diff --git a/Makefile b/Makefile index b970996..68ecca7 100644 --- a/Makefile +++ b/Makefile @@ -1,11 +1,13 @@ -MYOS ?= ../myos --include $(MYOS)/make/include.mk - -PREFIX ?= /usr/local -BINDIR ?= $(PREFIX)/bin - +BINDIR ?= $(PREFIX)/bin +PREFIX ?= /usr/local .PHONY: all default install shellcheck-% shellspec-% tests uninstall +-include $(MYOS)/make/include.mk +MYOS ?= ../myos +MYOS_REPOSITORY ?= $(patsubst %/dpgpid,%/myos,$(shell git config --get remote.origin.url 2>/dev/null)) +$(MYOS): + -@git clone $(MYOS_REPOSITORY) $(MYOS) + default: tests all: install tests @@ -13,6 +15,8 @@ all: install tests install: mkdir -p "$(BINDIR)" install dpgpid "$(BINDIR)/dpgpid" + install keygen "$(BINDIR)/keygen" + pip install -r requirements.txt shellcheck-%: shellcheck $*/*.sh @@ -24,3 +28,4 @@ tests: shellcheck-specs shellspec-specs uninstall: rm -f "$(BINDIR)/dpgpid" + rm -f "$(BINDIR)/keygen" diff --git a/README.md b/README.md index 1d994c2..5d226b0 100644 --- a/README.md +++ b/README.md @@ -1,17 +1,53 @@ # dpgpid - Decentralized PGP IDentifiers +A world of trust with Decentralized IDentifiers on IPFS. + ## Disclaimer This is work in progress ;) +## Requirements + +* gpg +* ipfs +* pinentry +* python3 +* python3-pip + ## Usage -Show identifiers +### dpgpid + +dpgpid helps you to publish, retrieve and sign ed25519 keys with decentralized identifiers on IPFS. + +* Show identifiers ```shell $ dpgpid show ``` +### keygen + +keygen helps you to generate an ed25519 key in different formats + +* Show duniter public key for user "username" and password "password" + +```shell +$ keygen username password +``` + +* Show IPFS PeerID and PrivKEY for user "username" and password "password" + +```shell +$ keygen -pk -t ipfs username password +``` + +* Show duniter public and secret keys for GPG key matching uid "username" and protected with password "password" + +```shell +$ keygen -pkg username password +``` + ## Tests Run tests @@ -22,8 +58,8 @@ $ make tests ## Status -Use it at your own risks. +Alpha version, file and output formats may change without retro compatibility. ## References -* [Inter Planetary IDentifiers](https://did-ipid.github.io/ipid-did-method/) +* [Inter Planetary IDentifiers](https://did-ipid.github.io/ipid-did-method/) did method diff --git a/specs/keygen_spec.sh b/specs/keygen_spec.sh index cba38fd..10a31e3 100644 --- a/specs/keygen_spec.sh +++ b/specs/keygen_spec.sh @@ -1,21 +1,21 @@ #shellcheck shell=sh set -eu -TEST_DIR="$(mktemp -d)" -DUNITER_PUBSEC_FILE="${TEST_DIR}/duniter.pubsec" -IPFS_PEM_FILE="${TEST_DIR}/ipfs.pem" +PB2_FILE="${SHELLSPEC_TMPBASE}/key.pb2" +PEM_FILE="${SHELLSPEC_TMPBASE}/key.pem" +PUBSEC_FILE="${SHELLSPEC_TMPBASE}/key.pubsec" gpg() { - GNUPGHOME="${TEST_DIR}" command gpg "$@" + GNUPGHOME="${SHELLSPEC_TMPBASE}" command gpg "$@" } keygen() { if [ -x ./keygen ]; then - GNUPGHOME="${TEST_DIR}" ./keygen "$@" + GNUPGHOME="${SHELLSPEC_TMPBASE}" ./keygen "$@" elif [ -x ./bin/keygen ]; then - GNUPGHOME="${TEST_DIR}" ./bin/keygen "$@" + GNUPGHOME="${SHELLSPEC_TMPBASE}" ./bin/keygen "$@" else - GNUPGHOME="${TEST_DIR}" command keygen "$@" + GNUPGHOME="${SHELLSPEC_TMPBASE}" command keygen "$@" fi } @@ -105,75 +105,17 @@ Describe 'keygen' The stderr should equal "" End End - Describe '-t duniter -pk username password:' - It 'prints prefixed duniter public key for user "username" with password "password"' - When run keygen -t duniter -pk username password + Describe '-t base58 -pk username password:' + It 'prints prefixed base58 public and secret keys for user "username" with password "password"' + When run keygen -t base58 -pk username password The output should include 'pub: 4YLU1xQ9jzb7LzC6d91VZrYTEKS9N2j93Nnvcee6wxZG' The output should include 'sec: K5heSX4xGUPtRbxcZh6zbgaKbDv8FeVc9JuSNWtUs7C1oGNKqv7kQJ3DHdouTPzoW4duKKnuLQK8LbHKfN9fkjC' The status should be success The stderr should equal "" End End - Describe "-o ${DUNITER_PUBSEC_FILE} -t duniter username password:" - rm -f "${DUNITER_PUBSEC_FILE}" - It 'writes duniter keys to file for user "username" with password "password"' - When run keygen -o "${DUNITER_PUBSEC_FILE}" -t duniter username password - The path "${DUNITER_PUBSEC_FILE}" should exist - The contents of file "${DUNITER_PUBSEC_FILE}" should include 'pub: 4YLU1xQ9jzb7LzC6d91VZrYTEKS9N2j93Nnvcee6wxZG' - The contents of file "${DUNITER_PUBSEC_FILE}" should include 'sec: K5heSX4xGUPtRbxcZh6zbgaKbDv8FeVc9JuSNWtUs7C1oGNKqv7kQJ3DHdouTPzoW4duKKnuLQK8LbHKfN9fkjC' - The status should be success - The stderr should equal "" - End - End - Describe "-i ${DUNITER_PUBSEC_FILE} -t ipfs -pk:" - It 'prints prefixed ipfs keys for duniter keys read in pubsec file' - When run keygen -i "${DUNITER_PUBSEC_FILE}" -t ipfs -pk - The output should include 'PeerID: 12D3KooWDMhdm5yrvtrbkshXFjkqLedHieUnPioczy9wzdnzquHC' - The output should include 'PrivKEY: CAESQA+XqCWjRqCjNe9oU3QA796bEH+T+rxgyPQ/EkXvE2MvNJoTbvcP+m51+XwxrmWqHaOpI1ZD0USwLjqAmV8Boas=' - The status should be success - The stderr should equal "" - End - End - Describe "-i ${DUNITER_PUBSEC_FILE} -o ${IPFS_PEM_FILE} -t ipfs:" - It 'writes ipfs keys to file for duniter keys read in pubsec file' - When run keygen -i "${DUNITER_PUBSEC_FILE}" -o "${IPFS_PEM_FILE}" -t ipfs - The path "${IPFS_PEM_FILE}" should exist - The contents of file "${IPFS_PEM_FILE}" should include '-----BEGIN PRIVATE KEY-----' - The contents of file "${IPFS_PEM_FILE}" should include 'MC4CAQAwBQYDK2VwBCIEIA+XqCWjRqCjNe9oU3QA796bEH+T+rxgyPQ/EkXvE2Mv' - The contents of file "${IPFS_PEM_FILE}" should include '-----END PRIVATE KEY-----' - The status should be success - The stderr should equal "" - End - rm -f "${DUNITER_PUBSEC_FILE}" "${IPFS_PEM_FILE}" - End - Describe '-t ipfs username password:' - It 'prints ipfs public key for user "username" with password "password"' - When run keygen -t ipfs username password - The output should include '12D3KooWDMhdm5yrvtrbkshXFjkqLedHieUnPioczy9wzdnzquHC' - The status should be success - The stderr should equal "" - End - End - Describe '-t ipfs -k username password:' - It 'prints ipfs keys for user "username" with password "password"' - When run keygen -t ipfs -k username password - The output should include '12D3KooWDMhdm5yrvtrbkshXFjkqLedHieUnPioczy9wzdnzquHC' - The output should include 'CAESQA+XqCWjRqCjNe9oU3QA796bEH+T+rxgyPQ/EkXvE2MvNJoTbvcP+m51+XwxrmWqHaOpI1ZD0USwLjqAmV8Boas=' - The status should be success - The stderr should equal "" - End - End - Describe '-t ipfs -pk username password:' - It 