📄 output.txt
字号:
93696 rw-r--r-- vinnie admin 49 20 Jul 16:08 more_stuff/CVS/Repository
94720 rw-r--r-- vinnie admin 28 20 Jul 16:08 more_stuff/CVS/Root
95744 rw-r--r-- vinnie admin 26 20 Jul 16:08 more_stuff/CVS/Tag
Total 11 objects
Re-encoding Tar Cache
Encoded Message is 1939 bytes
Dumping Encrypted Tar Cache
TAR Records (11264 bytes)
4516 drwxr-xr-x vinnie admin 0 21 Jul 17:56 CVS/
5239 -rw-r--r-- vinnie admin 642 21 Jul 17:56 CVS/Entries
5615 -rw-r--r-- vinnie admin 38 20 Jul 16:07 CVS/Repository
4944 -rw-r--r-- vinnie admin 28 20 Jul 16:07 CVS/Root
4811 -rw-r--r-- vinnie admin 26 20 Jul 16:08 CVS/Tag
5381 drwxr-xr-x vinnie admin 0 20 Jul 16:08 more_stuff/
5664 drwxr-xr-x vinnie admin 0 20 Jul 16:08 more_stuff/CVS/
6385 -rw-r--r-- vinnie admin 73 20 Jul 16:08 more_stuff/CVS/Entries
6746 -rw-r--r-- vinnie admin 49 20 Jul 16:08 more_stuff/CVS/Repository
6078 -rw-r--r-- vinnie admin 28 20 Jul 16:08 more_stuff/CVS/Root
5941 -rw-r--r-- vinnie admin 26 20 Jul 16:08 more_stuff/CVS/Tag
-- NULL RECORD -
-- NULL RECORD -
Unpacking Tar Cache
PGP TAR test 3, -- TAR Cache creation
Creating New Tar Cache
Cache is encrypted with the AES-256 Algorithm
Session Key: [33] 09e606fa 9ff8eb09 aa98398f 25280870 7acc3193 f40f7881 cf470869 0352e731 ca
Importing file ../../intar/newrabbit1.jpg
Importing zero length file
Importing directory ../../intar/more_stuff
Rename file to rabbitfoofoo.jpg
Tar Cache Content: "optest_temp/TarTest/test.tarcache"
Opening Tar cache file
Found 9 objects.
Listing Tar Cache File
Offset Mode User Group Size Date Name
-------- ---------- -------- -------- -------- ------------ ------------------------
62976 drwxr-xr-x vinnie admin 0 20 Jul 16:08 myPath/more_stuff/
63488 rwxr-xr-x vinnie admin 13706 11 Mar 17:08 myPath/more_stuff/badge1.jpg
77824 drwxr-xr-x vinnie admin 0 20 Jul 16:08 myPath/more_stuff/CVS/
78336 rw-r--r-- vinnie admin 73 20 Jul 16:08 myPath/more_stuff/CVS/Entries
79360 rw-r--r-- vinnie admin 49 20 Jul 16:08 myPath/more_stuff/CVS/Repository
80384 rw-r--r-- vinnie admin 28 20 Jul 16:08 myPath/more_stuff/CVS/Root
81408 rw-r--r-- vinnie admin 26 20 Jul 16:08 myPath/more_stuff/CVS/Tag
82432 rw-r--r-- vinnie admin 0 17 May 12:56 rabbitfoofoo.jpg
82944 rwxr-xr-x vinnie admin 61299 11 Mar 17:08 this a really long name that ...
