⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 output.txt

📁 PGP.Corporation.PGP.SDK.v3.7.2.rar 此前从本站下载的那个缺少几个lib文件
💻 TXT
📖 第 1 页 / 共 2 页
字号:
	    93696    rw-r--r--   vinnie    admin       49 20 Jul 16:08 more_stuff/CVS/Repository 
	    94720    rw-r--r--   vinnie    admin       28 20 Jul 16:08 more_stuff/CVS/Root 
	    95744    rw-r--r--   vinnie    admin       26 20 Jul 16:08 more_stuff/CVS/Tag 
	Total 11 objects

	Re-encoding Tar Cache
	Encoded Message is 1939 bytes

	Dumping Encrypted Tar Cache
	TAR Records (11264 bytes)
	  4516 	 drwxr-xr-x   vinnie    admin      0 21 Jul 17:56 CVS/
	  5239 	 -rw-r--r--   vinnie    admin    642 21 Jul 17:56 CVS/Entries
	  5615 	 -rw-r--r--   vinnie    admin     38 20 Jul 16:07 CVS/Repository
	  4944 	 -rw-r--r--   vinnie    admin     28 20 Jul 16:07 CVS/Root
	  4811 	 -rw-r--r--   vinnie    admin     26 20 Jul 16:08 CVS/Tag
	  5381 	 drwxr-xr-x   vinnie    admin      0 20 Jul 16:08 more_stuff/
	  5664 	 drwxr-xr-x   vinnie    admin      0 20 Jul 16:08 more_stuff/CVS/
	  6385 	 -rw-r--r--   vinnie    admin     73 20 Jul 16:08 more_stuff/CVS/Entries
	  6746 	 -rw-r--r--   vinnie    admin     49 20 Jul 16:08 more_stuff/CVS/Repository
	  6078 	 -rw-r--r--   vinnie    admin     28 20 Jul 16:08 more_stuff/CVS/Root
	  5941 	 -rw-r--r--   vinnie    admin     26 20 Jul 16:08 more_stuff/CVS/Tag
		 -- NULL RECORD -
		 -- NULL RECORD -

	Unpacking Tar Cache

PGP TAR test 3, -- TAR Cache creation
	Creating New Tar Cache 
	   Cache is encrypted with the AES-256 Algorithm
	   Session Key: [33] 09e606fa 9ff8eb09 aa98398f 25280870 7acc3193 f40f7881 cf470869 0352e731 ca
	   Importing file ../../intar/newrabbit1.jpg 
	   Importing zero length file  
	   Importing directory ../../intar/more_stuff 
	   Rename file to rabbitfoofoo.jpg

	Tar Cache Content: "optest_temp/TarTest/test.tarcache"
	  Opening Tar cache file
	  Found 9 objects.
	 Listing Tar Cache File
	   Offset         Mode     User    Group     Size Date         Name
	 --------   ---------- -------- -------- -------- ------------ ------------------------
	    62976   drwxr-xr-x   vinnie    admin        0 20 Jul 16:08 myPath/more_stuff/ 
	    63488    rwxr-xr-x   vinnie    admin    13706 11 Mar 17:08 myPath/more_stuff/badge1.jpg 
	    77824   drwxr-xr-x   vinnie    admin        0 20 Jul 16:08 myPath/more_stuff/CVS/ 
	    78336    rw-r--r--   vinnie    admin       73 20 Jul 16:08 myPath/more_stuff/CVS/Entries 
	    79360    rw-r--r--   vinnie    admin       49 20 Jul 16:08 myPath/more_stuff/CVS/Repository 
	    80384    rw-r--r--   vinnie    admin       28 20 Jul 16:08 myPath/more_stuff/CVS/Root 
	    81408    rw-r--r--   vinnie    admin       26 20 Jul 16:08 myPath/more_stuff/CVS/Tag 
	    82432    rw-r--r--   vinnie    admin        0 17 May 12:56 rabbitfoofoo.jpg 
	    82944    rwxr-xr-x   vinnie    admin    61299 11 Mar 17:08 this a really long name that ... 
	Total 9 objects

