Server IP : 13.213.54.232 / Your IP : 216.73.216.72 Web Server : Apache/2.4.52 (Ubuntu) System : Linux ip-172-31-17-110 6.8.0-1029-aws #31~22.04.1-Ubuntu SMP Thu Apr 24 21:16:18 UTC 2025 x86_64 User : www-data ( 33) PHP Version : 7.1.33-67+ubuntu22.04.1+deb.sury.org+1 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals, MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /snap/core22/2010/usr/share/opensc/ |
Upload File : |
# # PKCS15 r/w profile for GPK cards # cardinfo { max-pin-length = 8; pin-encoding = BCD; pin-pad-char = 0x00; } # Additional filesystem info. # This is added to the file system info specified in the # main profile. filesystem { DF MF { ACL = CREATE=PRO1; DF PKCS15-AppDF { # The PIN file. # The GPK supports just one PIN file per DF, and the file # can hold up to 8 pins (or 4 PIN/PUK pairs). # # Note1: many commands use the short file ID (i.e. the lower # 5 bits of the FID) so you must be careful when picking FIDs # for the public key and PIN files. EF pinfile { file-id = 0000; structure = 0x21; # GPK specific record-length = 8; size = 64; # room for 8 pins ACL = *=NEVER; } # This template defines files for keys, certificates etc. # # When instantiating the template, each file id will be # combined with the last octet of the object's pkcs15 id # to form a unique file ID. template key-domain { # Private key files. # GPK private key files will never let you read the private key # part, so it's okay to set READ=NONE. What's more, we may need # read access so we're able to check the key size/type. EF private-key { file-id = 3010; # This is the base FileID structure = 0x2C; # GPK specific ACL = *=NEVER, READ=NONE, CRYPTO=$PIN, UPDATE=$PIN, WRITE=$PIN; } # Extractable private keys are stored in transparent EFs. # Encryption of the content is performed by libopensc. EF extractable-key { file-id = 3100; structure = transparent; ACL = *=NEVER, READ=$PIN, UPDATE=$PIN, WRITE=$PIN; } # data objects are stored in transparent EFs. EF data { file-id = 3200; structure = transparent; ACL = *=NEVER, READ=NONE, UPDATE=$PIN, WRITE=$PIN; } # private data objects are stored in transparent EFs. EF privdata { file-id = 3220; structure = transparent; ACL = *=NEVER, READ=$PIN, UPDATE=$PIN, WRITE=$PIN; } EF public-key { file-id = 3300; structure = transparent; ACL = *=NONE; } # Certificate template EF certificate { file-id = 3400; structure = transparent; ACL = *=NONE; } } } } }