Accept ascii keys on put_key
[keymanager.git] / src / leap / keymanager / tests / test_keymanager.py
1 ## -*- coding: utf-8 -*-
2 # test_keymanager.py
3 # Copyright (C) 2013 LEAP
4 #
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU General Public License as published by
7 # the Free Software Foundation, either version 3 of the License, or
8 # (at your option) any later version.
9 #
10 # This program is distributed in the hope that it will be useful,
11 # but WITHOUT ANY WARRANTY; without even the implied warranty of
12 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 # GNU General Public License for more details.
14 #
15 # You should have received a copy of the GNU General Public License
16 # along with this program. If not, see <http://www.gnu.org/licenses/>.
17
18
19 """
20 Tests for the Key Manager.
21 """
22
23
24 from mock import Mock
25 from leap.common.testing.basetest import BaseLeapTest
26 from leap.soledad.client import Soledad
27 from leap.keymanager import (
28     KeyManager,
29     openpgp,
30     KeyNotFound,
31     errors,
32 )
33 from leap.keymanager.openpgp import OpenPGPKey
34 from leap.keymanager.keys import (
35     is_address,
36     build_key_from_dict,
37 )
38
39
40 ADDRESS = 'leap@leap.se'
41 ADDRESS_2 = 'anotheruser@leap.se'
42 GPG_BINARY_PATH = '/usr/bin/gpg'
43
44
45 class KeyManagerUtilTestCase(BaseLeapTest):
46
47     def setUp(self):
48         pass
49
50     def tearDown(self):
51         pass
52
53     def test_is_address(self):
54         self.assertTrue(
55             is_address('user@leap.se'),
56             'Incorrect address detection.')
57         self.assertFalse(
58             is_address('userleap.se'),
59             'Incorrect address detection.')
60         self.assertFalse(
61             is_address('user@'),
62             'Incorrect address detection.')
63         self.assertFalse(
64             is_address('@leap.se'),
65             'Incorrect address detection.')
66
67     def test_build_key_from_dict(self):
68         kdict = {
69             'address': ADDRESS,
70             'key_id': 'key_id',
71             'fingerprint': 'fingerprint',
72             'key_data': 'key_data',
73             'private': 'private',
74             'length': 'length',
75             'expiry_date': 'expiry_date',
76             'first_seen_at': 'first_seen_at',
77             'last_audited_at': 'last_audited_at',
78             'validation': 'validation',
79         }
80         key = build_key_from_dict(OpenPGPKey, ADDRESS, kdict)
81         self.assertEqual(
82             kdict['address'], key.address,
83             'Wrong data in key.')
84         self.assertEqual(
85             kdict['key_id'], key.key_id,
86             'Wrong data in key.')
87         self.assertEqual(
88             kdict['fingerprint'], key.fingerprint,
89             'Wrong data in key.')
90         self.assertEqual(
91             kdict['key_data'], key.key_data,
92             'Wrong data in key.')
93         self.assertEqual(
94             kdict['private'], key.private,
95             'Wrong data in key.')
96         self.assertEqual(
97             kdict['length'], key.length,
98             'Wrong data in key.')
99         self.assertEqual(
100             kdict['expiry_date'], key.expiry_date,
101             'Wrong data in key.')
102         self.assertEqual(
103             kdict['first_seen_at'], key.first_seen_at,
104             'Wrong data in key.')
105         self.assertEqual(
106             kdict['last_audited_at'], key.last_audited_at,
107             'Wrong data in key.')
108         self.assertEqual(
109             kdict['validation'], key.validation,
110             'Wrong data in key.')
111
112
113 class KeyManagerWithSoledadTestCase(BaseLeapTest):
114
115     def setUp(self):
116         # mock key fetching and storing so Soledad doesn't fail when trying to
117         # reach the server.
118         Soledad._get_secrets_from_shared_db = Mock(return_value=None)
119         Soledad._put_secrets_in_shared_db = Mock(return_value=None)
120
121         class MockSharedDB(object):
122
123             get_doc = Mock(return_value=None)
124             put_doc = Mock()
125             lock = Mock(return_value=('atoken', 300))
126             unlock = Mock(return_value=True)
127
128             def __call__(self):
129                 return self
130
131         Soledad._shared_db = MockSharedDB()
132
133         self._soledad = Soledad(
134             u"leap@leap.se",
135             u"123456",
136             secrets_path=self.tempdir + "/secret.gpg",
137             local_db_path=self.tempdir + "/soledad.u1db",
138             server_url='',
139             cert_file=None,
140             auth_token=None,
141         )
142
143     def tearDown(self):
144         km = self._key_manager()
145         for key in km.get_all_keys():
146             km._wrapper_map[key.__class__].delete_key(key)
147         for key in km.get_all_keys(private=True):
148             km._wrapper_map[key.__class__].delete_key(key)
149
150     def _key_manager(self, user=ADDRESS, url='', token=None):
151         return KeyManager(user, url, self._soledad, token=token,
152                           gpgbinary=GPG_BINARY_PATH)
153
154
155 class OpenPGPCryptoTestCase(KeyManagerWithSoledadTestCase):
156
157     def _test_openpgp_gen_key(self):
158         pgp = openpgp.OpenPGPScheme(self._soledad)
159         self.assertRaises(KeyNotFound, pgp.get_key, 'user@leap.se')
160         key = pgp.gen_key('user@leap.se')
161         self.assertIsInstance(key, openpgp.OpenPGPKey)
162         self.assertEqual(
163             'user@leap.se', key.address, 'Wrong address bound to key.')
164         self.assertEqual(
165             '4096', key.length, 'Wrong key length.')
166
167     def test_openpgp_put_delete_key(self):
168         pgp = openpgp.OpenPGPScheme(
169             self._soledad, gpgbinary=GPG_BINARY_PATH)
170         self.assertRaises(KeyNotFound, pgp.get_key, ADDRESS)
171         pgp.put_ascii_key(PUBLIC_KEY)
172         key = pgp.get_key(ADDRESS, private=False)
173         pgp.delete_key(key)
174         self.assertRaises(KeyNotFound, pgp.get_key, ADDRESS)
175
176     def test_openpgp_put_ascii_key(self):
177         pgp = openpgp.OpenPGPScheme(
178             self._soledad, gpgbinary=GPG_BINARY_PATH)
179         self.assertRaises(KeyNotFound, pgp.get_key, ADDRESS)
180         pgp.put_ascii_key(PUBLIC_KEY)
181         key = pgp.get_key(ADDRESS, private=False)
182         self.assertIsInstance(key, openpgp.OpenPGPKey)
183         self.assertEqual(
184             ADDRESS, key.address, 'Wrong address bound to key.')
185         self.assertEqual(
186             '4096', key.length, 'Wrong key length.')