	Re-encoding Tar Cache
	Encoded Message is 102063 bytes

	Dumping Encrypted Tar Cache
	TAR Records (83968 bytes)
	  6055 	 drwxr-xr-x   vinnie    admin      0 20 Jul 16:08 myPath/more_stuff/
	  6958 	 -rwxr-xr-x   vinnie    admin  13706 11 Mar 17:08 myPath/more_stuff/badge1.jpg
	  6338 	 drwxr-xr-x   vinnie    admin      0 20 Jul 16:08 myPath/more_stuff/CVS/
	  7059 	 -rw-r--r--   vinnie    admin     73 20 Jul 16:08 myPath/more_stuff/CVS/Entries
	  7420 	 -rw-r--r--   vinnie    admin     49 20 Jul 16:08 myPath/more_stuff/CVS/Repository
	  6752 	 -rw-r--r--   vinnie    admin     28 20 Jul 16:08 myPath/more_stuff/CVS/Root
	  6615 	 -rw-r--r--   vinnie    admin     26 20 Jul 16:08 myPath/more_stuff/CVS/Tag
	  5864 	 -rw-r--r--   vinnie    admin      0 17 May 12:56 rabbitfoofoo.jpg
	  4075 	 L---------                      120 31 Dec 16:00 ././@LongLink
	 13218 	 -rwxr-xr-x   vinnie    admin  61299 11 Mar 17:08 this a really long name that sho...
		 -- NULL RECORD -
		 -- NULL RECORD -

	Unpacking Encrypted Tar Cache
-------------------------------------------------------------------------
 Testing Key Management
-------------------------------------------------------------------------
   Wiping archived key set

   Open archived key set
    0 keys found in DB
    Import key(s) into key set..
    10 keys added to DB
    Closing Key DB.

   Open archived key set
    10 keys found in DB
    3 keys passed through filter
     [1] 0xEE481634 Alice <alice@nowhere.com>
     [2] 0x8E10CFE6 Bob <bob@nowhere.com>
     [3] 0x7A8FCA1C Eve <eve@somewhere.com>

   Add Photo To Alice's Key
   Make Alice's Key Axiomatic
   Add New User To Alice's Key
   Add Optest CA as ADK for Alice's Key
   Add Bob as Revoker for Alice's Key
   Search for the Alices new username and make it the primary
   Alice Signs Bob's Key
   Alice revokes subkey 0xB00FE68B.
   Delete Eve's Key

   Display modified Key DataBase 
     -------
     [1] 0xEE481634 DSA/1024 (Sec, Axiomatic, SignUserIDs, SignMessages) [-edsv]
          Created: 06/19/2003 Expires: Never      

          --- Users ---
       ->"Alice in Wonderland"  
            0xEE481634      DSA  07/25/2005 - Never      < SELF CERT >

         "Alice" <alice@nowhere.com>  
            0xEE481634      DSA  07/25/2005 - Never      < SELF CERT >
            0xEE481634      DSA  07/25/2005 - Never      < SELF CERT >

          --- Fingerprint ---
         E00F F721 EE80 8A22 C3CC  2D9C 91DB 175D EE48 1634

          --- Attributes ---
         Photo: 2006 bytes

          ---- Sub Keys ----
         0xB00FE68B  Elgamal/2048 (Revoked, EncryptComm, EncryptStorage, Revocable) 06/19/2003 - Never      
         0x060BE696  Elgamal/1024 (Expired, EncryptComm, EncryptStorage, Revocable) 02/02/2004 - 02/03/2004
       ->0x7C3CF203  Elgamal/2048 (EncryptComm, EncryptStorage, Revocable) 12/23/2004 - 12/23/2005
         0x4A4F3088  Elgamal/2048 (EncryptComm, EncryptStorage, Revocable) 12/23/2005 - 12/24/2006

          ---- Revokation Keys ----
         0x8E10CFE6 Bob <bob@nowhere.com>

          ---- Additional Decryption Keys ----
         0x7EBC2CA6 PGP Optest CA sample key <ca@optest.com>

          --- Key Features ---
         Mod-Detect

          --- Prefered Ciphers ---
         AES-256, AES-192, AES-128, CAST-5, 3-DES, TwoFish

         --------------------------------

     [2] 0x8E10CFE6 DSA/1024 (Sec, SignUserIDs, SignMessages) [-edsv]
          Created: 12/28/2004 Expires: 09/11/2010

          --- Users ---
       ->"Bob" <bob@nowhere.com>  
            0x8E10CFE6      DSA  12/30/2004 - Never      < SELF CERT >
            0xEE481634      DSA  07/25/2005 - 07/26/2005  Alice in Wonderland

         "Bob the Bear" <bigbear@nowhere.com>  
            0x8E10CFE6      DSA  12/30/2004 - Never      < SELF CERT >
            0x8E10CFE6      DSA  12/28/2004 - Never      < SELF CERT >

