[ Avaa Bypassed ]




Upload:

Command:

www-data@18.223.23.30: ~ $
#
# pkcs15 profile for starcos spk 2.3
#
cardinfo {
	max-pin-length	= 8;
	pin-encoding	= ascii-numeric;
	pin-pad-char	= 0x00;
}

option default {
	macros {
		so-pin-flags	= initialized, needs-padding, soPin;
		isf_acl		= WRITE=$SOPIN, CREATE=$SOPIN;
		df_acl		= *=$SOPIN;
	}
}

option onepin {
	macros {
		so-pin-flags    = initialized, needs-padding;
		isf_acl		= WRITE=$PIN, CREATE=$PIN;
		df_acl		= *=$PIN;
	}
}

PIN so-pin {
	reference	= 1;
	flags		= $so-pin-flags;
}
PIN so-puk {
	reference	= 1;
}
PIN user-pin {
	attempts	= 3;
}
PIN user-puk {
	attempts	= 10;
}

# Additional filesystem info.
# This is added to the file system info specified in the
# main profile.
filesystem {
    DF MF {
	ACL	= $df_acl;
	size	= 768;

	# INTERNAL SECRET KEY file of the MF
	EF mf_isf {
		size	= 256;
		ACL	= $isf_acl;
	}

	EF mf_ipf {
		file-id = 0010;
		size    = 256;
	}

        DF PKCS15-AppDF {
		ACL	= $df_acl;
		size	= 16000;

		# INTERNAL SECRET KEY file of the application DF
		# Note: if the WRITE ACL is commented out or no
		# sopin is specified the ACs must be activated via
		# 'pkcs15-init --finalize' (in this case the
		# AC WRITE is NEVER as the required state can't
		# be reached).
		EF p15_isf {
			path		= 3f005015;
			size		= 2560;
			ACL		= $isf_acl;
		}

		EF p15_ipf {
			file-id		= 0010;
			size		= 1280;
		}
	

            template key-domain {
		BSO private-key {
			# here ACLs should be defined
		}
                EF public-key {
    	            file-id	= 3003;
    	            structure	= transparent;
		    ACL		= *=NEVER,
		    			READ=NONE,
					UPDATE=$PIN,
					ERASE=$PIN;
                }

                # Certificate template
                EF certificate {
    	            file-id	= 3104;
    	            structure	= transparent;
		    ACL		= *=NEVER,
		    			READ=NONE,
					UPDATE=$PIN,
					ERASE=$PIN;
                }

	        # Extractable private keys are stored in transparent EFs.
	        # Encryption of the content is performed by libopensc.
                EF extractable-key {
    	            file-id	= 3201;
    	            structure	= transparent;
    	            ACL		= *=NEVER,
		    			READ=$PIN,
					UPDATE=$PIN,
					ERASE=$PIN;
                }

	        # data objects are stored in transparent EFs.
                EF data {
    	            file-id	= 3301;
    	            structure	= transparent;
    	            ACL		= *=NEVER,
					READ=NONE,
					UPDATE=$PIN,
					ERASE=$PIN;
		}
	        # private data objects are stored in transparent EFs.
                EF privdata {
    	            file-id	= 3401;
    	            structure	= transparent;
    	            ACL		= *=NEVER,
					READ=$PIN,
					UPDATE=$PIN,
					ERASE=$PIN;
                }

	    }

	}
    }
}

Filemanager

Name Type Size Permission Actions
asepcos.profile File 2.54 KB 0644
authentic.profile File 2.86 KB 0644
cardos.profile File 2.77 KB 0644
cyberflex.profile File 2.85 KB 0644
entersafe.profile File 3.8 KB 0644
epass2003.profile File 4.18 KB 0644
flex.profile File 3.09 KB 0644
gids.profile File 230 B 0644
gpk.profile File 2.85 KB 0644
ias_adele_admin1.profile File 4.92 KB 0644
ias_adele_admin2.profile File 4.9 KB 0644
ias_adele_common.profile File 4.84 KB 0644
iasecc.profile File 2.84 KB 0644
iasecc_admin_eid.profile File 4.91 KB 0644
iasecc_generic_oberthur.profile File 4.56 KB 0644
iasecc_generic_pki.profile File 4.9 KB 0644
incrypto34.profile File 2.65 KB 0644
isoApplet.profile File 2.95 KB 0644
jcop.profile File 2.16 KB 0644
miocos.profile File 1.16 KB 0644
muscle.profile File 3.38 KB 0644
myeid.profile File 6.59 KB 0644
oberthur.profile File 4.36 KB 0644
openpgp.profile File 1.85 KB 0644
pkcs15.profile File 3.88 KB 0644
rutoken.profile File 5.38 KB 0644
rutoken_ecp.profile File 5.9 KB 0644
rutoken_lite.profile File 5.41 KB 0644
sc-hsm.profile File 400 B 0644
setcos.profile File 3.7 KB 0644
starcos.profile File 2.69 KB 0644
westcos.profile File 3.56 KB 0644