Total 9 objects
Re-encoding Tar Cache
Encoded Message is 102063 bytes
Dumping Encrypted Tar Cache
TAR Records (83968 bytes)
6055 drwxr-xr-x vinnie admin 0 20 Jul 16:08 myPath/more_stuff/
6958 -rwxr-xr-x vinnie admin 13706 11 Mar 17:08 myPath/more_stuff/badge1.jpg
6338 drwxr-xr-x vinnie admin 0 20 Jul 16:08 myPath/more_stuff/CVS/
7059 -rw-r--r-- vinnie admin 73 20 Jul 16:08 myPath/more_stuff/CVS/Entries
7420 -rw-r--r-- vinnie admin 49 20 Jul 16:08 myPath/more_stuff/CVS/Repository
6752 -rw-r--r-- vinnie admin 28 20 Jul 16:08 myPath/more_stuff/CVS/Root
6615 -rw-r--r-- vinnie admin 26 20 Jul 16:08 myPath/more_stuff/CVS/Tag
5864 -rw-r--r-- vinnie admin 0 17 May 12:56 rabbitfoofoo.jpg
4075 L--------- 120 31 Dec 16:00 ././@LongLink
13218 -rwxr-xr-x vinnie admin 61299 11 Mar 17:08 this a really long name that sho...
-- NULL RECORD -
-- NULL RECORD -
Unpacking Encrypted Tar Cache
-------------------------------------------------------------------------
Testing Key Management
-------------------------------------------------------------------------
Wiping archived key set
Open archived key set
0 keys found in DB
Import key(s) into key set..
10 keys added to DB
Closing Key DB.
Open archived key set
10 keys found in DB
3 keys passed through filter
[1] 0xEE481634 Alice <alice@nowhere.com>
[2] 0x8E10CFE6 Bob <bob@nowhere.com>
[3] 0x7A8FCA1C Eve <eve@somewhere.com>
Add Photo To Alice's Key
Make Alice's Key Axiomatic
Add New User To Alice's Key
Add Optest CA as ADK for Alice's Key
Add Bob as Revoker for Alice's Key
Search for the Alices new username and make it the primary
Alice Signs Bob's Key
Alice revokes subkey 0xB00FE68B.
Delete Eve's Key
Display modified Key DataBase
-------
[1] 0xEE481634 DSA/1024 (Sec, Axiomatic, SignUserIDs, SignMessages) [-edsv]
Created: 06/19/2003 Expires: Never
--- Users ---
->"Alice in Wonderland"
0xEE481634 DSA 07/25/2005 - Never < SELF CERT >
"Alice" <alice@nowhere.com>
0xEE481634 DSA 07/25/2005 - Never < SELF CERT >
0xEE481634 DSA 07/25/2005 - Never < SELF CERT >
--- Fingerprint ---
E00F F721 EE80 8A22 C3CC 2D9C 91DB 175D EE48 1634
--- Attributes ---
Photo: 2006 bytes
---- Sub Keys ----
0xB00FE68B Elgamal/2048 (Revoked, EncryptComm, EncryptStorage, Revocable) 06/19/2003 - Never
0x060BE696 Elgamal/1024 (Expired, EncryptComm, EncryptStorage, Revocable) 02/02/2004 - 02/03/2004
->0x7C3CF203 Elgamal/2048 (EncryptComm, EncryptStorage, Revocable) 12/23/2004 - 12/23/2005
0x4A4F3088 Elgamal/2048 (EncryptComm, EncryptStorage, Revocable) 12/23/2005 - 12/24/2006
---- Revokation Keys ----
0x8E10CFE6 Bob <bob@nowhere.com>
---- Additional Decryption Keys ----
0x7EBC2CA6 PGP Optest CA sample key <ca@optest.com>
--- Key Features ---
Mod-Detect
--- Prefered Ciphers ---
AES-256, AES-192, AES-128, CAST-5, 3-DES, TwoFish
--------------------------------
[2] 0x8E10CFE6 DSA/1024 (Sec, SignUserIDs, SignMessages) [-edsv]
Created: 12/28/2004 Expires: 09/11/2010
--- Users ---
->"Bob" <bob@nowhere.com>
0x8E10CFE6 DSA 12/30/2004 - Never < SELF CERT >
0xEE481634 DSA 07/25/2005 - 07/26/2005 Alice in Wonderland
"Bob the Bear" <bigbear@nowhere.com>
0x8E10CFE6 DSA 12/30/2004 - Never < SELF CERT >
0x8E10CFE6 DSA 12/28/2004 - Never < SELF CERT >
--- Fingerprint ---
7368 3C09 7413 2A14 5976 5BD0 7844 B353 8E10 CFE6
--- Attributes ---
Photo: 8198 bytes
---- Sub Keys ----
->0x8B723CE4 Elgamal/1024 (EncryptComm, EncryptStorage, Revocable) 12/28/2004 - 12/28/2005
0x4A26177D Elgamal/1024 (EncryptComm, EncryptStorage, Revocable) 12/28/2005 - 12/29/2006
---- Notations ----
"preferred-email-encoding@pgp.com" => "pgpmime"
"preferred-email-encoding@pgp.com" => "pgpmime"
--- Keyserver ---
ldap://keys.pgp.com
--- Key Features ---
Mod-Detect
--- Prefered Ciphers ---
AES-256, AES-256, AES-192, AES-128, 3-DES
--- Prefered Hashes ---
SHA-128, SHA-1, SHA-512
--- Prefered Compression Algorithms ---
BZip2, ZLIB, Zip
--- Prefered Email Modes ---
PGPMIME
--------------------------------
Closing Key DB.