187         pgp.delete_key(key)
188         self.assertRaises(KeyNotFound, pgp.get_key, ADDRESS)
189
190     def test_get_public_key(self):
191         pgp = openpgp.OpenPGPScheme(
192             self._soledad, gpgbinary=GPG_BINARY_PATH)
193         self.assertRaises(KeyNotFound, pgp.get_key, ADDRESS)
194         pgp.put_ascii_key(PUBLIC_KEY)
195         self.assertRaises(
196             KeyNotFound, pgp.get_key, ADDRESS, private=True)
197         key = pgp.get_key(ADDRESS, private=False)
198         self.assertEqual(ADDRESS, key.address)
199         self.assertFalse(key.private)
200         self.assertEqual(KEY_FINGERPRINT, key.fingerprint)
201         pgp.delete_key(key)
202         self.assertRaises(KeyNotFound, pgp.get_key, ADDRESS)
203
204     def test_openpgp_encrypt_decrypt(self):
205         # encrypt
206         pgp = openpgp.OpenPGPScheme(
207             self._soledad, gpgbinary=GPG_BINARY_PATH)
208         pgp.put_ascii_key(PUBLIC_KEY)
209         pubkey = pgp.get_key(ADDRESS, private=False)
210         cyphertext = pgp.encrypt('data', pubkey)
211         # assert
212         self.assertTrue(cyphertext is not None)
213         self.assertTrue(cyphertext != '')
214         self.assertTrue(cyphertext != 'data')
215         self.assertTrue(pgp.is_encrypted(cyphertext))
216         self.assertTrue(pgp.is_encrypted(cyphertext))
217         # decrypt
218         self.assertRaises(
219             KeyNotFound, pgp.get_key, ADDRESS, private=True)
220         pgp.put_ascii_key(PRIVATE_KEY)
221         privkey = pgp.get_key(ADDRESS, private=True)
222         plaintext = pgp.decrypt(cyphertext, privkey)
223         pgp.delete_key(pubkey)
224         pgp.delete_key(privkey)
225         self.assertRaises(
226             KeyNotFound, pgp.get_key, ADDRESS, private=False)
227         self.assertRaises(
228             KeyNotFound, pgp.get_key, ADDRESS, private=True)
229
230     def test_verify_with_private_raises(self):
231         pgp = openpgp.OpenPGPScheme(
232             self._soledad, gpgbinary=GPG_BINARY_PATH)
233         pgp.put_ascii_key(PRIVATE_KEY)
234         data = 'data'
235         privkey = pgp.get_key(ADDRESS, private=True)
236         signed = pgp.sign(data, privkey)
237         self.assertRaises(
238             AssertionError,
239             pgp.verify, signed, privkey)
240
241     def test_sign_with_public_raises(self):
242         pgp = openpgp.OpenPGPScheme(
243             self._soledad, gpgbinary=GPG_BINARY_PATH)
244         pgp.put_ascii_key(PUBLIC_KEY)
245         data = 'data'
246         pubkey = pgp.get_key(ADDRESS, private=False)
247         self.assertRaises(
248             AssertionError,
249             pgp.sign, data, pubkey)
250
251     def test_verify_with_wrong_key_raises(self):
252         pgp = openpgp.OpenPGPScheme(
253             self._soledad, gpgbinary=GPG_BINARY_PATH)
254         pgp.put_ascii_key(PRIVATE_KEY)
255         data = 'data'
256         privkey = pgp.get_key(ADDRESS, private=True)
257         signed = pgp.sign(data, privkey)
258         pgp.put_ascii_key(PUBLIC_KEY_2)
259         wrongkey = pgp.get_key(ADDRESS_2)
260         self.assertRaises(
261             errors.InvalidSignature,
262             pgp.verify, signed, wrongkey)
263
264     def test_encrypt_sign_with_public_raises(self):
265         pgp = openpgp.OpenPGPScheme(
266             self._soledad, gpgbinary=GPG_BINARY_PATH)
267         pgp.put_ascii_key(PRIVATE_KEY)
268         data = 'data'
269         privkey = pgp.get_key(ADDRESS, private=True)
270         pubkey = pgp.get_key(ADDRESS, private=False)
271         self.assertRaises(
272             AssertionError,
273             pgp.encrypt, data, privkey, sign=pubkey)
274
275     def test_decrypt_verify_with_private_raises(self):
276         pgp = openpgp.OpenPGPScheme(
277             self._soledad, gpgbinary=GPG_BINARY_PATH)
278         pgp.put_ascii_key(PRIVATE_KEY)
279         data = 'data'
280         privkey = pgp.get_key(ADDRESS, private=True)
281         pubkey = pgp.get_key(ADDRESS, private=False)
282         encrypted_and_signed = pgp.encrypt(
283             data, pubkey, sign=privkey)
284         self.assertRaises(
285             AssertionError,
286             pgp.decrypt,
287             encrypted_and_signed, privkey, verify=privkey)
288
289     def test_decrypt_verify_with_wrong_key_raises(self):
290         pgp = openpgp.OpenPGPScheme(
291             self._soledad, gpgbinary=GPG_BINARY_PATH)
292         pgp.put_ascii_key(PRIVATE_KEY)
293         data = 'data'
294         privkey = pgp.get_key(ADDRESS, private=True)
295         pubkey = pgp.get_key(ADDRESS, private=False)
296         encrypted_and_signed = pgp.encrypt(data, pubkey, sign=privkey)
297         pgp.put_ascii_key(PUBLIC_KEY_2)
298         wrongkey = pgp.get_key(ADDRESS_2)
299         self.assertRaises(
300             errors.InvalidSignature,
301             pgp.verify, encrypted_and_signed, wrongkey)
302
303     def test_sign_verify(self):
304         pgp = openpgp.OpenPGPScheme(
305             self._soledad, gpgbinary=GPG_BINARY_PATH)
306         pgp.put_ascii_key(PRIVATE_KEY)
307         data = 'data'
308         privkey = pgp.get_key(ADDRESS, private=True)
309         signed = pgp.sign(data, privkey, detach=False)
310         pubkey = pgp.get_key(ADDRESS, private=False)
311         self.assertTrue(pgp.verify(signed, pubkey))
312
313     def test_encrypt_sign_decrypt_verify(self):
314         pgp = openpgp.OpenPGPScheme(
315             self._soledad, gpgbinary=GPG_BINARY_PATH)
316         pgp.put_ascii_key(PRIVATE_KEY)
317         pubkey = pgp.get_key(ADDRESS, private=False)
318         privkey = pgp.get_key(ADDRESS, private=True)
319         pgp.put_ascii_key(PRIVATE_KEY_2)
320         pubkey2 = pgp.get_key(ADDRESS_2, private=False)
321         privkey2 = pgp.get_key(ADDRESS_2, private=True)
322         data = 'data'
323         encrypted_and_signed = pgp.encrypt(
324             data, pubkey2, sign=privkey)
325         res = pgp.decrypt(
326             encrypted_and_signed, privkey2, verify=pubkey)
327         self.assertTrue(data, res)
328
329     def test_sign_verify_detached_sig(self):
330         pgp = openpgp.OpenPGPScheme(
331             self._soledad, gpgbinary=GPG_BINARY_PATH)
332         pgp.put_ascii_key(PRIVATE_KEY)
333         data = 'data'
334         privkey = pgp.get_key(ADDRESS, private=True)
335         signature = pgp.sign(data, privkey, detach=True)
336         pubkey = pgp.get_key(ADDRESS, private=False)
337         self.assertTrue(pgp.verify(data, pubkey, detached_sig=signature))
338
339
340 class KeyManagerKeyManagementTestCase(KeyManagerWithSoledadTestCase):
341
342     def test_get_all_keys_in_db(self):
343         km = self._key_manager()
344         km._wrapper_map[OpenPGPKey].put_ascii_key(PRIVATE_KEY)
345         # get public keys
346         keys = km.get_all_keys(False)
347         self.assertEqual(len(keys), 1, 'Wrong number of keys')
348         self.assertEqual(ADDRESS, keys[0].address)
349         self.assertFalse(keys[0].private)
350         # get private keys
351         keys = km.get_all_keys(True)
352         self.assertEqual(len(keys), 1, 'Wrong number of keys')
353         self.assertEqual(ADDRESS, keys[0].address)
354         self.assertTrue(keys[0].private)
355
356     def test_get_public_key(self):
357         km = self._key_manager()
358         km._wrapper_map[OpenPGPKey].put_ascii_key(PRIVATE_KEY)
359         # get the key
360         key = km.get_key(ADDRESS, OpenPGPKey, private=False,
361                          fetch_remote=False)
362         self.assertTrue(key is not None)
363         self.assertEqual(key.address, ADDRESS)
364         self.assertEqual(
365             key.fingerprint.lower(), KEY_FINGERPRINT.lower())
366         self.assertFalse(key.private)
367
368     def test_get_private_key(self):
369         km = self._key_manager()
370         km._wrapper_map[OpenPGPKey].put_ascii_key(PRIVATE_KEY)
371         # get the key
372         key = km.get_key(ADDRESS, OpenPGPKey, private=True,
373                          fetch_remote=False)
374         self.assertTrue(key is not None)
375         self.assertEqual(key.address, ADDRESS)
376         self.assertEqual(
377             key.fingerprint.lower(), KEY_FINGERPRINT.lower())
378         self.assertTrue(key.private)
379
380     def test_send_key_raises_key_not_found(self):
381         km = self._key_manager()
382         self.assertRaises(
383             KeyNotFound,
384             km.send_key, OpenPGPKey)
385
386     def test_send_key(self):
387         """
388         Test that request is well formed when sending keys to server.
389         """
390         token = "mytoken"
391         km = self._key_manager(token=token)
392         km._wrapper_map[OpenPGPKey].put_ascii_key(PUBLIC_KEY)
393         km._fetcher.put = Mock()
394         # the following data will be used on the send
395         km.ca_cert_path = 'capath'
396         km.session_id = 'sessionid'
397         km.uid = 'myuid'
398         km.api_uri = 'apiuri'
399         km.api_version = 'apiver'
400         km.send_key(OpenPGPKey)
401         # setup expected args
402         data = {
403             km.PUBKEY_KEY: km.get_key(km._address, OpenPGPKey).key_data,
404         }
405         url = '%s/%s/users/%s.json' % ('apiuri', 'apiver', 'myuid')
406         km._fetcher.put.assert_called_once_with(
407             url, data=data, verify='capath',
408             headers={'Authorization': 'Token token=%s' % token},
409         )
410
411     def test__fetch_keys_from_server(self):
412         """
413         Test that the request is well formed when fetching keys from server.
414         """
415         km = self._key_manager(url='http://nickserver.domain')
416
417         class Response(object):
418             status_code = 200
419             headers = {'content-type': 'application/json'}
420
421             def json(self):
422                 return {'address': ADDRESS_2, 'openpgp': PUBLIC_KEY_2}
423
424             def raise_for_status(self):
425                 pass
426
427         # mock the fetcher so it returns the key for ADDRESS_2
428         km._fetcher.get = Mock(
429             return_value=Response())
430         km.ca_cert_path = 'cacertpath'
431         # do the fetch
432         km._fetch_keys_from_server(ADDRESS_2)
433         # and verify the call
434         km._fetcher.get.assert_called_once_with(
435             'http://nickserver.domain',
436             data={'address': ADDRESS_2},
437             verify='cacertpath',
438         )
439
440     def test_get_key_fetches_from_server(self):
441         """
442         Test that getting a key successfuly fetches from server.
443         """
444         km = self._key_manager(url='http://nickserver.domain')
445
446         class Response(object):
447             status_code = 200
448             headers = {'content-type': 'application/json'}
449
450             def json(self):
451                 return {'address': ADDRESS, 'openpgp': PUBLIC_KEY}
452
453             def raise_for_status(self):
454                 pass
455
456         # mock the fetcher so it returns the key for ADDRESS_2
457         km._fetcher.get = Mock(return_value=Response())
458         km.ca_cert_path = 'cacertpath'
459         # try to key get without fetching from server
460         self.assertRaises(
461             KeyNotFound, km.get_key, ADDRESS, OpenPGPKey,
462             fetch_remote=False
463         )
464         # try to get key fetching from server.
