improve tests

* add test for gpg rsa key
This commit is contained in:
Yann Autissier 2022-09-18 13:55:41 +02:00
parent 12aeafbb3e
commit 4556ee4d32
5 changed files with 265 additions and 155 deletions

View File

@ -1,11 +1,13 @@
MYOS ?= ../myos
-include $(MYOS)/make/include.mk
PREFIX ?= /usr/local
BINDIR ?= $(PREFIX)/bin
BINDIR ?= $(PREFIX)/bin
PREFIX ?= /usr/local
.PHONY: all default install shellcheck-% shellspec-% tests uninstall
-include $(MYOS)/make/include.mk
MYOS ?= ../myos
MYOS_REPOSITORY ?= $(patsubst %/dpgpid,%/myos,$(shell git config --get remote.origin.url 2>/dev/null))
$(MYOS):
-@git clone $(MYOS_REPOSITORY) $(MYOS)
default: tests
all: install tests
@ -13,6 +15,8 @@ all: install tests
install:
mkdir -p "$(BINDIR)"
install dpgpid "$(BINDIR)/dpgpid"
install keygen "$(BINDIR)/keygen"
pip install -r requirements.txt
shellcheck-%:
shellcheck $*/*.sh
@ -24,3 +28,4 @@ tests: shellcheck-specs shellspec-specs
uninstall:
rm -f "$(BINDIR)/dpgpid"
rm -f "$(BINDIR)/keygen"

View File

@ -1,17 +1,53 @@
# dpgpid - Decentralized PGP IDentifiers
A world of trust with Decentralized IDentifiers on IPFS.
## Disclaimer
This is work in progress ;)
## Requirements
* gpg
* ipfs
* pinentry
* python3
* python3-pip
## Usage
Show identifiers
### dpgpid
dpgpid helps you to publish, retrieve and sign ed25519 keys with decentralized identifiers on IPFS.
* Show identifiers
```shell
$ dpgpid show
```
### keygen
keygen helps you to generate an ed25519 key in different formats
* Show duniter public key for user "username" and password "password"
```shell
$ keygen username password
```
* Show IPFS PeerID and PrivKEY for user "username" and password "password"
```shell
$ keygen -pk -t ipfs username password
```
* Show duniter public and secret keys for GPG key matching uid "username" and protected with password "password"
```shell
$ keygen -pkg username password
```
## Tests
Run tests
@ -22,8 +58,8 @@ $ make tests
## Status
Use it at your own risks.
Alpha version, file and output formats may change without retro compatibility.
## References
* [Inter Planetary IDentifiers](https://did-ipid.github.io/ipid-did-method/)
* [Inter Planetary IDentifiers](https://did-ipid.github.io/ipid-did-method/) did method

View File

@ -1,21 +1,21 @@
#shellcheck shell=sh
set -eu
TEST_DIR="$(mktemp -d)"
DUNITER_PUBSEC_FILE="${TEST_DIR}/duniter.pubsec"
IPFS_PEM_FILE="${TEST_DIR}/ipfs.pem"
PB2_FILE="${SHELLSPEC_TMPBASE}/key.pb2"
PEM_FILE="${SHELLSPEC_TMPBASE}/key.pem"
PUBSEC_FILE="${SHELLSPEC_TMPBASE}/key.pubsec"
gpg() {
GNUPGHOME="${TEST_DIR}" command gpg "$@"
GNUPGHOME="${SHELLSPEC_TMPBASE}" command gpg "$@"
}
keygen() {
if [ -x ./keygen ]; then
GNUPGHOME="${TEST_DIR}" ./keygen "$@"
GNUPGHOME="${SHELLSPEC_TMPBASE}" ./keygen "$@"
elif [ -x ./bin/keygen ]; then
GNUPGHOME="${TEST_DIR}" ./bin/keygen "$@"
GNUPGHOME="${SHELLSPEC_TMPBASE}" ./bin/keygen "$@"
else
GNUPGHOME="${TEST_DIR}" command keygen "$@"
GNUPGHOME="${SHELLSPEC_TMPBASE}" command keygen "$@"
fi
}
@ -105,75 +105,17 @@ Describe 'keygen'
The stderr should equal ""
End
End
Describe '-t duniter -pk username password:'
It 'prints prefixed duniter public key for user "username" with password "password"'
When run keygen -t duniter -pk username password
Describe '-t base58 -pk username password:'
It 'prints prefixed base58 public and secret keys for user "username" with password "password"'
When run keygen -t base58 -pk username password
The output should include 'pub: 4YLU1xQ9jzb7LzC6d91VZrYTEKS9N2j93Nnvcee6wxZG'
The output should include 'sec: K5heSX4xGUPtRbxcZh6zbgaKbDv8FeVc9JuSNWtUs7C1oGNKqv7kQJ3DHdouTPzoW4duKKnuLQK8LbHKfN9fkjC'
The status should be success
The stderr should equal ""
End
End
Describe "-o ${DUNITER_PUBSEC_FILE} -t duniter username password:"
rm -f "${DUNITER_PUBSEC_FILE}"
It 'writes duniter keys to file for user "username" with password "password"'
When run keygen -o "${DUNITER_PUBSEC_FILE}" -t duniter username password
The path "${DUNITER_PUBSEC_FILE}" should exist
The contents of file "${DUNITER_PUBSEC_FILE}" should include 'pub: 4YLU1xQ9jzb7LzC6d91VZrYTEKS9N2j93Nnvcee6wxZG'
The contents of file "${DUNITER_PUBSEC_FILE}" should include 'sec: K5heSX4xGUPtRbxcZh6zbgaKbDv8FeVc9JuSNWtUs7C1oGNKqv7kQJ3DHdouTPzoW4duKKnuLQK8LbHKfN9fkjC'
The status should be success
The stderr should equal ""
End
End
Describe "-i ${DUNITER_PUBSEC_FILE} -t ipfs -pk:"
It 'prints prefixed ipfs keys for duniter keys read in pubsec file'
When run keygen -i "${DUNITER_PUBSEC_FILE}" -t ipfs -pk
The output should include 'PeerID: 12D3KooWDMhdm5yrvtrbkshXFjkqLedHieUnPioczy9wzdnzquHC'
The output should include 'PrivKEY: CAESQA+XqCWjRqCjNe9oU3QA796bEH+T+rxgyPQ/EkXvE2MvNJoTbvcP+m51+XwxrmWqHaOpI1ZD0USwLjqAmV8Boas='
The status should be success
The stderr should equal ""
End
End
Describe "-i ${DUNITER_PUBSEC_FILE} -o ${IPFS_PEM_FILE} -t ipfs:"
It 'writes ipfs keys to file for duniter keys read in pubsec file'
When run keygen -i "${DUNITER_PUBSEC_FILE}" -o "${IPFS_PEM_FILE}" -t ipfs
The path "${IPFS_PEM_FILE}" should exist
The contents of file "${IPFS_PEM_FILE}" should include '-----BEGIN PRIVATE KEY-----'
The contents of file "${IPFS_PEM_FILE}" should include 'MC4CAQAwBQYDK2VwBCIEIA+XqCWjRqCjNe9oU3QA796bEH+T+rxgyPQ/EkXvE2Mv'
The contents of file "${IPFS_PEM_FILE}" should include '-----END PRIVATE KEY-----'
The status should be success
The stderr should equal ""
End
rm -f "${DUNITER_PUBSEC_FILE}" "${IPFS_PEM_FILE}"
End
Describe '-t ipfs username password:'
It 'prints ipfs public key for user "username" with password "password"'
When run keygen -t ipfs username password
The output should include '12D3KooWDMhdm5yrvtrbkshXFjkqLedHieUnPioczy9wzdnzquHC'
The status should be success
The stderr should equal ""
End
End
Describe '-t ipfs -k username password:'
It 'prints ipfs keys for user "username" with password "password"'
When run keygen -t ipfs -k username password
The output should include '12D3KooWDMhdm5yrvtrbkshXFjkqLedHieUnPioczy9wzdnzquHC'
The output should include 'CAESQA+XqCWjRqCjNe9oU3QA796bEH+T+rxgyPQ/EkXvE2MvNJoTbvcP+m51+XwxrmWqHaOpI1ZD0USwLjqAmV8Boas='
The status should be success
The stderr should equal ""
End
End
Describe '-t ipfs -pk username password:'
It 'prints prefixed ipfs keys for user "username" with password "password"'
When run keygen -t ipfs -pk username password
The output should include 'PeerID: 12D3KooWDMhdm5yrvtrbkshXFjkqLedHieUnPioczy9wzdnzquHC'
The output should include 'PrivKEY: CAESQA+XqCWjRqCjNe9oU3QA796bEH+T+rxgyPQ/EkXvE2MvNJoTbvcP+m51+XwxrmWqHaOpI1ZD0USwLjqAmV8Boas='
The status should be success
The stderr should equal ""
End
End
Describe '-t base64 -pk username password:'
It 'prints prefixed base64 keys for user "username" with password "password"'
It 'prints prefixed base64 public and secret keys for user "username" with password "password"'
When run keygen -t base64 -pk username password
The output should include 'pub: NJoTbvcP+m51+XwxrmWqHaOpI1ZD0USwLjqAmV8Boas='
The output should include 'sec: D5eoJaNGoKM172hTdADv3psQf5P6vGDI9D8SRe8TYy80mhNu9w/6bnX5fDGuZaodo6kjVkPRRLAuOoCZXwGhqw=='
@ -181,111 +123,151 @@ Describe 'keygen'
The stderr should equal ""
End
End
Describe "-o ${IPFS_PEM_FILE} -t ipfs username password:"
It 'writes ipfs keys to file for user "username" with password "password"'
When run keygen username password -o "${IPFS_PEM_FILE}" -t ipfs
The path "${IPFS_PEM_FILE}" should exist
The contents of file "${IPFS_PEM_FILE}" should include '-----BEGIN PRIVATE KEY-----'
The contents of file "${IPFS_PEM_FILE}" should include 'MC4CAQAwBQYDK2VwBCIEIA+XqCWjRqCjNe9oU3QA796bEH+T+rxgyPQ/EkXvE2Mv'
The contents of file "${IPFS_PEM_FILE}" should include '-----END PRIVATE KEY-----'
Describe '-t duniter -pk username password:'
It 'prints prefixed duniter public and secret keys for user "username" with password "password"'
When run keygen -t duniter -pk username password
The output should include 'pub: 4YLU1xQ9jzb7LzC6d91VZrYTEKS9N2j93Nnvcee6wxZG'
The output should include 'sec: K5heSX4xGUPtRbxcZh6zbgaKbDv8FeVc9JuSNWtUs7C1oGNKqv7kQJ3DHdouTPzoW4duKKnuLQK8LbHKfN9fkjC'
The status should be success
The stderr should equal ""
End
rm -f "${IPFS_PEM_FILE}"
End
Describe '-t pgp username password birthday:'
gpg --batch --import --quiet specs/username.asc
gpg --batch --import --quiet specs/username_protected.asc
Describe '-t ipfs -pk username password:'
It 'prints prefixed ipfs public and secret keys for user "username" with password "password"'
When run keygen -t ipfs -pk username password
The output should include 'PeerID: 12D3KooWDMhdm5yrvtrbkshXFjkqLedHieUnPioczy9wzdnzquHC'
The output should include 'PrivKEY: CAESQA+XqCWjRqCjNe9oU3QA796bEH+T+rxgyPQ/EkXvE2MvNJoTbvcP+m51+XwxrmWqHaOpI1ZD0USwLjqAmV8Boas='
The status should be success
The stderr should equal ""
End
End
Describe "-o ${PEM_FILE} username password:"
rm -f "${PEM_FILE}"
It 'writes pkcs8 secret key to a pem file for user "username" with password "password"'
When run keygen -o "${PEM_FILE}" -t ipfs username password
The path "${PEM_FILE}" should exist
The contents of file "${PEM_FILE}" should include '-----BEGIN PRIVATE KEY-----'
The contents of file "${PEM_FILE}" should include 'MC4CAQAwBQYDK2VwBCIEIA+XqCWjRqCjNe9oU3QA796bEH+T+rxgyPQ/EkXvE2Mv'
The contents of file "${PEM_FILE}" should include '-----END PRIVATE KEY-----'
The status should be success
The stderr should equal ""
End
End
Describe "-f pem -o ${PEM_FILE} username password:"
rm -f "${PEM_FILE}"
It 'writes pkcs8 secret key to a pem file for user "username" with password "password"'
When run keygen -f pem -o "${PEM_FILE}" -t ipfs username password
The path "${PEM_FILE}" should exist
The contents of file "${PEM_FILE}" should include '-----BEGIN PRIVATE KEY-----'
The contents of file "${PEM_FILE}" should include 'MC4CAQAwBQYDK2VwBCIEIA+XqCWjRqCjNe9oU3QA796bEH+T+rxgyPQ/EkXvE2Mv'
The contents of file "${PEM_FILE}" should include '-----END PRIVATE KEY-----'
The status should be success
The stderr should equal ""
End
End
Describe "-f pb2 -o ${PB2_FILE} username password:"
rm -f "${PB2_FILE}"
It 'writes protobuf2 secret key to a pb2 file for user "username" with password "password"'
decode_pb2() {
xxd -ps "${PB2_FILE}"
}
not_xxd() {
! which xxd >/dev/null 2>&1
}
Skip if 'You should install xxd' not_xxd
When run keygen -f pb2 -o "${PB2_FILE}" username password
The path "${PB2_FILE}" should exist
The result of function decode_pb2 should include '080112400f97a825a346a0a335ef68537400efde9b107f93fabc60c8f43f'
The result of function decode_pb2 should include '1245ef13632f349a136ef70ffa6e75f97c31ae65aa1da3a9235643d144b0'
The result of function decode_pb2 should include '2e3a80995f01a1ab'
The status should be success
The stderr should equal ""
End
End
Describe "-f pubsec -o ${PUBSEC_FILE} username password:"
rm -f "${PUBSEC_FILE}"
It 'writes base58 public and secret keys to a pubsec file for user "username" with password "password"'
When run keygen -f pubsec -o "${PUBSEC_FILE}" username password
The path "${PUBSEC_FILE}" should exist
The contents of file "${PUBSEC_FILE}" should include 'Type: PubSec'
The contents of file "${PUBSEC_FILE}" should include 'Version: 1'
The contents of file "${PUBSEC_FILE}" should include 'pub: 4YLU1xQ9jzb7LzC6d91VZrYTEKS9N2j93Nnvcee6wxZG'
The contents of file "${PUBSEC_FILE}" should include 'sec: K5heSX4xGUPtRbxcZh6zbgaKbDv8FeVc9JuSNWtUs7C1oGNKqv7kQJ3DHdouTPzoW4duKKnuLQK8LbHKfN9fkjC'
The status should be success
The stderr should equal ""
End
End
Describe "-o ${PUBSEC_FILE} -t duniter username password:"
rm -f "${PUBSEC_FILE}"
It 'writes duniter public and secret keys to a pubsec file for user "username" with password "password"'
When run keygen -o "${PUBSEC_FILE}" -t duniter username password
The path "${PUBSEC_FILE}" should exist
The contents of file "${PUBSEC_FILE}" should include 'Type: PubSec'
The contents of file "${PUBSEC_FILE}" should include 'Version: 1'
The contents of file "${PUBSEC_FILE}" should include 'pub: 4YLU1xQ9jzb7LzC6d91VZrYTEKS9N2j93Nnvcee6wxZG'
The contents of file "${PUBSEC_FILE}" should include 'sec: K5heSX4xGUPtRbxcZh6zbgaKbDv8FeVc9JuSNWtUs7C1oGNKqv7kQJ3DHdouTPzoW4duKKnuLQK8LbHKfN9fkjC'
The status should be success
The stderr should equal ""
End
End
Describe "-i ${PUBSEC_FILE} -t ipfs -pk:"
It 'prints prefixed ipfs public and secret keys for base58 keys read in a pubsec file'
When run keygen -i "${PUBSEC_FILE}" -t ipfs -pk
The output should include 'PeerID: 12D3KooWDMhdm5yrvtrbkshXFjkqLedHieUnPioczy9wzdnzquHC'
The output should include 'PrivKEY: CAESQA+XqCWjRqCjNe9oU3QA796bEH+T+rxgyPQ/EkXvE2MvNJoTbvcP+m51+XwxrmWqHaOpI1ZD0USwLjqAmV8Boas='
The status should be success
The stderr should equal ""
End
End
Describe '-t gpg username password birthday:'
It 'creates a password protected gpg key for user username'
Skip "You should implement it !"
When run keygen -t pgp username password birthday
The status should be success
End
End
Describe '-g -t duniter -pk username:'
It 'prints prefixed duniter keys for gpg key matching "username"'
When run keygen -g -t duniter -pk username
Describe '-pkg username:'
gpg --batch --import --quiet specs/username.asc
It 'prints prefixed base58 public and secret keys for ed25519 gpg key matching "username"'
When run keygen -pkg username
The output should include 'pub: 2g5UL2zhkn5i7oNYDpWo3fBuWvRYVU1AbMtdVmnGzPNv'
The output should include 'sec: 5WtYFfA26nTfG496gAKhkrLYUMMnwXexmE1E8Q7PvtQEyscHfirsdMzW34zDp7WEkt3exNEVwoG4ajZYrm62wpi2'
The status should be success
The stderr should equal ""
End
gpg --batch --delete-secret-and-public-key --yes 4D1CDB77E91FFCD81B10F9A7079E5BF4721944FB
End
Describe '-g -t duniter -pk username@protected password:'
It 'prints prefixed duniter keys for gpg key matching "username@protected" locked with "password"'
When run keygen -g -t duniter -pk username@protected password
Describe '-pkg username@protected password:'
gpg --batch --import --quiet specs/username_protected.asc
It 'prints prefixed public and secret keys for ed25519 gpg key matching "username@protected" locked with "password"'
When run keygen -pkg username@protected password
The output should include 'pub: C1cRu7yb5rZhsmRHQkeZxusAhtYYJypcnXpY3HycEKsU'
The output should include 'sec: VWaEdDroSCoagJDsBnDNUtXJtKAJYdqL6XKNiomz8DtiyF44FvpiMmhidXt2j8HhDBKPZ67xBGcZPnj4Myk6cB8'
The status should be success
The stderr should equal ""
End
gpg --batch --delete-secret-and-public-key --yes 6AF574897D4979B7956AC31B6222A29CBC31A087
End
Describe '-g -t ipfs -pk username:'
It 'prints prefixed ipfs keys for gpg key matching "username"'
When run keygen -g -t ipfs -pk username
The output should include 'PeerID: 12D3KooWBVSe5AaQwgMCXgsxrRG8pTGk1FUBXA5eYxFeskwAtL6r'
The output should include 'PrivKEY: CAESQOHXwPgzoiDca1ZnvhU/W3zdogZXulkoErnUsqt+ut82GN5k4MIbVvz2m6Vq0ij9fQFPNUz+ZZdv2D31K6mzBQc='
Describe '-pkg usersame:'
gpg --batch --import --quiet specs/usersame.asc
It 'prints prefixed base58 public and secret keys for rsa gpg key matching "usersame"'
When run keygen -pkg usersame
The output should include 'pub: 4NxSjjys6bo8mhM919MkvNkNPFu4zpFyxu1r7yJ39K87'
The output should include 'sec: 2cLFNeXiqcKKv5BF9JVTwtWmFHLvjDkJkrCyQbST9oYbsQLHsVaUAzbwrv5YfzQcPHu6e6XUzdstKy4kLhgDSGiw'
The status should be success
The stderr should equal ""
End
gpg --batch --delete-secret-and-public-key --yes 845E099CFD17FD07346F9D26CAB2E65557C656DF
End
Describe '-g -t ipfs -pk username@protected password:'
It 'prints prefixed ipfs keys for gpg key matching "username@protected" locked with "password"'
When run keygen -g -t ipfs -pk username@protected password
The output should include 'PeerID: 12D3KooWLpybeFZJGkqCHevi3MPujhx1CDbBLfu6k8BZRH8W8GbQ'
The output should include 'PrivKEY: CAESQBiV+XnBNnryoeBs6SNj9e7Cd9Xj6INn24wyxxacylYqo5idwBHJto4Vbbp6NQzuUF+e7aCmrCf6y+BSyL42/i8='
Describe '-pkg usersame@protected password:'
gpg --batch --import --quiet specs/usersame_protected.asc
It 'prints prefixed public and secret keys for rsa gpg key matching "usersame@protected" locked with "password"'
When run keygen -pkg usersame@protected password