-------------------------------------------------------------------------
Testing Secret Sharing / Key Split
-------------------------------------------------------------------------
Low Level Shamir Key splitting Test
Deconstructing data into 6 shares
Check shares for data leakage against known original message...OK
Attempt to Reconstructing data with not enough shares (3)
Error: insufficient shares in reconstruction
Failed -12000 - bad parameters
Reconstructing data with just 4 shares...OK
Check result against known original message...OK
--------------------
High Level Key Share Test
Find Key 0xEE481634"Alice <alice@nowhere.com>"
Deconstructing Key into 6 shares
Split into 6 shares, 4 needed to recombine.
Getting passkey for shares
Changing Alice's passphrases to new passkey
Trying old passphrase...no longer valid.
Create share 6 files, (1 share each)
Joining shares
Collected 4 shares, only needed 4.
Getting passkey for shares
Checking Alice's passphrases with combined passkey
-------------------------------------------------------------------------
Testing X.931 RNG
-------------------------------------------------------------------------
Starting X9.31 cycle
-------------------------------------------------------------------------
Testing Key Server
-------------------------------------------------------------------------
Opening connection to keyserver.pgp.com
Seaching for "vinnie"
Found 1 keys
[1] Vinnie Moscaritolo <vinnie@vmeng.com> (06/27/1997) 0xD8B100090B3EF042
-------------------------------------------------------------------------
Testing X.509 functionality
-------------------------------------------------------------------------
Access List of Know CAs... found 81
Find a Key Suitable for CA - 0xB687D650 (Sec) [-edsv] "PGPsdk RSA test key"
Add a self signed x.509 cert named "Optest X.509"
0xB687D650 (Sec) [-edsv] "PGPsdk RSA test key"
Export self-signed certificate in PEM format.
Find key - 0x18629903 (Sec) [-edsv] "Optest test Key 2"
Create X.509 Certificate using 0xB687D650 (Sec) [-edsv] "PGPsdk RSA test key"
Check top sig of new Certificate
Verify certified by key - 0xB687D650 (Sec) [-edsv] "PGPsdk RSA test key"
Find key - 0x1A52E54E (Sec) [-edsv] "Optest test Key"
Create certificate Request for Optest User.
Import certificate request and sign using 0xB687D650 (Sec) [-edsv] "PGPsdk RSA test key"
Export signed certificate in PEM format.
Create CRL for these keys.
Free key DataBase and create new one.
Re-import PEM cert.
0x1A52E54E (Pub) [-e--v] "Optest User <bozo@optest.co>"
-------------------------------------------------------------------------
Testing Key Reconstruction
-------------------------------------------------------------------------
Find Test Key
0xEE481634 (Sec) [-edsv] "Alice <alice@nowhere.com>"
Make reconstruction info - 6042 bytes
Remove secret key
0xEE481634 (Pub) [-e--v] "Alice <alice@nowhere.com>"
Get Reconstruction Questions:
Attempt Key Reconstruction with insufficent data
Failed as expected.
Re-attempt Key Reconstruction with proper answers
0xEE481634 (Sec) [-edsv] "Alice <alice@nowhere.com>"
-------------------------------------------------------------------------
FIPS Self-Test operations Successful
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -