }

	        # data objects are stored in transparent EFs.
                EF data {
    	            file-id	= 3302;
    	            structure	= transparent;
    	            ACL		= *=NEVER,
					READ=NONE,
					UPDATE=$PIN,
					ERASE=$PIN;
                }

	        # private data objects are stored in transparent EFs.
                EF privdata {
    	            file-id	= 3402;
    	            structure	= transparent;
    	            ACL		= *=NEVER,
					READ=$PIN,
					UPDATE=$PIN,
					ERASE=$PIN;
                }

	    }

	    # This is needed when generating a key on-card.
	    EF tempfile {
	        file-id		= 7EAD;
		structure	= linear-variable-tlv;
		ACL		= *=NONE;
		size		= 512;
	    }
	}
    }
}

Filemanager

Name Type Size Permission Actions
asepcos.profile File 2.54 KB 0644
authentic.profile File 2.86 KB 0644
cardos.profile File 2.77 KB 0644
cyberflex.profile File 2.85 KB 0644
entersafe.profile File 3.8 KB 0644
epass2003.profile File 4.18 KB 0644
flex.profile File 3.09 KB 0644
gids.profile File 230 B 0644
gpk.profile File 2.85 KB 0644
ias_adele_admin1.profile File 4.92 KB 0644
ias_adele_admin2.profile File 4.9 KB 0644
ias_adele_common.profile File 4.84 KB 0644
iasecc.profile File 2.84 KB 0644
iasecc_admin_eid.profile File 4.91 KB 0644
iasecc_generic_oberthur.profile File 4.56 KB 0644
iasecc_generic_pki.profile File 4.9 KB 0644
incrypto34.profile File 2.65 KB 0644
isoApplet.profile File 2.95 KB 0644
jcop.profile File 2.16 KB 0644
miocos.profile File 1.16 KB 0644
muscle.profile File 3.38 KB 0644
myeid.profile File 6.59 KB 0644
oberthur.profile File 4.36 KB 0644
openpgp.profile File 1.85 KB 0644
pkcs15.profile File 3.88 KB 0644
rutoken.profile File 5.38 KB 0644
rutoken_ecp.profile File 5.9 KB 0644
rutoken_lite.profile File 5.41 KB 0644
sc-hsm.profile File 400 B 0644
setcos.profile File 3.7 KB 0644
starcos.profile File 2.69 KB 0644
westcos.profile File 3.56 KB 0644