The output should include 'pub: 5kh2uqNTuYsLN7fwSRP3JWM4Hotcpdkb7frRNZwo9BPp'
The output should include 'sec: LdWjjkP7gRzH4k4gNkQs2er26bE2Dhz7cGPE8fMNixe1Uv2ZHbo1QtyZxmDeTP77y6HVLbHNoXdMTHdo6ip9PHk'
The status should be success
The stderr should equal ""
End
gpg --batch --delete-secret-and-public-key --yes 78BC5CD37664E5C1AA85AC97ABC22BF0C070C9AD
End
Describe "-g -o ${DUNITER_PUBSEC_FILE} -t duniter username:"
It 'writes duniter keys to file for gpg key matching "username"'
When run keygen -g -o "${DUNITER_PUBSEC_FILE}" -t duniter username
The path "${DUNITER_PUBSEC_FILE}" should exist
The contents of file "${DUNITER_PUBSEC_FILE}" should include 'pub: 2g5UL2zhkn5i7oNYDpWo3fBuWvRYVU1AbMtdVmnGzPNv'
The contents of file "${DUNITER_PUBSEC_FILE}" should include 'sec: 5WtYFfA26nTfG496gAKhkrLYUMMnwXexmE1E8Q7PvtQEyscHfirsdMzW34zDp7WEkt3exNEVwoG4ajZYrm62wpi2'
The status should be success
The stderr should equal ""
End
rm -f "${DUNITER_PUBSEC_FILE}"
End
Describe "-g -o ${DUNITER_PUBSEC_FILE} -t duniter username@protected password:"
It 'writes duniter keys to file for gpg key matching "username@protected" locked with "password"'
When run keygen -g -o "${DUNITER_PUBSEC_FILE}" -t duniter username@protected password
The path "${DUNITER_PUBSEC_FILE}" should exist
The contents of file "${DUNITER_PUBSEC_FILE}" should include 'pub: C1cRu7yb5rZhsmRHQkeZxusAhtYYJypcnXpY3HycEKsU'
The contents of file "${DUNITER_PUBSEC_FILE}" should include 'sec: VWaEdDroSCoagJDsBnDNUtXJtKAJYdqL6XKNiomz8DtiyF44FvpiMmhidXt2j8HhDBKPZ67xBGcZPnj4Myk6cB8'
The status should be success
The stderr should equal ""
End
rm -f "${DUNITER_PUBSEC_FILE}"
End
Describe "-g -o ${IPFS_PEM_FILE} -t ipfs username:"
It 'writes ipfs keys to file for gpg key matching "username"'
When run keygen -g -o "${IPFS_PEM_FILE}" -t ipfs username
The path "${IPFS_PEM_FILE}" should exist
The contents of file "${IPFS_PEM_FILE}" should include '-----BEGIN PRIVATE KEY-----'
The contents of file "${IPFS_PEM_FILE}" should include 'MC4CAQAwBQYDK2VwBCIEIOHXwPgzoiDca1ZnvhU/W3zdogZXulkoErnUsqt+ut82'
The contents of file "${IPFS_PEM_FILE}" should include '-----END PRIVATE KEY-----'
The status should be success
The stderr should equal ""
End
rm -f "${IPFS_PEM_FILE}"
End
Describe "-g -o ${IPFS_PEM_FILE} -t ipfs username@protected password:"
It 'writes ipfs keys to file for gpg key matching "username@protected" locked with "password"'
When run keygen -g -o "${IPFS_PEM_FILE}" -t ipfs username@protected password
The path "${IPFS_PEM_FILE}" should exist
The contents of file "${IPFS_PEM_FILE}" should include '-----BEGIN PRIVATE KEY-----'
The contents of file "${IPFS_PEM_FILE}" should include 'MC4CAQAwBQYDK2VwBCIEIBiV+XnBNnryoeBs6SNj9e7Cd9Xj6INn24wyxxacylYq'
The contents of file "${IPFS_PEM_FILE}" should include '-----END PRIVATE KEY-----'
The status should be success
The stderr should equal ""
End
rm -f "${IPFS_PEM_FILE}"
End
gpg --batch --delete-secret-and-public-key --yes 4D1CDB77E91FFCD81B10F9A7079E5BF4721944FB
gpg --batch --delete-secret-and-public-key --yes 6AF574897D4979B7956AC31B6222A29CBC31A087
End
rm -rf "${TEST_DIR}"

43
specs/usersame.asc Normal file
View File

@ -0,0 +1,43 @@
-----BEGIN PGP PRIVATE KEY BLOCK-----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=wJqs
-----END PGP PRIVATE KEY BLOCK-----

View File

@ -0,0 +1,44 @@
-----BEGIN PGP PRIVATE KEY BLOCK-----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=74Lj
-----END PGP PRIVATE KEY BLOCK-----