465         key = km.get_key(ADDRESS, OpenPGPKey)
466         self.assertIsInstance(key, OpenPGPKey)
467         self.assertEqual(ADDRESS, key.address)
468
469     def test_put_key_ascii(self):
470         """
471         Test that putting ascii key works
472         """
473         km = self._key_manager(url='http://nickserver.domain')
474
475         km.put_key(PUBLIC_KEY)
476         key = km.get_key(ADDRESS, OpenPGPKey)
477         self.assertIsInstance(key, OpenPGPKey)
478         self.assertEqual(ADDRESS, key.address)
479
480
481 class KeyManagerCryptoTestCase(KeyManagerWithSoledadTestCase):
482
483     RAW_DATA = 'data'
484
485     def test_keymanager_openpgp_encrypt_decrypt(self):
486         km = self._key_manager()
487         # put raw private key
488         km._wrapper_map[OpenPGPKey].put_ascii_key(PRIVATE_KEY)
489         # get public key
490         pubkey = km.get_key(
491             ADDRESS, OpenPGPKey, private=False, fetch_remote=False)
492         # encrypt
493         encdata = km.encrypt(self.RAW_DATA, pubkey)
494         self.assertNotEqual(self.RAW_DATA, encdata)
495         # get private key
496         privkey = km.get_key(
497             ADDRESS, OpenPGPKey, private=True, fetch_remote=False)
498         # decrypt
499         rawdata = km.decrypt(encdata, privkey)
500         self.assertEqual(self.RAW_DATA, rawdata)
501
502     def test_keymanager_openpgp_sign_verify(self):
503         km = self._key_manager()
504         # put raw private keys
505         km._wrapper_map[OpenPGPKey].put_ascii_key(PRIVATE_KEY)
506         # get private key for signing
507         privkey = km.get_key(
508             ADDRESS, OpenPGPKey, private=True, fetch_remote=False)
509         # encrypt
510         signdata = km.sign(self.RAW_DATA, privkey, detach=False)
511         self.assertNotEqual(self.RAW_DATA, signdata)
512         # get public key for verifying
513         pubkey = km.get_key(
514             ADDRESS, OpenPGPKey, private=False, fetch_remote=False)
515         # decrypt
516         self.assertTrue(km.verify(signdata, pubkey))
517
518
519 # Key material for testing
520
521 # key 24D18DDF: public key "Leap Test Key <leap@leap.se>"
522 KEY_FINGERPRINT = "E36E738D69173C13D709E44F2F455E2824D18DDF"
523 PUBLIC_KEY = """
524 -----BEGIN PGP PUBLIC KEY BLOCK-----
525 Version: GnuPG v1.4.10 (GNU/Linux)
526
527 mQINBFC9+dkBEADNRfwV23TWEoGc/x0wWH1P7PlXt8MnC2Z1kKaKKmfnglVrpOiz
528 iLWoiU58sfZ0L5vHkzXHXCBf6Eiy/EtUIvdiWAn+yASJ1mk5jZTBKO/WMAHD8wTO
529 zpMsFmWyg3xc4DkmFa9KQ5EVU0o/nqPeyQxNMQN7px5pPwrJtJFmPxnxm+aDkPYx
530 irDmz/4DeDNqXliazGJKw7efqBdlwTHkl9Akw2gwy178pmsKwHHEMOBOFFvX61AT
531 huKqHYmlCGSliwbrJppTG7jc1/ls3itrK+CWTg4txREkSpEVmfcASvw/ZqLbjgfs
532 d/INMwXnR9U81O8+7LT6yw/ca4ppcFoJD7/XJbkRiML6+bJ4Dakiy6i727BzV17g
533 wI1zqNvm5rAhtALKfACha6YO43aJzairO4II1wxVHvRDHZn2IuKDDephQ3Ii7/vb
534 hUOf6XCSmchkAcpKXUOvbxm1yfB1LRa64mMc2RcZxf4mW7KQkulBsdV5QG2276lv
535 U2UUy2IutXcGP5nXC+f6sJJGJeEToKJ57yiO/VWJFjKN8SvP+7AYsQSqINUuEf6H
536 T5gCPCraGMkTUTPXrREvu7NOohU78q6zZNaL3GW8ai7eSeANSuQ8Vzffx7Wd8Y7i
537 Pw9sYj0SMFs1UgjbuL6pO5ueHh+qyumbtAq2K0Bci0kqOcU4E9fNtdiovQARAQAB
538 tBxMZWFwIFRlc3QgS2V5IDxsZWFwQGxlYXAuc2U+iQI3BBMBCAAhBQJQvfnZAhsD
539 BQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJEC9FXigk0Y3fT7EQAKH3IuRniOpb
540 T/DDIgwwjz3oxB/W0DDMyPXowlhSOuM0rgGfntBpBb3boezEXwL86NPQxNGGruF5
541 hkmecSiuPSvOmQlqlS95NGQp6hNG0YaKColh+Q5NTspFXCAkFch9oqUje0LdxfSP
542 QfV9UpeEvGyPmk1I9EJV/YDmZ4+Djge1d7qhVZInz4Rx1NrSyF/Tc2EC0VpjQFsU
543 Y9Kb2YBBR7ivG6DBc8ty0jJXi7B4WjkFcUEJviQpMF2dCLdonCehYs1PqsN1N7j+
544 eFjQd+hqVMJgYuSGKjvuAEfClM6MQw7+FmFwMyLgK/Ew/DttHEDCri77SPSkOGSI
545 txCzhTg6798f6mJr7WcXmHX1w1Vcib5FfZ8vTDFVhz/XgAgArdhPo9V6/1dgSSiB
546 KPQ/spsco6u5imdOhckERE0lnAYvVT6KE81TKuhF/b23u7x+Wdew6kK0EQhYA7wy
547 7LmlaNXc7rMBQJ9Z60CJ4JDtatBWZ0kNrt2VfdDHVdqBTOpl0CraNUjWE5YMDasr
548 K2dF5IX8D3uuYtpZnxqg0KzyLg0tzL0tvOL1C2iudgZUISZNPKbS0z0v+afuAAnx
549 2pTC3uezbh2Jt8SWTLhll4i0P4Ps5kZ6HQUO56O+/Z1cWovX+mQekYFmERySDR9n
550 3k1uAwLilJmRmepGmvYbB8HloV8HqwgguQINBFC9+dkBEAC0I/xn1uborMgDvBtf
551 H0sEhwnXBC849/32zic6udB6/3Efk9nzbSpL3FSOuXITZsZgCHPkKarnoQ2ztMcS
552 sh1ke1C5gQGms75UVmM/nS+2YI4vY8OX/GC/on2vUyncqdH+bR6xH5hx4NbWpfTs
553 iQHmz5C6zzS/kuabGdZyKRaZHt23WQ7JX/4zpjqbC99DjHcP9BSk7tJ8wI4bkMYD
554 uFVQdT9O6HwyKGYwUU4sAQRAj7XCTGvVbT0dpgJwH4RmrEtJoHAx4Whg8mJ710E0
555 GCmzf2jqkNuOw76ivgk27Kge+Hw00jmJjQhHY0yVbiaoJwcRrPKzaSjEVNgrpgP3
556 lXPRGQArgESsIOTeVVHQ8fhK2YtTeCY9rIiO+L0OX2xo9HK7hfHZZWL6rqymXdyS
557 fhzh/f6IPyHFWnvj7Brl7DR8heMikygcJqv+ed2yx7iLyCUJ10g12I48+aEj1aLe
558 dP7lna32iY8/Z0SHQLNH6PXO9SlPcq2aFUgKqE75A/0FMk7CunzU1OWr2ZtTLNO1
559 WT/13LfOhhuEq9jTyTosn0WxBjJKq18lnhzCXlaw6EAtbA7CUwsD3CTPR56aAXFK
560 3I7KXOVAqggrvMe5Tpdg5drfYpI8hZovL5aAgb+7Y5ta10TcJdUhS5K3kFAWe/td
561 U0cmWUMDP1UMSQ5Jg6JIQVWhSwARAQABiQIfBBgBCAAJBQJQvfnZAhsMAAoJEC9F
562 Xigk0Y3fRwsP/i0ElYCyxeLpWJTwo1iCLkMKz2yX1lFVa9nT1BVTPOQwr/IAc5OX
563 NdtbJ14fUsKL5pWgW8OmrXtwZm1y4euI1RPWWubG01ouzwnGzv26UcuHeqC5orZj
564 cOnKtL40y8VGMm8LoicVkRJH8blPORCnaLjdOtmA3rx/v2EXrJpSa3AhOy0ZSRXk
565 ZSrK68AVNwamHRoBSYyo0AtaXnkPX4+tmO8X8BPfj125IljubvwZPIW9VWR9UqCE
566 VPfDR1XKegVb6VStIywF7kmrknM1C5qUY28rdZYWgKorw01hBGV4jTW0cqde3N51
567 XT1jnIAa+NoXUM9uQoGYMiwrL7vNsLlyyiW5ayDyV92H/rIuiqhFgbJsHTlsm7I8
568 oGheR784BagAA1NIKD1qEO9T6Kz9lzlDaeWS5AUKeXrb7ZJLI1TTCIZx5/DxjLqM
569 Tt/RFBpVo9geZQrvLUqLAMwdaUvDXC2c6DaCPXTh65oCZj/hqzlJHH+RoTWWzKI+
570 BjXxgUWF9EmZUBrg68DSmI+9wuDFsjZ51BcqvJwxyfxtTaWhdoYqH/UQS+D1FP3/
571 diZHHlzwVwPICzM9ooNTgbrcDzyxRkIVqsVwBq7EtzcvgYUyX53yG25Giy6YQaQ2
572 ZtQ/VymwFL3XdUWV6B/hU4PVAFvO3qlOtdJ6TpE+nEWgcWjCv5g7RjXX
573 =MuOY
574 -----END PGP PUBLIC KEY BLOCK-----
575 """
576 PRIVATE_KEY = """
577 -----BEGIN PGP PRIVATE KEY BLOCK-----
578 Version: GnuPG v1.4.10 (GNU/Linux)
579
580 lQcYBFC9+dkBEADNRfwV23TWEoGc/x0wWH1P7PlXt8MnC2Z1kKaKKmfnglVrpOiz
581 iLWoiU58sfZ0L5vHkzXHXCBf6Eiy/EtUIvdiWAn+yASJ1mk5jZTBKO/WMAHD8wTO
582 zpMsFmWyg3xc4DkmFa9KQ5EVU0o/nqPeyQxNMQN7px5pPwrJtJFmPxnxm+aDkPYx
583 irDmz/4DeDNqXliazGJKw7efqBdlwTHkl9Akw2gwy178pmsKwHHEMOBOFFvX61AT
584 huKqHYmlCGSliwbrJppTG7jc1/ls3itrK+CWTg4txREkSpEVmfcASvw/ZqLbjgfs
585 d/INMwXnR9U81O8+7LT6yw/ca4ppcFoJD7/XJbkRiML6+bJ4Dakiy6i727BzV17g
586 wI1zqNvm5rAhtALKfACha6YO43aJzairO4II1wxVHvRDHZn2IuKDDephQ3Ii7/vb
587 hUOf6XCSmchkAcpKXUOvbxm1yfB1LRa64mMc2RcZxf4mW7KQkulBsdV5QG2276lv
588 U2UUy2IutXcGP5nXC+f6sJJGJeEToKJ57yiO/VWJFjKN8SvP+7AYsQSqINUuEf6H
589 T5gCPCraGMkTUTPXrREvu7NOohU78q6zZNaL3GW8ai7eSeANSuQ8Vzffx7Wd8Y7i
590 Pw9sYj0SMFs1UgjbuL6pO5ueHh+qyumbtAq2K0Bci0kqOcU4E9fNtdiovQARAQAB
591 AA/+JHtlL39G1wsH9R6UEfUQJGXR9MiIiwZoKcnRB2o8+DS+OLjg0JOh8XehtuCs
592 E/8oGQKtQqa5bEIstX7IZoYmYFiUQi9LOzIblmp2vxOm+HKkxa4JszWci2/ZmC3t
593 KtaA4adl9XVnshoQ7pijuCMUKB3naBEOAxd8s9d/JeReGIYkJErdrnVfNk5N71Ds
594 FmH5Ll3XtEDvgBUQP3nkA6QFjpsaB94FHjL3gDwum/cxzj6pCglcvHOzEhfY0Ddb
595 J967FozQTaf2JW3O+w3LOqtcKWpq87B7+O61tVidQPSSuzPjCtFF0D2LC9R/Hpky
596 KTMQ6CaKja4MPhjwywd4QPcHGYSqjMpflvJqi+kYIt8psUK/YswWjnr3r4fbuqVY
597 VhtiHvnBHQjz135lUqWvEz4hM3Xpnxydx7aRlv5NlevK8+YIO5oFbWbGNTWsPZI5
598 jpoFBpSsnR1Q5tnvtNHauvoWV+XN2qAOBTG+/nEbDYH6Ak3aaE9jrpTdYh0CotYF
599 q7csANsDy3JvkAzeU6WnYpsHHaAjqOGyiZGsLej1UcXPFMosE/aUo4WQhiS8Zx2c
600 zOVKOi/X5vQ2GdNT9Qolz8AriwzsvFR+bxPzyd8V6ALwDsoXvwEYinYBKK8j0OPv
601 OOihSR6HVsuP9NUZNU9ewiGzte/+/r6pNXHvR7wTQ8EWLcEIAN6Zyrb0bHZTIlxt
602 VWur/Ht2mIZrBaO50qmM5RD3T5oXzWXi/pjLrIpBMfeZR9DWfwQwjYzwqi7pxtYx
603 nJvbMuY505rfnMoYxb4J+cpRXV8MS7Dr1vjjLVUC9KiwSbM3gg6emfd2yuA93ihv
604 Pe3mffzLIiQa4mRE3wtGcioC43nWuV2K2e1KjxeFg07JhrezA/1Cak505ab/tmvP
605 4YmjR5c44+yL/YcQ3HdFgs4mV+nVbptRXvRcPpolJsgxPccGNdvHhsoR4gwXMS3F
606 RRPD2z6x8xeN73Q4KH3bm01swQdwFBZbWVfmUGLxvN7leCdfs9+iFJyqHiCIB6Iv
607 mQfp8F0IAOwSo8JhWN+V1dwML4EkIrM8wUb4yecNLkyR6TpPH/qXx4PxVMC+vy6x
608 sCtjeHIwKE+9vqnlhd5zOYh7qYXEJtYwdeDDmDbL8oks1LFfd+FyAuZXY33DLwn0
609 cRYsr2OEZmaajqUB3NVmj3H4uJBN9+paFHyFSXrH68K1Fk2o3n+RSf2EiX+eICwI
610 L6rqoF5sSVUghBWdNegV7qfy4anwTQwrIMGjgU5S6PKW0Dr/3iO5z3qQpGPAj5OW
611 ATqPWkDICLbObPxD5cJlyyNE2wCA9VVc6/1d6w4EVwSq9h3/WTpATEreXXxTGptd
612 LNiTA1nmakBYNO2Iyo3djhaqBdWjk+EIAKtVEnJH9FAVwWOvaj1RoZMA5DnDMo7e
613 SnhrCXl8AL7Z1WInEaybasTJXn1uQ8xY52Ua4b8cbuEKRKzw/70NesFRoMLYoHTO
614 dyeszvhoDHberpGRTciVmpMu7Hyi33rM31K9epA4ib6QbbCHnxkWOZB+Bhgj1hJ8
615 xb4RBYWiWpAYcg0+DAC3w9gfxQhtUlZPIbmbrBmrVkO2GVGUj8kH6k4UV6kUHEGY
616 HQWQR0HcbKcXW81ZXCCD0l7ROuEWQtTe5Jw7dJ4/QFuqZnPutXVRNOZqpl6eRShw
617 7X2/a29VXBpmHA95a88rSQsL+qm7Fb3prqRmuMCtrUZgFz7HLSTuUMR867QcTGVh
618 cCBUZXN0IEtleSA8bGVhcEBsZWFwLnNlPokCNwQTAQgAIQUCUL352QIbAwULCQgH
619 AwUVCgkICwUWAgMBAAIeAQIXgAAKCRAvRV4oJNGN30+xEACh9yLkZ4jqW0/wwyIM
620 MI896MQf1tAwzMj16MJYUjrjNK4Bn57QaQW926HsxF8C/OjT0MTRhq7heYZJnnEo
621 rj0rzpkJapUveTRkKeoTRtGGigqJYfkOTU7KRVwgJBXIfaKlI3tC3cX0j0H1fVKX
622 hLxsj5pNSPRCVf2A5mePg44HtXe6oVWSJ8+EcdTa0shf03NhAtFaY0BbFGPSm9mA
623 QUe4rxugwXPLctIyV4uweFo5BXFBCb4kKTBdnQi3aJwnoWLNT6rDdTe4/nhY0Hfo
624 alTCYGLkhio77gBHwpTOjEMO/hZhcDMi4CvxMPw7bRxAwq4u+0j0pDhkiLcQs4U4
625 Ou/fH+pia+1nF5h19cNVXIm+RX2fL0wxVYc/14AIAK3YT6PVev9XYEkogSj0P7Kb
626 HKOruYpnToXJBERNJZwGL1U+ihPNUyroRf29t7u8flnXsOpCtBEIWAO8Muy5pWjV
627 3O6zAUCfWetAieCQ7WrQVmdJDa7dlX3Qx1XagUzqZdAq2jVI1hOWDA2rKytnReSF
628 /A97rmLaWZ8aoNCs8i4NLcy9Lbzi9QtornYGVCEmTTym0tM9L/mn7gAJ8dqUwt7n
629 s24dibfElky4ZZeItD+D7OZGeh0FDuejvv2dXFqL1/pkHpGBZhEckg0fZ95NbgMC
630 4pSZkZnqRpr2GwfB5aFfB6sIIJ0HGARQvfnZARAAtCP8Z9bm6KzIA7wbXx9LBIcJ
631 1wQvOPf99s4nOrnQev9xH5PZ820qS9xUjrlyE2bGYAhz5Cmq56ENs7THErIdZHtQ
632 uYEBprO+VFZjP50vtmCOL2PDl/xgv6J9r1Mp3KnR/m0esR+YceDW1qX07IkB5s+Q
633 us80v5LmmxnWcikWmR7dt1kOyV/+M6Y6mwvfQ4x3D/QUpO7SfMCOG5DGA7hVUHU/
634 Tuh8MihmMFFOLAEEQI+1wkxr1W09HaYCcB+EZqxLSaBwMeFoYPJie9dBNBgps39o
635 6pDbjsO+or4JNuyoHvh8NNI5iY0IR2NMlW4mqCcHEazys2koxFTYK6YD95Vz0RkA
636 K4BErCDk3lVR0PH4StmLU3gmPayIjvi9Dl9saPRyu4Xx2WVi+q6spl3ckn4c4f3+
637 iD8hxVp74+wa5ew0fIXjIpMoHCar/nndsse4i8glCddINdiOPPmhI9Wi3nT+5Z2t
638 9omPP2dEh0CzR+j1zvUpT3KtmhVICqhO+QP9BTJOwrp81NTlq9mbUyzTtVk/9dy3
639 zoYbhKvY08k6LJ9FsQYySqtfJZ4cwl5WsOhALWwOwlMLA9wkz0eemgFxStyOylzl
640 QKoIK7zHuU6XYOXa32KSPIWaLy+WgIG/u2ObWtdE3CXVIUuSt5BQFnv7XVNHJllD
641 Az9VDEkOSYOiSEFVoUsAEQEAAQAP/1AagnZQZyzHDEgw4QELAspYHCWLXE5aZInX
642 wTUJhK31IgIXNn9bJ0hFiSpQR2xeMs9oYtRuPOu0P8oOFMn4/z374fkjZy8QVY3e
643 PlL+3EUeqYtkMwlGNmVw5a/NbNuNfm5Darb7pEfbYd1gPcni4MAYw7R2SG/57GbC
644 9gucvspHIfOSfBNLBthDzmK8xEKe1yD2eimfc2T7IRYb6hmkYfeds5GsqvGI6mwI
645 85h4uUHWRc5JOlhVM6yX8hSWx0L60Z3DZLChmc8maWnFXd7C8eQ6P1azJJbW71Ih
646 7CoK0XW4LE82vlQurSRFgTwfl7wFYszW2bOzCuhHDDtYnwH86Nsu0DC78ZVRnvxn
647 E8Ke/AJgrdhIOo4UAyR+aZD2+2mKd7/waOUTUrUtTzc7i8N3YXGi/EIaNReBXaq+
648 ZNOp24BlFzRp+FCF/pptDW9HjPdiV09x0DgICmeZS4Gq/4vFFIahWctg52NGebT0
649 Idxngjj+xDtLaZlLQoOz0n5ByjO/Wi0ANmMv1sMKCHhGvdaSws2/PbMR2r4caj8m
650 KXpIgdinM/wUzHJ5pZyF2U/qejsRj8Kw8KH/tfX4JCLhiaP/mgeTuWGDHeZQERAT
651 xPmRFHaLP9/ZhvGNh6okIYtrKjWTLGoXvKLHcrKNisBLSq+P2WeFrlme1vjvJMo/
652 jPwLT5o9CADQmcbKZ+QQ1ZM9v99iDZol7SAMZX43JC019sx6GK0u6xouJBcLfeB4
653 OXacTgmSYdTa9RM9fbfVpti01tJ84LV2SyL/VJq/enJF4XQPSynT/tFTn1PAor6o
654 tEAAd8fjKdJ6LnD5wb92SPHfQfXqI84rFEO8rUNIE/1ErT6DYifDzVCbfD2KZdoF
655 cOSp7TpD77sY1bs74ocBX5ejKtd+aH99D78bJSMM4pSDZsIEwnomkBHTziubPwJb
656 OwnATy0LmSMAWOw5rKbsh5nfwCiUTM20xp0t5JeXd+wPVWbpWqI2EnkCEN+RJr9i
657 7dp/ymDQ+Yt5wrsN3NwoyiexPOG91WQVCADdErHsnglVZZq9Z8Wx7KwecGCUurJ2
658 H6lKudv5YOxPnAzqZS5HbpZd/nRTMZh2rdXCr5m2YOuewyYjvM757AkmUpM09zJX
659 MQ1S67/UX2y8/74TcRF97Ncx9HeELs92innBRXoFitnNguvcO6Esx4BTe1OdU6qR
660 ER3zAmVf22Le9ciXbu24DN4mleOH+OmBx7X2PqJSYW9GAMTsRB081R6EWKH7romQ
661 waxFrZ4DJzZ9ltyosEJn5F32StyLrFxpcrdLUoEaclZCv2qka7sZvi0EvovDVEBU
662 e10jOx9AOwf8Gj2ufhquQ6qgVYCzbP+YrodtkFrXRS3IsljIchj1M2ffB/0bfoUs
663 rtER9pLvYzCjBPg8IfGLw0o754Qbhh/ReplCRTusP/fQMybvCvfxreS3oyEriu/G
664 GufRomjewZ8EMHDIgUsLcYo2UHZsfF7tcazgxMGmMvazp4r8vpgrvW/8fIN/6Adu
665 tF+WjWDTvJLFJCe6O+BFJOWrssNrrra1zGtLC1s8s+Wfpe+bGPL5zpHeebGTwH1U
666 22eqgJArlEKxrfarz7W5+uHZJHSjF/K9ZvunLGD0n9GOPMpji3UO3zeM8IYoWn7E
667 /EWK1XbjnssNemeeTZ+sDh+qrD7BOi+vCX1IyBxbfqnQfJZvmcPWpruy1UsO+aIC
668 0GY8Jr3OL69dDQ21jueJAh8EGAEIAAkFAlC9+dkCGwwACgkQL0VeKCTRjd9HCw/+
669 LQSVgLLF4ulYlPCjWIIuQwrPbJfWUVVr2dPUFVM85DCv8gBzk5c121snXh9Swovm
670 laBbw6ate3BmbXLh64jVE9Za5sbTWi7PCcbO/bpRy4d6oLmitmNw6cq0vjTLxUYy
671 bwuiJxWREkfxuU85EKdouN062YDevH+/YResmlJrcCE7LRlJFeRlKsrrwBU3BqYd
672 GgFJjKjQC1peeQ9fj62Y7xfwE9+PXbkiWO5u/Bk8hb1VZH1SoIRU98NHVcp6BVvp
673 VK0jLAXuSauSczULmpRjbyt1lhaAqivDTWEEZXiNNbRyp17c3nVdPWOcgBr42hdQ
674 z25CgZgyLCsvu82wuXLKJblrIPJX3Yf+si6KqEWBsmwdOWybsjygaF5HvzgFqAAD
675 U0goPWoQ71PorP2XOUNp5ZLkBQp5etvtkksjVNMIhnHn8PGMuoxO39EUGlWj2B5l
676 Cu8tSosAzB1pS8NcLZzoNoI9dOHrmgJmP+GrOUkcf5GhNZbMoj4GNfGBRYX0SZlQ
677 GuDrwNKYj73C4MWyNnnUFyq8nDHJ/G1NpaF2hiof9RBL4PUU/f92JkceXPBXA8gL
678 Mz2ig1OButwPPLFGQhWqxXAGrsS3Ny+BhTJfnfIbbkaLLphBpDZm1D9XKbAUvdd1
679 RZXoH+FTg9UAW87eqU610npOkT6cRaBxaMK/mDtGNdc=
680 =JTFu
681 -----END PGP PRIVATE KEY BLOCK-----
682 """
683
684 # key 7FEE575A: public key "anotheruser <anotheruser@leap.se>"
685 PUBLIC_KEY_2 = """
686 -----BEGIN PGP PUBLIC KEY BLOCK-----
687 Version: GnuPG v1.4.10 (GNU/Linux)
688
