Advertisement
Guest User

Untitled

a guest
Jan 25th, 2014
110
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.14 KB | None | 0 0
  1. Debug output from calibre below:
  2.  
  3. C:\Users\Owner>calibre-debug -g
  4. calibre 1.19 isfrozen: True is64bit: False
  5. Windows-7-6.1.7601-SP1 Windows ('32bit', 'WindowsPE')
  6. 32bit process running on 64bit windows
  7. ('Windows', '7', '6.1.7601')
  8. Python 2.7.5
  9. Windows: ('7', '6.1.7601', 'SP1', 'Multiprocessor Free')
  10. Starting up...
  11. Started up in 1.19 seconds with 1 books
  12. Worker Launch took: 0.219000101089
  13. Job: 1 Read metadata (0 of 1) finished
  14. Read metadata (0 of 1)
  15. DeDRM v6.0.8: Trying to decrypt antifragile_9780679645276.epub
  16. DeDRM v6.0.8: Verifying zip archive integrity
  17. DeDRM v6.0.8: “antifragile_9780679645276.epub” is a secure Barnes & Nobl
  18. e ePub
  19. DeDRM v6.0.8: Trying Encryption key myKey
  20. Could not decrypt eobdwq.epub because of an exception:
  21. Traceback (most recent call last):
  22. File "calibre_plugins.dedrm.ignobleepub", line 278, in decryptBook
  23. File "calibre_plugins.dedrm.ignobleepub", line 209, in __init__
  24. File "calibre_plugins.dedrm.ignobleepub", line 180, in __init__
  25. ValueError: Key cannot be the null string
  26.  
  27. DeDRM v6.0.8: Failed to decrypt with key myKey after 0.3 seconds
  28. DeDRM v6.0.8: Ultimately failed to decrypt after 0.3 seconds.
  29. Read the FAQs at Alf's blog: http://apprenticealf.wordpress.com/
  30. Running file type plugin DeDRM failed with traceback:
  31. Traceback (most recent call last):
  32. File "site-packages\calibre\customize\ui.py", line 154, in _run_filety
  33. pe_plugins
  34. File "calibre_plugins.dedrm.__init__", line 482, in run
  35. File "calibre_plugins.dedrm.__init__", line 180, in ePubDecrypt
  36. DeDRMError: DeDRM v6.0.8: Ultimately failed to decrypt “antifragile_9780
  37. 679645276.epub” after 0.3 seconds.
  38.  
  39. Added Antifragile: Things That Gain from Disorder to db in: 1.21700000763 second
  40. s
  41. ------------------------------------------------------------------------------------------------------------
  42. Below is debug output from running ignoblekeygen_copy.py from the command line. PyCrypto 2.3 and Python 2.7.6 (32-bit) are installed. (When I originally had PyCrypto 2.1 installed, the same key was generated.) ignoblekeygen_copy.py is the same as ignoblekeygen.py except that it has print statements added in the generate_key() function. I have added parentheses around the arguments to these print statements to make the digest variables more readable. For example:
  43.  
  44. print('name_sha is', name_sha)
  45.  
  46. I used this syntax for all print statements to make the output consistent.
  47.  
  48. C:\Users\Owner\Documents\DeDRM_App\DeDRM_lib\lib>ignoblekeygen_copy.py jonathansmith 5555555555555555 trialcopy.b64
  49. ('name_sha is', '\xdc\xed~\x96Jw\x90V0C>\xb3H\xe2\xa5\xa2')
  50. ('ccn_sha is', 'nL\x08(\\\xd6\x92$|@V\xd6o\x10\x99\x04')
  51. ('both_sha is', '\x02S\xecJ\xdd\x9d\xf8TI\x0bQ\x80\x1e1\xfd\xd0H\xc4\xa7y')
  52. ('aes is', <__main__.AES object at 0x02386230>)
  53. ('crypt is', 'i\xe2>\xc9\x17P\xbe\x9fE\xcb\xd9\xf9\xe6\xb99Q\xab\xf5\xe62!\x84u\
  54. x19\xbd\x96\xef\xb0\x80\x9f<\xd3')
  55. ('userkey is', '\x0e\xc0\x13\x8e\xf4h\xf4\xb3\xd9\xb3\x15\x86\xffS"\xd5I[\xbd\xb
  56. 8')
  57. ('returnVal is', 'DsATjvRo9LPZsxWG/1Mi1Ulbvbg=\n')
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement