����JFIF��H�H����Exif��MM�*���� ��3����V�����3������3�(��������������������3�����
Server IP : 74.208.127.88 / Your IP : 18.217.137.245 Web Server : Apache/2.4.41 (Ubuntu) System : Linux ubuntu 5.4.0-163-generic #180-Ubuntu SMP Tue Sep 5 13:21:23 UTC 2023 x86_64 User : www-data ( 33) PHP Version : 7.4.3-4ubuntu2.29 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /proc/self/root/snap/core20/2496/usr/share/opensc/ |
Upload File : |
# # PKCS15 r/w profile for GPK cards # cardinfo { max-pin-length = 8; pin-encoding = BCD; pin-pad-char = 0x00; } # Additional filesystem info. # This is added to the file system info specified in the # main profile. filesystem { DF MF { ACL = CREATE=PRO1; DF PKCS15-AppDF { # The PIN file. # The GPK supports just one PIN file per DF, and the file # can hold up to 8 pins (or 4 PIN/PUK pairs). # # Note1: many commands use the short file ID (i.e. the lower # 5 bits of the FID) so you must be careful when picking FIDs # for the public key and PIN files. EF pinfile { file-id = 0000; structure = 0x21; # GPK specific record-length = 8; size = 64; # room for 8 pins ACL = *=NEVER; } # This template defines files for keys, certificates etc. # # When instantiating the template, each file id will be # combined with the last octet of the object's pkcs15 id # to form a unique file ID. template key-domain { # Private key files. # GPK private key files will never let you read the private key # part, so it's okay to set READ=NONE. What's more, we may need # read access so we're able to check the key size/type. EF private-key { file-id = 3010; # This is the base FileID structure = 0x2C; # GPK specific ACL = *=NEVER, READ=NONE, CRYPTO=$PIN, UPDATE=$PIN, WRITE=$PIN; } # Extractable private keys are stored in transparent EFs. # Encryption of the content is performed by libopensc. EF extractable-key { file-id = 3100; structure = transparent; ACL = *=NEVER, READ=$PIN, UPDATE=$PIN, WRITE=$PIN; } # data objects are stored in transparent EFs. EF data { file-id = 3200; structure = transparent; ACL = *=NEVER, READ=NONE, UPDATE=$PIN, WRITE=$PIN; } # private data objects are stored in transparent EFs. EF privdata { file-id = 3220; structure = transparent; ACL = *=NEVER, READ=$PIN, UPDATE=$PIN, WRITE=$PIN; } EF public-key { file-id = 3300; structure = transparent; ACL = *=NONE; } # Certificate template EF certificate { file-id = 3400; structure = transparent; ACL = *=NONE; } } } } }