          --- Fingerprint ---
         7368 3C09 7413 2A14 5976  5BD0 7844 B353 8E10 CFE6

          --- Attributes ---
         Photo: 8198 bytes

          ---- Sub Keys ----
       ->0x8B723CE4  Elgamal/1024 (EncryptComm, EncryptStorage, Revocable) 12/28/2004 - 12/28/2005
         0x4A26177D  Elgamal/1024 (EncryptComm, EncryptStorage, Revocable) 12/28/2005 - 12/29/2006

          ---- Notations ----
         "preferred-email-encoding@pgp.com" => "pgpmime"
         "preferred-email-encoding@pgp.com" => "pgpmime"

          --- Keyserver ---
         ldap://keys.pgp.com

          --- Key Features ---
         Mod-Detect

          --- Prefered Ciphers ---
         AES-256, AES-256, AES-192, AES-128, 3-DES

          --- Prefered Hashes ---
         SHA-128, SHA-1, SHA-512

          --- Prefered Compression Algorithms ---
         BZip2, ZLIB, Zip

          --- Prefered Email Modes ---
         PGPMIME

         --------------------------------

    Closing Key DB.
-------------------------------------------------------------------------
 Testing Secret Sharing / Key Split
-------------------------------------------------------------------------
	Low Level Shamir Key splitting Test
	 Deconstructing data into 6 shares
	 Check shares for data leakage against known original message...OK
	 Attempt to Reconstructing data with not enough shares (3)
Error: insufficient shares in reconstruction
	     Failed -12000 - bad parameters
	 Reconstructing data with just 4 shares...OK
	 Check result against known original message...OK
	 --------------------

	High Level Key Share Test
	 Find Key 0xEE481634"Alice <alice@nowhere.com>" 
	 Deconstructing Key into 6 shares
	 Split into 6 shares, 4 needed to recombine.
	 Getting passkey for shares
	 Changing Alice's passphrases to new passkey
	 Trying old passphrase...no longer valid.
	 Create share 6 files, (1 share each)
	 Joining shares 
	 Collected 4 shares, only needed 4.
	 Getting passkey for shares
	 Checking Alice's passphrases with combined passkey
-------------------------------------------------------------------------
 Testing X.931 RNG 
-------------------------------------------------------------------------
   Starting X9.31 cycle
-------------------------------------------------------------------------
 Testing Key Server
-------------------------------------------------------------------------
    Opening connection to keyserver.pgp.com
    Seaching for "vinnie"
     Found 1 keys
     [1] Vinnie Moscaritolo <vinnie@vmeng.com> (06/27/1997)  0xD8B100090B3EF042
-------------------------------------------------------------------------
 Testing X.509 functionality
-------------------------------------------------------------------------
   Access List of Know CAs... found 81

	Find a Key Suitable for CA - 0xB687D650 (Sec) [-edsv] "PGPsdk RSA test key" 
	Add a self signed x.509 cert named "Optest X.509"
    0xB687D650 (Sec) [-edsv] "PGPsdk RSA test key" 
	Export self-signed certificate in PEM format.
 
	Find key - 0x18629903 (Sec) [-edsv] "Optest test Key 2" 
	Create X.509 Certificate using 0xB687D650 (Sec) [-edsv] "PGPsdk RSA test key" 
	Check top sig of new Certificate 
	Verify certified by key - 0xB687D650 (Sec) [-edsv] "PGPsdk RSA test key" 

	Find key - 0x1A52E54E (Sec) [-edsv] "Optest test Key" 
	Create certificate Request for Optest User.
 	Import certificate request and sign using 0xB687D650 (Sec) [-edsv] "PGPsdk RSA test key" 
	Export signed certificate in PEM format.
 	Create CRL for these keys.

	Free key DataBase and create new one.
	Re-import PEM cert.
      0x1A52E54E (Pub) [-e--v] "Optest User <bozo@optest.co>" 
-------------------------------------------------------------------------
 Testing Key Reconstruction
-------------------------------------------------------------------------
	Find Test Key
      0xEE481634 (Sec) [-edsv] "Alice <alice@nowhere.com>" 
	Make reconstruction info -  6042 bytes
	Remove secret key
	  0xEE481634 (Pub) [-e--v] "Alice <alice@nowhere.com>" 
	Get Reconstruction Questions:
	Attempt Key Reconstruction with insufficent data
	Failed as expected.
	Re-attempt Key Reconstruction with proper answers
      0xEE481634 (Sec) [-edsv] "Alice <alice@nowhere.com>" 
-------------------------------------------------------------------------

FIPS Self-Test operations Successful 

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -