48f7273afa22127fd0acf0992c41b0295c974ec4
[leap_pycommon.git] / src / leap / common / tests / test_keymanager.py
1 ## -*- coding: utf-8 -*-
2 # test_keymanager.py
3 # Copyright (C) 2013 LEAP
4 #
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU General Public License as published by
7 # the Free Software Foundation, either version 3 of the License, or
8 # (at your option) any later version.
9 #
10 # This program is distributed in the hope that it will be useful,
11 # but WITHOUT ANY WARRANTY; without even the implied warranty of
12 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 # GNU General Public License for more details.
14 #
15 # You should have received a copy of the GNU General Public License
16 # along with this program. If not, see <http://www.gnu.org/licenses/>.
17
18
19 """
20 Tests for the Key Manager.
21 """
22
23
24 from mock import Mock
25 try:
26     import simplejson as json
27 except ImportError:
28     import json  # noqa
29
30
31 from leap.common.testing.basetest import BaseLeapTest
32 from leap.soledad import Soledad
33 from leap.soledad.crypto import SoledadCrypto
34
35
36 from leap.common.keymanager import (
37     KeyManager,
38     openpgp,
39     KeyNotFound,
40     NoPasswordGiven,
41     TAGS_INDEX,
42     TAGS_AND_PRIVATE_INDEX,
43 )
44 from leap.common.keymanager.openpgp import OpenPGPKey
45 from leap.common.keymanager.keys import (
46     is_address,
47     build_key_from_dict,
48     keymanager_doc_id,
49 )
50 from leap.common.keymanager import errors
51
52
53 ADDRESS = 'leap@leap.se'
54 ADDRESS_2 = 'anotheruser@leap.se'
55
56
57 class KeyManagerUtilTestCase(BaseLeapTest):
58
59     def setUp(self):
60         pass
61
62     def tearDown(self):
63         pass
64
65     def test_is_address(self):
66         self.assertTrue(
67             is_address('user@leap.se'),
68             'Incorrect address detection.')
69         self.assertFalse(
70             is_address('userleap.se'),
71             'Incorrect address detection.')
72         self.assertFalse(
73             is_address('user@'),
74             'Incorrect address detection.')
75         self.assertFalse(
76             is_address('@leap.se'),
77             'Incorrect address detection.')
78
79     def test_build_key_from_dict(self):
80         kdict = {
81             'address': ADDRESS,
82             'key_id': 'key_id',
83             'fingerprint': 'fingerprint',
84             'key_data': 'key_data',
85             'private': 'private',
86             'length': 'length',
87             'expiry_date': 'expiry_date',
88             'first_seen_at': 'first_seen_at',
89             'last_audited_at': 'last_audited_at',
90             'validation': 'validation',
91         }
92         key = build_key_from_dict(OpenPGPKey, ADDRESS, kdict)
93         self.assertEqual(
94             kdict['address'], key.address,
95             'Wrong data in key.')
96         self.assertEqual(
97             kdict['key_id'], key.key_id,
98             'Wrong data in key.')
99         self.assertEqual(
100             kdict['fingerprint'], key.fingerprint,
101             'Wrong data in key.')
102         self.assertEqual(
103             kdict['key_data'], key.key_data,
104             'Wrong data in key.')
105         self.assertEqual(
106             kdict['private'], key.private,
107             'Wrong data in key.')
108         self.assertEqual(
109             kdict['length'], key.length,
110             'Wrong data in key.')
111         self.assertEqual(
112             kdict['expiry_date'], key.expiry_date,
113             'Wrong data in key.')
114         self.assertEqual(
115             kdict['first_seen_at'], key.first_seen_at,
116             'Wrong data in key.')
117         self.assertEqual(
118             kdict['last_audited_at'], key.last_audited_at,
119             'Wrong data in key.')
120         self.assertEqual(
121             kdict['validation'], key.validation,
122             'Wrong data in key.')
123
124     def test_keymanager_doc_id(self):
125         doc_id1 = keymanager_doc_id(
126             OpenPGPKey, ADDRESS, private=False)
127         doc_id2 = keymanager_doc_id(
128             OpenPGPKey, ADDRESS, private=True)
129         doc_id3 = keymanager_doc_id(
130             OpenPGPKey, 'user@leap.se', private=False)
131         doc_id4 = keymanager_doc_id(
132             OpenPGPKey, 'user@leap.se', private=True)
133         self.assertFalse(doc_id1 == doc_id2, 'Doc ids are equal!')
134         self.assertFalse(doc_id1 == doc_id3, 'Doc ids are equal!')
135         self.assertFalse(doc_id1 == doc_id4, 'Doc ids are equal!')
136         self.assertFalse(doc_id2 == doc_id3, 'Doc ids are equal!')
137         self.assertFalse(doc_id2 == doc_id4, 'Doc ids are equal!')
138         self.assertFalse(doc_id3 == doc_id4, 'Doc ids are equal!')
139
140
141 class KeyManagerWithSoledadTestCase(BaseLeapTest):
142
143     def setUp(self):
144         # mock key fetching and storing so Soledad doesn't fail when trying to
145         # reach the server.
146         Soledad._get_secrets_from_shared_db = Mock(return_value=None)
147         Soledad._put_secrets_in_shared_db = Mock(return_value=None)
148
149         self._soledad = Soledad(
150             "leap@leap.se",
151             "123456",
152             self.tempdir+"/secret.gpg",
153             self.tempdir+"/soledad.u1db",
154             '',
155             None,
156             auth_token=None,
157         )
158
159     def tearDown(self):
160         km = self._key_manager()
161         for key in km.get_all_keys_in_local_db():
162             km._wrapper_map[key.__class__].delete_key(key)
163         for key in km.get_all_keys_in_local_db(private=True):
164             km._wrapper_map[key.__class__].delete_key(key)
165
166     def _key_manager(self, user=ADDRESS, url=''):
167         return KeyManager(user, url, self._soledad)
168
169
170 class OpenPGPCryptoTestCase(KeyManagerWithSoledadTestCase):
171
172     def _test_openpgp_gen_key(self):
173         pgp = openpgp.OpenPGPScheme(self._soledad)
174         self.assertRaises(KeyNotFound, pgp.get_key, 'user@leap.se')
175         key = pgp.gen_key('user@leap.se')
176         self.assertIsInstance(key, openpgp.OpenPGPKey)
177         self.assertEqual(
178             'user@leap.se', key.address, 'Wrong address bound to key.')
179         self.assertEqual(
180             '4096', key.length, 'Wrong key length.')
181
182     def test_openpgp_put_delete_key(self):
183         pgp = openpgp.OpenPGPScheme(self._soledad)
184         self.assertRaises(KeyNotFound, pgp.get_key, ADDRESS)
185         pgp.put_ascii_key(PUBLIC_KEY)
186         key = pgp.get_key(ADDRESS, private=False)
187         pgp.delete_key(key)
188         self.assertRaises(KeyNotFound, pgp.get_key, ADDRESS)
189
190     def test_openpgp_put_ascii_key(self):
191         pgp = openpgp.OpenPGPScheme(self._soledad)
192         self.assertRaises(KeyNotFound, pgp.get_key, ADDRESS)
193         pgp.put_ascii_key(PUBLIC_KEY)
194         key = pgp.get_key(ADDRESS, private=False)
195         self.assertIsInstance(key, openpgp.OpenPGPKey)
196         self.assertEqual(
197             ADDRESS, key.address, 'Wrong address bound to key.')
198         self.assertEqual(
199             '4096', key.length, 'Wrong key length.')
200         pgp.delete_key(key)
201         self.assertRaises(KeyNotFound, pgp.get_key, ADDRESS)
202
203     def test_get_public_key(self):
204         pgp = openpgp.OpenPGPScheme(self._soledad)
205         self.assertRaises(KeyNotFound, pgp.get_key, ADDRESS)
206         pgp.put_ascii_key(PUBLIC_KEY)
207         self.assertRaises(
208             KeyNotFound, pgp.get_key, ADDRESS, private=True)
209         key = pgp.get_key(ADDRESS, private=False)
210         self.assertEqual(ADDRESS, key.address)
211         self.assertFalse(key.private)
212         self.assertEqual(KEY_FINGERPRINT, key.fingerprint)
213         pgp.delete_key(key)
214         self.assertRaises(KeyNotFound, pgp.get_key, ADDRESS)
215
216     def test_openpgp_encrypt_decrypt_asym(self):
217         # encrypt
218         pgp = openpgp.OpenPGPScheme(self._soledad)
219         pgp.put_ascii_key(PUBLIC_KEY)
220         pubkey = pgp.get_key(ADDRESS, private=False)
221         cyphertext = openpgp.encrypt_asym('data', pubkey)
222         # assert
223         self.assertTrue(cyphertext is not None)
224         self.assertTrue(cyphertext != '')
225         self.assertTrue(cyphertext != 'data')
226         self.assertTrue(openpgp.is_encrypted_asym(cyphertext))
227         self.assertFalse(openpgp.is_encrypted_sym(cyphertext))
228         self.assertTrue(openpgp.is_encrypted(cyphertext))
229         # decrypt
230         self.assertRaises(
231             KeyNotFound, pgp.get_key, ADDRESS, private=True)
232         pgp.put_ascii_key(PRIVATE_KEY)
233         privkey = pgp.get_key(ADDRESS, private=True)
234         plaintext = openpgp.decrypt_asym(cyphertext, privkey)
235         pgp.delete_key(pubkey)
236         pgp.delete_key(privkey)
237         self.assertRaises(
238             KeyNotFound, pgp.get_key, ADDRESS, private=False)
239         self.assertRaises(
240             KeyNotFound, pgp.get_key, ADDRESS, private=True)
241
242     def test_openpgp_encrypt_decrypt_sym(self):
243         cyphertext = openpgp.encrypt_sym('data', 'pass')
244         self.assertTrue(cyphertext is not None)
245         self.assertTrue(cyphertext != '')
246         self.assertTrue(cyphertext != 'data')
247         self.assertTrue(openpgp.is_encrypted_sym(cyphertext))
248         self.assertFalse(openpgp.is_encrypted_asym(cyphertext))
249         self.assertTrue(openpgp.is_encrypted(cyphertext))
250         plaintext = openpgp.decrypt_sym(cyphertext, 'pass')
251         self.assertEqual('data', plaintext)
252
253     def test_verify_with_private_raises(self):
254         pgp = openpgp.OpenPGPScheme(self._soledad)
255         pgp.put_ascii_key(PRIVATE_KEY)
256         data = 'data'
257         privkey = pgp.get_key(ADDRESS, private=True)
258         signed = openpgp.sign(data, privkey)
259         self.assertRaises(
260             AssertionError,
261             openpgp.verify, signed, privkey)
262
263     def test_sign_with_public_raises(self):
264         pgp = openpgp.OpenPGPScheme(self._soledad)
265         pgp.put_ascii_key(PUBLIC_KEY)
266         data = 'data'
267         pubkey = pgp.get_key(ADDRESS, private=False)
268         self.assertRaises(
269             AssertionError,
270             openpgp.sign, data, pubkey)
271
272     def test_verify_with_wrong_key_raises(self):
273         pgp = openpgp.OpenPGPScheme(self._soledad)
274         pgp.put_ascii_key(PRIVATE_KEY)
275         data = 'data'
276         privkey = pgp.get_key(ADDRESS, private=True)
277         signed = openpgp.sign(data, privkey)
278         pgp.put_ascii_key(PUBLIC_KEY_2)
279         wrongkey = pgp.get_key(ADDRESS_2)
280         self.assertRaises(
281             errors.InvalidSignature,
282             openpgp.verify, signed, wrongkey)
283
284     def test_encrypt_asym_sign_with_public_raises(self):
285         pgp = openpgp.OpenPGPScheme(self._soledad)
286         pgp.put_ascii_key(PRIVATE_KEY)
287         data = 'data'
288         privkey = pgp.get_key(ADDRESS, private=True)
289         pubkey = pgp.get_key(ADDRESS, private=False)
290         self.assertRaises(
291             AssertionError,
292             openpgp.encrypt_asym, data, privkey, sign=pubkey)
293
294     def test_encrypt_sym_sign_with_public_raises(self):
295         pgp = openpgp.OpenPGPScheme(self._soledad)
296         pgp.put_ascii_key(PUBLIC_KEY)
297         data = 'data'
298         pubkey = pgp.get_key(ADDRESS, private=False)
299         self.assertRaises(
300             AssertionError,
301             openpgp.encrypt_sym, data, '123', sign=pubkey)
302
303     def test_decrypt_asym_verify_with_private_raises(self):
304         pgp = openpgp.OpenPGPScheme(self._soledad)
305         pgp.put_ascii_key(PRIVATE_KEY)
306         data = 'data'
307         privkey = pgp.get_key(ADDRESS, private=True)
308         pubkey = pgp.get_key(ADDRESS, private=False)
309         encrypted_and_signed = openpgp.encrypt_asym(
310             data, pubkey, sign=privkey)
311         self.assertRaises(
312             AssertionError,
313             openpgp.decrypt_asym,
314             encrypted_and_signed, privkey, verify=privkey)
315
316     def test_decrypt_asym_verify_with_wrong_key_raises(self):
317         pgp = openpgp.OpenPGPScheme(self._soledad)
318         pgp.put_ascii_key(PRIVATE_KEY)
319         data = 'data'
320         privkey = pgp.get_key(ADDRESS, private=True)
321         pubkey = pgp.get_key(ADDRESS, private=False)
322         encrypted_and_signed = openpgp.encrypt_asym(data, pubkey, sign=privkey)
323         pgp.put_ascii_key(PUBLIC_KEY_2)
324         wrongkey = pgp.get_key('anotheruser@leap.se')
325         self.assertRaises(
326             errors.InvalidSignature,
327             openpgp.verify, encrypted_and_signed, wrongkey)
328
329     def test_decrypt_sym_verify_with_private_raises(self):
330         pgp = openpgp.OpenPGPScheme(self._soledad)
331         pgp.put_ascii_key(PRIVATE_KEY)
332         data = 'data'
333         privkey = pgp.get_key(ADDRESS, private=True)
334         encrypted_and_signed = openpgp.encrypt_sym(data, '123', sign=privkey)
335         self.assertRaises(
336             AssertionError,
337             openpgp.decrypt_sym,
338             encrypted_and_signed, 'decrypt', verify=privkey)
339
340     def test_decrypt_sym_verify_with_private_raises(self):
341         pgp = openpgp.OpenPGPScheme(self._soledad)
342         pgp.put_ascii_key(PRIVATE_KEY)
343         data = 'data'
344         privkey = pgp.get_key(ADDRESS, private=True)
345         encrypted_and_signed = openpgp.encrypt_sym(data, '123', sign=privkey)
346         pgp.put_ascii_key(PUBLIC_KEY_2)
347         wrongkey = pgp.get_key('anotheruser@leap.se')
348         self.assertRaises(
349             errors.InvalidSignature,
350             openpgp.verify, encrypted_and_signed, wrongkey)
351
352     def test_sign_verify(self):
353         pgp = openpgp.OpenPGPScheme(self._soledad)
354         pgp.put_ascii_key(PRIVATE_KEY)
355         data = 'data'
356         privkey = pgp.get_key(ADDRESS, private=True)
357         signed = openpgp.sign(data, privkey)
358         pubkey = pgp.get_key(ADDRESS, private=False)
359         self.assertTrue(openpgp.verify(signed, pubkey))
360
361     def test_encrypt_asym_sign_decrypt_verify(self):
362         pgp = openpgp.OpenPGPScheme(self._soledad)
363         pgp.put_ascii_key(PRIVATE_KEY)
364         pubkey = pgp.get_key(ADDRESS, private=False)
365         privkey = pgp.get_key(ADDRESS, private=True)
366         pgp.put_ascii_key(PRIVATE_KEY_2)
367         pubkey2 = pgp.get_key(ADDRESS_2, private=False)
368         privkey2 = pgp.get_key(ADDRESS_2, private=True)
369         data = 'data'
370         encrypted_and_signed = openpgp.encrypt_asym(
371             data, pubkey2, sign=privkey)
372         res = openpgp.decrypt_asym(
373             encrypted_and_signed, privkey2, verify=pubkey)
374         self.assertTrue(data, res)
375
376     def test_encrypt_sym_sign_decrypt_verify(self):
377         pgp = openpgp.OpenPGPScheme(self._soledad)
378         pgp.put_ascii_key(PRIVATE_KEY)
379         data = 'data'
380         privkey = pgp.get_key(ADDRESS, private=True)
381         pubkey = pgp.get_key(ADDRESS, private=False)
382         encrypted_and_signed = openpgp.encrypt_sym(data, '123', sign=privkey)
383         res = openpgp.decrypt_sym(
384             encrypted_and_signed, '123', verify=pubkey)
385         self.assertEqual(data, res)
386
387
388 class KeyManagerKeyManagementTestCase(
389         KeyManagerWithSoledadTestCase):
390
391     def test_get_all_keys_in_db(self):
392         km = self._key_manager()
393         km._wrapper_map[OpenPGPKey].put_ascii_key(PRIVATE_KEY)
394         # get public keys
395         keys = km.get_all_keys_in_local_db(False)
396         self.assertEqual(len(keys), 1, 'Wrong number of keys')
397         self.assertEqual(ADDRESS, keys[0].address)
398         self.assertFalse(keys[0].private)
399         # get private keys
400         keys = km.get_all_keys_in_local_db(True)
401         self.assertEqual(len(keys), 1, 'Wrong number of keys')
402         self.assertEqual(ADDRESS, keys[0].address)
403         self.assertTrue(keys[0].private)
404
405     def test_get_public_key(self):
406         km = self._key_manager()
407         km._wrapper_map[OpenPGPKey].put_ascii_key(PRIVATE_KEY)
408         # get the key
409         key = km.get_key(ADDRESS, OpenPGPKey, private=False,
410                          fetch_remote=False)
411         self.assertTrue(key is not None)
412         self.assertEqual(key.address, ADDRESS)
413         self.assertEqual(
414             key.fingerprint.lower(),  KEY_FINGERPRINT.lower())
415         self.assertFalse(key.private)
416
417     def test_get_private_key(self):
418         km = self._key_manager()
419         km._wrapper_map[OpenPGPKey].put_ascii_key(PRIVATE_KEY)
420         # get the key
421         key = km.get_key(ADDRESS, OpenPGPKey, private=True,
422                          fetch_remote=False)
423         self.assertTrue(key is not None)
424         self.assertEqual(key.address, ADDRESS)
425         self.assertEqual(
426             key.fingerprint.lower(), KEY_FINGERPRINT.lower())
427         self.assertTrue(key.private)
428
429     def test_send_key_raises_key_not_found(self):
430         km = self._key_manager()
431         self.assertRaises(
432             KeyNotFound,
433             km.send_key, OpenPGPKey, send_private=False)
434
435     def test_send_private_key_raises_key_not_found(self):
436         km = self._key_manager()
437         km._wrapper_map[OpenPGPKey].put_ascii_key(PUBLIC_KEY)
438         self.assertRaises(
439             KeyNotFound,
440             km.send_key, OpenPGPKey, send_private=True,
441             password='123')
442
443     def test_send_private_key_without_password_raises(self):
444         km = self._key_manager()
445         km._wrapper_map[OpenPGPKey].put_ascii_key(PUBLIC_KEY)
446         self.assertRaises(
447             NoPasswordGiven,
448             km.send_key, OpenPGPKey, send_private=True)
449
450     def test_send_public_key(self):
451         km = self._key_manager()
452         km._wrapper_map[OpenPGPKey].put_ascii_key(PUBLIC_KEY)
453         km._fetcher.put = Mock()
454         km.token = '123'
455         km.send_key(OpenPGPKey, send_private=False)
456         # setup args
457         data = {
458             'address': km._address,
459             'keys': [
460                 json.loads(
461                     km.get_key(
462                         km._address, OpenPGPKey).get_json()),
463             ]
464         }
465         url = km._nickserver_url + '/key/' + km._address
466
467         km._fetcher.put.assert_called_once_with(
468             url, data=data, auth=(km._address, '123')
469         )
470
471     def test_fetch_keys_from_server(self):
472         km = self._key_manager()
473         # setup mock
474
475         class Response(object):
476             status_code = 200
477             headers = {'content-type': 'application/json'}
478
479             def json(self):
480                 return {'address': 'anotheruser@leap.se', 'keys': []}
481
482         km._fetcher.get = Mock(
483             return_value=Response())
484         # do the fetch
485         km.fetch_keys_from_server('anotheruser@leap.se')
486         # and verify the call
487         km._fetcher.get.assert_called_once_with(
488             km._nickserver_url + '/key/' + 'anotheruser@leap.se',
489         )
490
491     def test_refresh_keys(self):
492         # TODO: maybe we should not attempt to refresh our own public key?
493         km = self._key_manager()
494         km._wrapper_map[OpenPGPKey].put_ascii_key(PUBLIC_KEY)
495         km.fetch_keys_from_server = Mock(return_value=[])
496         km.refresh_keys()
497         km.fetch_keys_from_server.assert_called_once_with(
498             'leap@leap.se'
499         )
500
501
502 # Key material for testing
503 KEY_FINGERPRINT = "E36E738D69173C13D709E44F2F455E2824D18DDF"
504 PUBLIC_KEY = """
505 -----BEGIN PGP PUBLIC KEY BLOCK-----
506 Version: GnuPG v1.4.10 (GNU/Linux)
507
508 mQINBFC9+dkBEADNRfwV23TWEoGc/x0wWH1P7PlXt8MnC2Z1kKaKKmfnglVrpOiz
509 iLWoiU58sfZ0L5vHkzXHXCBf6Eiy/EtUIvdiWAn+yASJ1mk5jZTBKO/WMAHD8wTO
510 zpMsFmWyg3xc4DkmFa9KQ5EVU0o/nqPeyQxNMQN7px5pPwrJtJFmPxnxm+aDkPYx
511 irDmz/4DeDNqXliazGJKw7efqBdlwTHkl9Akw2gwy178pmsKwHHEMOBOFFvX61AT
512 huKqHYmlCGSliwbrJppTG7jc1/ls3itrK+CWTg4txREkSpEVmfcASvw/ZqLbjgfs
513 d/INMwXnR9U81O8+7LT6yw/ca4ppcFoJD7/XJbkRiML6+bJ4Dakiy6i727BzV17g
514 wI1zqNvm5rAhtALKfACha6YO43aJzairO4II1wxVHvRDHZn2IuKDDephQ3Ii7/vb
515 hUOf6XCSmchkAcpKXUOvbxm1yfB1LRa64mMc2RcZxf4mW7KQkulBsdV5QG2276lv
516 U2UUy2IutXcGP5nXC+f6sJJGJeEToKJ57yiO/VWJFjKN8SvP+7AYsQSqINUuEf6H
517 T5gCPCraGMkTUTPXrREvu7NOohU78q6zZNaL3GW8ai7eSeANSuQ8Vzffx7Wd8Y7i
518 Pw9sYj0SMFs1UgjbuL6pO5ueHh+qyumbtAq2K0Bci0kqOcU4E9fNtdiovQARAQAB
519 tBxMZWFwIFRlc3QgS2V5IDxsZWFwQGxlYXAuc2U+iQI3BBMBCAAhBQJQvfnZAhsD
520 BQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJEC9FXigk0Y3fT7EQAKH3IuRniOpb
521 T/DDIgwwjz3oxB/W0DDMyPXowlhSOuM0rgGfntBpBb3boezEXwL86NPQxNGGruF5
522 hkmecSiuPSvOmQlqlS95NGQp6hNG0YaKColh+Q5NTspFXCAkFch9oqUje0LdxfSP
523 QfV9UpeEvGyPmk1I9EJV/YDmZ4+Djge1d7qhVZInz4Rx1NrSyF/Tc2EC0VpjQFsU
524 Y9Kb2YBBR7ivG6DBc8ty0jJXi7B4WjkFcUEJviQpMF2dCLdonCehYs1PqsN1N7j+
525 eFjQd+hqVMJgYuSGKjvuAEfClM6MQw7+FmFwMyLgK/Ew/DttHEDCri77SPSkOGSI
526 txCzhTg6798f6mJr7WcXmHX1w1Vcib5FfZ8vTDFVhz/XgAgArdhPo9V6/1dgSSiB
527 KPQ/spsco6u5imdOhckERE0lnAYvVT6KE81TKuhF/b23u7x+Wdew6kK0EQhYA7wy
528 7LmlaNXc7rMBQJ9Z60CJ4JDtatBWZ0kNrt2VfdDHVdqBTOpl0CraNUjWE5YMDasr
529 K2dF5IX8D3uuYtpZnxqg0KzyLg0tzL0tvOL1C2iudgZUISZNPKbS0z0v+afuAAnx
530 2pTC3uezbh2Jt8SWTLhll4i0P4Ps5kZ6HQUO56O+/Z1cWovX+mQekYFmERySDR9n
531 3k1uAwLilJmRmepGmvYbB8HloV8HqwgguQINBFC9+dkBEAC0I/xn1uborMgDvBtf
532 H0sEhwnXBC849/32zic6udB6/3Efk9nzbSpL3FSOuXITZsZgCHPkKarnoQ2ztMcS
533 sh1ke1C5gQGms75UVmM/nS+2YI4vY8OX/GC/on2vUyncqdH+bR6xH5hx4NbWpfTs
534 iQHmz5C6zzS/kuabGdZyKRaZHt23WQ7JX/4zpjqbC99DjHcP9BSk7tJ8wI4bkMYD
535 uFVQdT9O6HwyKGYwUU4sAQRAj7XCTGvVbT0dpgJwH4RmrEtJoHAx4Whg8mJ710E0
536 GCmzf2jqkNuOw76ivgk27Kge+Hw00jmJjQhHY0yVbiaoJwcRrPKzaSjEVNgrpgP3
537 lXPRGQArgESsIOTeVVHQ8fhK2YtTeCY9rIiO+L0OX2xo9HK7hfHZZWL6rqymXdyS
538 fhzh/f6IPyHFWnvj7Brl7DR8heMikygcJqv+ed2yx7iLyCUJ10g12I48+aEj1aLe
539 dP7lna32iY8/Z0SHQLNH6PXO9SlPcq2aFUgKqE75A/0FMk7CunzU1OWr2ZtTLNO1
540 WT/13LfOhhuEq9jTyTosn0WxBjJKq18lnhzCXlaw6EAtbA7CUwsD3CTPR56aAXFK
541 3I7KXOVAqggrvMe5Tpdg5drfYpI8hZovL5aAgb+7Y5ta10TcJdUhS5K3kFAWe/td
542 U0cmWUMDP1UMSQ5Jg6JIQVWhSwARAQABiQIfBBgBCAAJBQJQvfnZAhsMAAoJEC9F
543 Xigk0Y3fRwsP/i0ElYCyxeLpWJTwo1iCLkMKz2yX1lFVa9nT1BVTPOQwr/IAc5OX
544 NdtbJ14fUsKL5pWgW8OmrXtwZm1y4euI1RPWWubG01ouzwnGzv26UcuHeqC5orZj
545 cOnKtL40y8VGMm8LoicVkRJH8blPORCnaLjdOtmA3rx/v2EXrJpSa3AhOy0ZSRXk
546 ZSrK68AVNwamHRoBSYyo0AtaXnkPX4+tmO8X8BPfj125IljubvwZPIW9VWR9UqCE
547 VPfDR1XKegVb6VStIywF7kmrknM1C5qUY28rdZYWgKorw01hBGV4jTW0cqde3N51
548 XT1jnIAa+NoXUM9uQoGYMiwrL7vNsLlyyiW5ayDyV92H/rIuiqhFgbJsHTlsm7I8
549 oGheR784BagAA1NIKD1qEO9T6Kz9lzlDaeWS5AUKeXrb7ZJLI1TTCIZx5/DxjLqM
550 Tt/RFBpVo9geZQrvLUqLAMwdaUvDXC2c6DaCPXTh65oCZj/hqzlJHH+RoTWWzKI+
551 BjXxgUWF9EmZUBrg68DSmI+9wuDFsjZ51BcqvJwxyfxtTaWhdoYqH/UQS+D1FP3/
552 diZHHlzwVwPICzM9ooNTgbrcDzyxRkIVqsVwBq7EtzcvgYUyX53yG25Giy6YQaQ2
553 ZtQ/VymwFL3XdUWV6B/hU4PVAFvO3qlOtdJ6TpE+nEWgcWjCv5g7RjXX
554 =MuOY
555 -----END PGP PUBLIC KEY BLOCK-----
556 """
557 PRIVATE_KEY = """
558 -----BEGIN PGP PRIVATE KEY BLOCK-----
559 Version: GnuPG v1.4.10 (GNU/Linux)
560
561 lQcYBFC9+dkBEADNRfwV23TWEoGc/x0wWH1P7PlXt8MnC2Z1kKaKKmfnglVrpOiz
562 iLWoiU58sfZ0L5vHkzXHXCBf6Eiy/EtUIvdiWAn+yASJ1mk5jZTBKO/WMAHD8wTO
563 zpMsFmWyg3xc4DkmFa9KQ5EVU0o/nqPeyQxNMQN7px5pPwrJtJFmPxnxm+aDkPYx
564 irDmz/4DeDNqXliazGJKw7efqBdlwTHkl9Akw2gwy178pmsKwHHEMOBOFFvX61AT
565 huKqHYmlCGSliwbrJppTG7jc1/ls3itrK+CWTg4txREkSpEVmfcASvw/ZqLbjgfs
566 d/INMwXnR9U81O8+7LT6yw/ca4ppcFoJD7/XJbkRiML6+bJ4Dakiy6i727BzV17g
567 wI1zqNvm5rAhtALKfACha6YO43aJzairO4II1wxVHvRDHZn2IuKDDephQ3Ii7/vb
568 hUOf6XCSmchkAcpKXUOvbxm1yfB1LRa64mMc2RcZxf4mW7KQkulBsdV5QG2276lv
569 U2UUy2IutXcGP5nXC+f6sJJGJeEToKJ57yiO/VWJFjKN8SvP+7AYsQSqINUuEf6H
570 T5gCPCraGMkTUTPXrREvu7NOohU78q6zZNaL3GW8ai7eSeANSuQ8Vzffx7Wd8Y7i
571 Pw9sYj0SMFs1UgjbuL6pO5ueHh+qyumbtAq2K0Bci0kqOcU4E9fNtdiovQARAQAB
572 AA/+JHtlL39G1wsH9R6UEfUQJGXR9MiIiwZoKcnRB2o8+DS+OLjg0JOh8XehtuCs
573 E/8oGQKtQqa5bEIstX7IZoYmYFiUQi9LOzIblmp2vxOm+HKkxa4JszWci2/ZmC3t
574 KtaA4adl9XVnshoQ7pijuCMUKB3naBEOAxd8s9d/JeReGIYkJErdrnVfNk5N71Ds
575 FmH5Ll3XtEDvgBUQP3nkA6QFjpsaB94FHjL3gDwum/cxzj6pCglcvHOzEhfY0Ddb
576 J967FozQTaf2JW3O+w3LOqtcKWpq87B7+O61tVidQPSSuzPjCtFF0D2LC9R/Hpky
577 KTMQ6CaKja4MPhjwywd4QPcHGYSqjMpflvJqi+kYIt8psUK/YswWjnr3r4fbuqVY
578 VhtiHvnBHQjz135lUqWvEz4hM3Xpnxydx7aRlv5NlevK8+YIO5oFbWbGNTWsPZI5
579 jpoFBpSsnR1Q5tnvtNHauvoWV+XN2qAOBTG+/nEbDYH6Ak3aaE9jrpTdYh0CotYF
580 q7csANsDy3JvkAzeU6WnYpsHHaAjqOGyiZGsLej1UcXPFMosE/aUo4WQhiS8Zx2c
581 zOVKOi/X5vQ2GdNT9Qolz8AriwzsvFR+bxPzyd8V6ALwDsoXvwEYinYBKK8j0OPv
582 OOihSR6HVsuP9NUZNU9ewiGzte/+/r6pNXHvR7wTQ8EWLcEIAN6Zyrb0bHZTIlxt
583 VWur/Ht2mIZrBaO50qmM5RD3T5oXzWXi/pjLrIpBMfeZR9DWfwQwjYzwqi7pxtYx
584 nJvbMuY505rfnMoYxb4J+cpRXV8MS7Dr1vjjLVUC9KiwSbM3gg6emfd2yuA93ihv
585 Pe3mffzLIiQa4mRE3wtGcioC43nWuV2K2e1KjxeFg07JhrezA/1Cak505ab/tmvP
586 4YmjR5c44+yL/YcQ3HdFgs4mV+nVbptRXvRcPpolJsgxPccGNdvHhsoR4gwXMS3F
587 RRPD2z6x8xeN73Q4KH3bm01swQdwFBZbWVfmUGLxvN7leCdfs9+iFJyqHiCIB6Iv
588 mQfp8F0IAOwSo8JhWN+V1dwML4EkIrM8wUb4yecNLkyR6TpPH/qXx4PxVMC+vy6x
589 sCtjeHIwKE+9vqnlhd5zOYh7qYXEJtYwdeDDmDbL8oks1LFfd+FyAuZXY33DLwn0
590 cRYsr2OEZmaajqUB3NVmj3H4uJBN9+paFHyFSXrH68K1Fk2o3n+RSf2EiX+eICwI
591 L6rqoF5sSVUghBWdNegV7qfy4anwTQwrIMGjgU5S6PKW0Dr/3iO5z3qQpGPAj5OW
592 ATqPWkDICLbObPxD5cJlyyNE2wCA9VVc6/1d6w4EVwSq9h3/WTpATEreXXxTGptd
593 LNiTA1nmakBYNO2Iyo3djhaqBdWjk+EIAKtVEnJH9FAVwWOvaj1RoZMA5DnDMo7e
594 SnhrCXl8AL7Z1WInEaybasTJXn1uQ8xY52Ua4b8cbuEKRKzw/70NesFRoMLYoHTO
595 dyeszvhoDHberpGRTciVmpMu7Hyi33rM31K9epA4ib6QbbCHnxkWOZB+Bhgj1hJ8
596 xb4RBYWiWpAYcg0+DAC3w9gfxQhtUlZPIbmbrBmrVkO2GVGUj8kH6k4UV6kUHEGY
597 HQWQR0HcbKcXW81ZXCCD0l7ROuEWQtTe5Jw7dJ4/QFuqZnPutXVRNOZqpl6eRShw
598 7X2/a29VXBpmHA95a88rSQsL+qm7Fb3prqRmuMCtrUZgFz7HLSTuUMR867QcTGVh
599 cCBUZXN0IEtleSA8bGVhcEBsZWFwLnNlPokCNwQTAQgAIQUCUL352QIbAwULCQgH
600 AwUVCgkICwUWAgMBAAIeAQIXgAAKCRAvRV4oJNGN30+xEACh9yLkZ4jqW0/wwyIM
601 MI896MQf1tAwzMj16MJYUjrjNK4Bn57QaQW926HsxF8C/OjT0MTRhq7heYZJnnEo
602 rj0rzpkJapUveTRkKeoTRtGGigqJYfkOTU7KRVwgJBXIfaKlI3tC3cX0j0H1fVKX
603 hLxsj5pNSPRCVf2A5mePg44HtXe6oVWSJ8+EcdTa0shf03NhAtFaY0BbFGPSm9mA
604 QUe4rxugwXPLctIyV4uweFo5BXFBCb4kKTBdnQi3aJwnoWLNT6rDdTe4/nhY0Hfo
605 alTCYGLkhio77gBHwpTOjEMO/hZhcDMi4CvxMPw7bRxAwq4u+0j0pDhkiLcQs4U4
606 Ou/fH+pia+1nF5h19cNVXIm+RX2fL0wxVYc/14AIAK3YT6PVev9XYEkogSj0P7Kb
607 HKOruYpnToXJBERNJZwGL1U+ihPNUyroRf29t7u8flnXsOpCtBEIWAO8Muy5pWjV
608 3O6zAUCfWetAieCQ7WrQVmdJDa7dlX3Qx1XagUzqZdAq2jVI1hOWDA2rKytnReSF
609 /A97rmLaWZ8aoNCs8i4NLcy9Lbzi9QtornYGVCEmTTym0tM9L/mn7gAJ8dqUwt7n
610 s24dibfElky4ZZeItD+D7OZGeh0FDuejvv2dXFqL1/pkHpGBZhEckg0fZ95NbgMC
611 4pSZkZnqRpr2GwfB5aFfB6sIIJ0HGARQvfnZARAAtCP8Z9bm6KzIA7wbXx9LBIcJ
612 1wQvOPf99s4nOrnQev9xH5PZ820qS9xUjrlyE2bGYAhz5Cmq56ENs7THErIdZHtQ
613 uYEBprO+VFZjP50vtmCOL2PDl/xgv6J9r1Mp3KnR/m0esR+YceDW1qX07IkB5s+Q
614 us80v5LmmxnWcikWmR7dt1kOyV/+M6Y6mwvfQ4x3D/QUpO7SfMCOG5DGA7hVUHU/
615 Tuh8MihmMFFOLAEEQI+1wkxr1W09HaYCcB+EZqxLSaBwMeFoYPJie9dBNBgps39o
616 6pDbjsO+or4JNuyoHvh8NNI5iY0IR2NMlW4mqCcHEazys2koxFTYK6YD95Vz0RkA
617 K4BErCDk3lVR0PH4StmLU3gmPayIjvi9Dl9saPRyu4Xx2WVi+q6spl3ckn4c4f3+
618 iD8hxVp74+wa5ew0fIXjIpMoHCar/nndsse4i8glCddINdiOPPmhI9Wi3nT+5Z2t
619 9omPP2dEh0CzR+j1zvUpT3KtmhVICqhO+QP9BTJOwrp81NTlq9mbUyzTtVk/9dy3
620 zoYbhKvY08k6LJ9FsQYySqtfJZ4cwl5WsOhALWwOwlMLA9wkz0eemgFxStyOylzl
621 QKoIK7zHuU6XYOXa32KSPIWaLy+WgIG/u2ObWtdE3CXVIUuSt5BQFnv7XVNHJllD
622 Az9VDEkOSYOiSEFVoUsAEQEAAQAP/1AagnZQZyzHDEgw4QELAspYHCWLXE5aZInX
623 wTUJhK31IgIXNn9bJ0hFiSpQR2xeMs9oYtRuPOu0P8oOFMn4/z374fkjZy8QVY3e
624 PlL+3EUeqYtkMwlGNmVw5a/NbNuNfm5Darb7pEfbYd1gPcni4MAYw7R2SG/57GbC
625 9gucvspHIfOSfBNLBthDzmK8xEKe1yD2eimfc2T7IRYb6hmkYfeds5GsqvGI6mwI
626 85h4uUHWRc5JOlhVM6yX8hSWx0L60Z3DZLChmc8maWnFXd7C8eQ6P1azJJbW71Ih
627 7CoK0XW4LE82vlQurSRFgTwfl7wFYszW2bOzCuhHDDtYnwH86Nsu0DC78ZVRnvxn
628 E8Ke/AJgrdhIOo4UAyR+aZD2+2mKd7/waOUTUrUtTzc7i8N3YXGi/EIaNReBXaq+
629 ZNOp24BlFzRp+FCF/pptDW9HjPdiV09x0DgICmeZS4Gq/4vFFIahWctg52NGebT0
630 Idxngjj+xDtLaZlLQoOz0n5ByjO/Wi0ANmMv1sMKCHhGvdaSws2/PbMR2r4caj8m
631 KXpIgdinM/wUzHJ5pZyF2U/qejsRj8Kw8KH/tfX4JCLhiaP/mgeTuWGDHeZQERAT
632 xPmRFHaLP9/ZhvGNh6okIYtrKjWTLGoXvKLHcrKNisBLSq+P2WeFrlme1vjvJMo/
633 jPwLT5o9CADQmcbKZ+QQ1ZM9v99iDZol7SAMZX43JC019sx6GK0u6xouJBcLfeB4
634 OXacTgmSYdTa9RM9fbfVpti01tJ84LV2SyL/VJq/enJF4XQPSynT/tFTn1PAor6o
635 tEAAd8fjKdJ6LnD5wb92SPHfQfXqI84rFEO8rUNIE/1ErT6DYifDzVCbfD2KZdoF
636 cOSp7TpD77sY1bs74ocBX5ejKtd+aH99D78bJSMM4pSDZsIEwnomkBHTziubPwJb
637 OwnATy0LmSMAWOw5rKbsh5nfwCiUTM20xp0t5JeXd+wPVWbpWqI2EnkCEN+RJr9i
638 7dp/ymDQ+Yt5wrsN3NwoyiexPOG91WQVCADdErHsnglVZZq9Z8Wx7KwecGCUurJ2
639 H6lKudv5YOxPnAzqZS5HbpZd/nRTMZh2rdXCr5m2YOuewyYjvM757AkmUpM09zJX
640 MQ1S67/UX2y8/74TcRF97Ncx9HeELs92innBRXoFitnNguvcO6Esx4BTe1OdU6qR
641 ER3zAmVf22Le9ciXbu24DN4mleOH+OmBx7X2PqJSYW9GAMTsRB081R6EWKH7romQ
642 waxFrZ4DJzZ9ltyosEJn5F32StyLrFxpcrdLUoEaclZCv2qka7sZvi0EvovDVEBU
643 e10jOx9AOwf8Gj2ufhquQ6qgVYCzbP+YrodtkFrXRS3IsljIchj1M2ffB/0bfoUs
644 rtER9pLvYzCjBPg8IfGLw0o754Qbhh/ReplCRTusP/fQMybvCvfxreS3oyEriu/G
645 GufRomjewZ8EMHDIgUsLcYo2UHZsfF7tcazgxMGmMvazp4r8vpgrvW/8fIN/6Adu
646 tF+WjWDTvJLFJCe6O+BFJOWrssNrrra1zGtLC1s8s+Wfpe+bGPL5zpHeebGTwH1U
647 22eqgJArlEKxrfarz7W5+uHZJHSjF/K9ZvunLGD0n9GOPMpji3UO3zeM8IYoWn7E
648 /EWK1XbjnssNemeeTZ+sDh+qrD7BOi+vCX1IyBxbfqnQfJZvmcPWpruy1UsO+aIC
649 0GY8Jr3OL69dDQ21jueJAh8EGAEIAAkFAlC9+dkCGwwACgkQL0VeKCTRjd9HCw/+
650 LQSVgLLF4ulYlPCjWIIuQwrPbJfWUVVr2dPUFVM85DCv8gBzk5c121snXh9Swovm
651 laBbw6ate3BmbXLh64jVE9Za5sbTWi7PCcbO/bpRy4d6oLmitmNw6cq0vjTLxUYy
652 bwuiJxWREkfxuU85EKdouN062YDevH+/YResmlJrcCE7LRlJFeRlKsrrwBU3BqYd
653 GgFJjKjQC1peeQ9fj62Y7xfwE9+PXbkiWO5u/Bk8hb1VZH1SoIRU98NHVcp6BVvp
654 VK0jLAXuSauSczULmpRjbyt1lhaAqivDTWEEZXiNNbRyp17c3nVdPWOcgBr42hdQ
655 z25CgZgyLCsvu82wuXLKJblrIPJX3Yf+si6KqEWBsmwdOWybsjygaF5HvzgFqAAD
656 U0goPWoQ71PorP2XOUNp5ZLkBQp5etvtkksjVNMIhnHn8PGMuoxO39EUGlWj2B5l
657 Cu8tSosAzB1pS8NcLZzoNoI9dOHrmgJmP+GrOUkcf5GhNZbMoj4GNfGBRYX0SZlQ
658 GuDrwNKYj73C4MWyNnnUFyq8nDHJ/G1NpaF2hiof9RBL4PUU/f92JkceXPBXA8gL
659 Mz2ig1OButwPPLFGQhWqxXAGrsS3Ny+BhTJfnfIbbkaLLphBpDZm1D9XKbAUvdd1
660 RZXoH+FTg9UAW87eqU610npOkT6cRaBxaMK/mDtGNdc=
661 =JTFu
662 -----END PGP PRIVATE KEY BLOCK-----
663 """
664
665 PUBLIC_KEY_2 = """
666 -----BEGIN PGP PUBLIC KEY BLOCK-----
667 Version: GnuPG v1.4.10 (GNU/Linux)
668
669 mI0EUYwJXgEEAMbTKHuPJ5/Gk34l9Z06f+0WCXTDXdte1UBoDtZ1erAbudgC4MOR
670 gquKqoj3Hhw0/ILqJ88GcOJmKK/bEoIAuKaqlzDF7UAYpOsPZZYmtRfPC2pTCnXq
671 Z1vdeqLwTbUspqXflkCkFtfhGKMq5rH8GV5a3tXZkRWZhdNwhVXZagC3ABEBAAG0
672 IWFub3RoZXJ1c2VyIDxhbm90aGVydXNlckBsZWFwLnNlPoi4BBMBAgAiBQJRjAle
673 AhsDBgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIXgAAKCRB/nfpof+5XWotuA/4tLN4E
674 gUr7IfLy2HkHAxzw7A4rqfMN92DIM9mZrDGaWRrOn3aVF7VU1UG7MDkHfPvp/cFw
675 ezoCw4s4IoHVc/pVlOkcHSyt4/Rfh248tYEJmFCJXGHpkK83VIKYJAithNccJ6Q4
676 JE/o06Mtf4uh/cA1HUL4a4ceqUhtpLJULLeKo7iNBFGMCV4BBADsyQI7GR0wSAxz
677 VayLjuPzgT+bjbFeymIhjuxKIEwnIKwYkovztW+4bbOcQs785k3Lp6RzvigTpQQt
678 Z/hwcLOqZbZw8t/24+D+Pq9mMP2uUvCFFqLlVvA6D3vKSQ/XNN+YB919WQ04jh63
679 yuRe94WenT1RJd6xU1aaUff4rKizuQARAQABiJ8EGAECAAkFAlGMCV4CGwwACgkQ
680 f536aH/uV1rPZQQAqCzRysOlu8ez7PuiBD4SebgRqWlxa1TF1ujzfLmuPivROZ2X
681 Kw5aQstxgGSjoB7tac49s0huh4X8XK+BtJBfU84JS8Jc2satlfwoyZ35LH6sDZck
682 I+RS/3we6zpMfHs3vvp9xgca6ZupQxivGtxlJs294TpJorx+mFFqbV17AzQ=
683 =Thdu
684 -----END PGP PUBLIC KEY BLOCK-----
685 """
686
687 PRIVATE_KEY_2 = """
688 -----BEGIN PGP PRIVATE KEY BLOCK-----
689 Version: GnuPG v1.4.10 (GNU/Linux)
690
691 lQHYBFGMCV4BBADG0yh7jyefxpN+JfWdOn/tFgl0w13bXtVAaA7WdXqwG7nYAuDD
692 kYKriqqI9x4cNPyC6ifPBnDiZiiv2xKCALimqpcwxe1AGKTrD2WWJrUXzwtqUwp1
693 6mdb3Xqi8E21LKal35ZApBbX4RijKuax/BleWt7V2ZEVmYXTcIVV2WoAtwARAQAB
694 AAP7BLuSAx7tOohnimEs74ks8l/L6dOcsFQZj2bqs4AoY3jFe7bV0tHr4llypb/8
695 H3/DYvpf6DWnCjyUS1tTnXSW8JXtx01BUKaAufSmMNg9blKV6GGHlT/Whe9uVyks
696 7XHk/+9mebVMNJ/kNlqq2k+uWqJohzC8WWLRK+d1tBeqDsECANZmzltPaqUsGV5X
697 C3zszE3tUBgptV/mKnBtopKi+VH+t7K6fudGcG+bAcZDUoH/QVde52mIIjjIdLje
698 uajJuHUCAO1mqh+vPoGv4eBLV7iBo3XrunyGXiys4a39eomhxTy3YktQanjjx+ty
699 GltAGCs5PbWGO6/IRjjvd46wh53kzvsCAO0J97gsWhzLuFnkxFAJSPk7RRlyl7lI
700 1XS/x0Og6j9XHCyY1OYkfBm0to3UlCfkgirzCYlTYObCofzdKFIPDmSqHbQhYW5v
701 dGhlcnVzZXIgPGFub3RoZXJ1c2VyQGxlYXAuc2U+iLgEEwECACIFAlGMCV4CGwMG
702 CwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEH+d+mh/7ldai24D/i0s3gSBSvsh
703 8vLYeQcDHPDsDiup8w33YMgz2ZmsMZpZGs6fdpUXtVTVQbswOQd8++n9wXB7OgLD
704 izgigdVz+lWU6RwdLK3j9F+Hbjy1gQmYUIlcYemQrzdUgpgkCK2E1xwnpDgkT+jT
705 oy1/i6H9wDUdQvhrhx6pSG2kslQst4qjnQHYBFGMCV4BBADsyQI7GR0wSAxzVayL
706 juPzgT+bjbFeymIhjuxKIEwnIKwYkovztW+4bbOcQs785k3Lp6RzvigTpQQtZ/hw
707 cLOqZbZw8t/24+D+Pq9mMP2uUvCFFqLlVvA6D3vKSQ/XNN+YB919WQ04jh63yuRe
708 94WenT1RJd6xU1aaUff4rKizuQARAQABAAP9EyElqJ3dq3EErXwwT4mMnbd1SrVC
709 rUJrNWQZL59mm5oigS00uIyR0SvusOr+UzTtd8ysRuwHy5d/LAZsbjQStaOMBILx
710 77TJveOel0a1QK0YSMF2ywZMCKvquvjli4hAtWYz/EwfuzQN3t23jc5ny+GqmqD2
711 3FUxLJosFUfLNmECAO9KhVmJi+L9dswIs+2Dkjd1eiRQzNOEVffvYkGYZyKxNiXF
712 UA5kvyZcB4iAN9sWCybE4WHZ9jd4myGB0MPDGxkCAP1RsXJbbuD6zS7BXe5gwunO
713 2q4q7ptdSl/sJYQuTe1KNP5d/uGsvlcFfsYjpsopasPjFBIncc/2QThMKlhoEaEB
714 /0mVAxpT6SrEvUbJ18z7kna24SgMPr3OnPMxPGfvNLJY/Xv/A17YfoqjmByCvsKE
715 JCDjopXtmbcrZyoEZbEht9mko4ifBBgBAgAJBQJRjAleAhsMAAoJEH+d+mh/7lda
716 z2UEAKgs0crDpbvHs+z7ogQ+Enm4EalpcWtUxdbo83y5rj4r0TmdlysOWkLLcYBk
717 o6Ae7WnOPbNIboeF/FyvgbSQX1POCUvCXNrGrZX8KMmd+Sx+rA2XJCPkUv98Hus6
718 THx7N776fcYHGumbqUMYrxrcZSbNveE6SaK8fphRam1dewM0
719 =a5gs
720 -----END PGP PRIVATE KEY BLOCK-----
721 """