689 mI0EUYwJXgEEAMbTKHuPJ5/Gk34l9Z06f+0WCXTDXdte1UBoDtZ1erAbudgC4MOR
690 gquKqoj3Hhw0/ILqJ88GcOJmKK/bEoIAuKaqlzDF7UAYpOsPZZYmtRfPC2pTCnXq
691 Z1vdeqLwTbUspqXflkCkFtfhGKMq5rH8GV5a3tXZkRWZhdNwhVXZagC3ABEBAAG0
692 IWFub3RoZXJ1c2VyIDxhbm90aGVydXNlckBsZWFwLnNlPoi4BBMBAgAiBQJRjAle
693 AhsDBgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIXgAAKCRB/nfpof+5XWotuA/4tLN4E
694 gUr7IfLy2HkHAxzw7A4rqfMN92DIM9mZrDGaWRrOn3aVF7VU1UG7MDkHfPvp/cFw
695 ezoCw4s4IoHVc/pVlOkcHSyt4/Rfh248tYEJmFCJXGHpkK83VIKYJAithNccJ6Q4
696 JE/o06Mtf4uh/cA1HUL4a4ceqUhtpLJULLeKo7iNBFGMCV4BBADsyQI7GR0wSAxz
697 VayLjuPzgT+bjbFeymIhjuxKIEwnIKwYkovztW+4bbOcQs785k3Lp6RzvigTpQQt
698 Z/hwcLOqZbZw8t/24+D+Pq9mMP2uUvCFFqLlVvA6D3vKSQ/XNN+YB919WQ04jh63
699 yuRe94WenT1RJd6xU1aaUff4rKizuQARAQABiJ8EGAECAAkFAlGMCV4CGwwACgkQ
700 f536aH/uV1rPZQQAqCzRysOlu8ez7PuiBD4SebgRqWlxa1TF1ujzfLmuPivROZ2X
701 Kw5aQstxgGSjoB7tac49s0huh4X8XK+BtJBfU84JS8Jc2satlfwoyZ35LH6sDZck
702 I+RS/3we6zpMfHs3vvp9xgca6ZupQxivGtxlJs294TpJorx+mFFqbV17AzQ=
703 =Thdu
704 -----END PGP PUBLIC KEY BLOCK-----
705 """
706
707 PRIVATE_KEY_2 = """
708 -----BEGIN PGP PRIVATE KEY BLOCK-----
709 Version: GnuPG v1.4.10 (GNU/Linux)
710
711 lQHYBFGMCV4BBADG0yh7jyefxpN+JfWdOn/tFgl0w13bXtVAaA7WdXqwG7nYAuDD
712 kYKriqqI9x4cNPyC6ifPBnDiZiiv2xKCALimqpcwxe1AGKTrD2WWJrUXzwtqUwp1
713 6mdb3Xqi8E21LKal35ZApBbX4RijKuax/BleWt7V2ZEVmYXTcIVV2WoAtwARAQAB
714 AAP7BLuSAx7tOohnimEs74ks8l/L6dOcsFQZj2bqs4AoY3jFe7bV0tHr4llypb/8
715 H3/DYvpf6DWnCjyUS1tTnXSW8JXtx01BUKaAufSmMNg9blKV6GGHlT/Whe9uVyks
716 7XHk/+9mebVMNJ/kNlqq2k+uWqJohzC8WWLRK+d1tBeqDsECANZmzltPaqUsGV5X
717 C3zszE3tUBgptV/mKnBtopKi+VH+t7K6fudGcG+bAcZDUoH/QVde52mIIjjIdLje
718 uajJuHUCAO1mqh+vPoGv4eBLV7iBo3XrunyGXiys4a39eomhxTy3YktQanjjx+ty
719 GltAGCs5PbWGO6/IRjjvd46wh53kzvsCAO0J97gsWhzLuFnkxFAJSPk7RRlyl7lI
720 1XS/x0Og6j9XHCyY1OYkfBm0to3UlCfkgirzCYlTYObCofzdKFIPDmSqHbQhYW5v
721 dGhlcnVzZXIgPGFub3RoZXJ1c2VyQGxlYXAuc2U+iLgEEwECACIFAlGMCV4CGwMG
722 CwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEH+d+mh/7ldai24D/i0s3gSBSvsh
723 8vLYeQcDHPDsDiup8w33YMgz2ZmsMZpZGs6fdpUXtVTVQbswOQd8++n9wXB7OgLD
724 izgigdVz+lWU6RwdLK3j9F+Hbjy1gQmYUIlcYemQrzdUgpgkCK2E1xwnpDgkT+jT
725 oy1/i6H9wDUdQvhrhx6pSG2kslQst4qjnQHYBFGMCV4BBADsyQI7GR0wSAxzVayL
726 juPzgT+bjbFeymIhjuxKIEwnIKwYkovztW+4bbOcQs785k3Lp6RzvigTpQQtZ/hw
727 cLOqZbZw8t/24+D+Pq9mMP2uUvCFFqLlVvA6D3vKSQ/XNN+YB919WQ04jh63yuRe
728 94WenT1RJd6xU1aaUff4rKizuQARAQABAAP9EyElqJ3dq3EErXwwT4mMnbd1SrVC
729 rUJrNWQZL59mm5oigS00uIyR0SvusOr+UzTtd8ysRuwHy5d/LAZsbjQStaOMBILx
730 77TJveOel0a1QK0YSMF2ywZMCKvquvjli4hAtWYz/EwfuzQN3t23jc5ny+GqmqD2
731 3FUxLJosFUfLNmECAO9KhVmJi+L9dswIs+2Dkjd1eiRQzNOEVffvYkGYZyKxNiXF
732 UA5kvyZcB4iAN9sWCybE4WHZ9jd4myGB0MPDGxkCAP1RsXJbbuD6zS7BXe5gwunO
733 2q4q7ptdSl/sJYQuTe1KNP5d/uGsvlcFfsYjpsopasPjFBIncc/2QThMKlhoEaEB
734 /0mVAxpT6SrEvUbJ18z7kna24SgMPr3OnPMxPGfvNLJY/Xv/A17YfoqjmByCvsKE
735 JCDjopXtmbcrZyoEZbEht9mko4ifBBgBAgAJBQJRjAleAhsMAAoJEH+d+mh/7lda
736 z2UEAKgs0crDpbvHs+z7ogQ+Enm4EalpcWtUxdbo83y5rj4r0TmdlysOWkLLcYBk
737 o6Ae7WnOPbNIboeF/FyvgbSQX1POCUvCXNrGrZX8KMmd+Sx+rA2XJCPkUv98Hus6
738 THx7N776fcYHGumbqUMYrxrcZSbNveE6SaK8fphRam1dewM0
739 =a5gs
740 -----END PGP PRIVATE KEY BLOCK-----
741 """
742 import unittest
743 if __name__ == "__main__":
744     unittest.main()