'prints prefixed ipfs keys for user "username" with password "password"' - When run keygen -t ipfs -pk username password - The output should include 'PeerID: 12D3KooWDMhdm5yrvtrbkshXFjkqLedHieUnPioczy9wzdnzquHC' - The output should include 'PrivKEY: CAESQA+XqCWjRqCjNe9oU3QA796bEH+T+rxgyPQ/EkXvE2MvNJoTbvcP+m51+XwxrmWqHaOpI1ZD0USwLjqAmV8Boas=' - The status should be success - The stderr should equal "" - End - End Describe '-t base64 -pk username password:' - It 'prints prefixed base64 keys for user "username" with password "password"' + It 'prints prefixed base64 public and secret keys for user "username" with password "password"' When run keygen -t base64 -pk username password The output should include 'pub: NJoTbvcP+m51+XwxrmWqHaOpI1ZD0USwLjqAmV8Boas=' The output should include 'sec: D5eoJaNGoKM172hTdADv3psQf5P6vGDI9D8SRe8TYy80mhNu9w/6bnX5fDGuZaodo6kjVkPRRLAuOoCZXwGhqw==' @@ -181,111 +123,151 @@ Describe 'keygen' The stderr should equal "" End End - Describe "-o ${IPFS_PEM_FILE} -t ipfs username password:" - It 'writes ipfs keys to file for user "username" with password "password"' - When run keygen username password -o "${IPFS_PEM_FILE}" -t ipfs - The path "${IPFS_PEM_FILE}" should exist - The contents of file "${IPFS_PEM_FILE}" should include '-----BEGIN PRIVATE KEY-----' - The contents of file "${IPFS_PEM_FILE}" should include 'MC4CAQAwBQYDK2VwBCIEIA+XqCWjRqCjNe9oU3QA796bEH+T+rxgyPQ/EkXvE2Mv' - The contents of file "${IPFS_PEM_FILE}" should include '-----END PRIVATE KEY-----' + Describe '-t duniter -pk username password:' + It 'prints prefixed duniter public and secret keys for user "username" with password "password"' + When run keygen -t duniter -pk username password + The output should include 'pub: 4YLU1xQ9jzb7LzC6d91VZrYTEKS9N2j93Nnvcee6wxZG' + The output should include 'sec: K5heSX4xGUPtRbxcZh6zbgaKbDv8FeVc9JuSNWtUs7C1oGNKqv7kQJ3DHdouTPzoW4duKKnuLQK8LbHKfN9fkjC' The status should be success The stderr should equal "" End - rm -f "${IPFS_PEM_FILE}" End - Describe '-t pgp username password birthday:' - gpg --batch --import --quiet specs/username.asc - gpg --batch --import --quiet specs/username_protected.asc + Describe '-t ipfs -pk username password:' + It 'prints prefixed ipfs public and secret keys for user "username" with password "password"' + When run keygen -t ipfs -pk username password + The output should include 'PeerID: 12D3KooWDMhdm5yrvtrbkshXFjkqLedHieUnPioczy9wzdnzquHC' + The output should include 'PrivKEY: CAESQA+XqCWjRqCjNe9oU3QA796bEH+T+rxgyPQ/EkXvE2MvNJoTbvcP+m51+XwxrmWqHaOpI1ZD0USwLjqAmV8Boas=' + The status should be success + The stderr should equal "" + End + End + Describe "-o ${PEM_FILE} username password:" + rm -f "${PEM_FILE}" + It 'writes pkcs8 secret key to a pem file for user "username" with password "password"' + When run keygen -o "${PEM_FILE}" -t ipfs username password + The path "${PEM_FILE}" should exist + The contents of file "${PEM_FILE}" should include '-----BEGIN PRIVATE KEY-----' + The contents of file "${PEM_FILE}" should include 'MC4CAQAwBQYDK2VwBCIEIA+XqCWjRqCjNe9oU3QA796bEH+T+rxgyPQ/EkXvE2Mv' + The contents of file "${PEM_FILE}" should include '-----END PRIVATE KEY-----' + The status should be success + The stderr should equal "" + End + End + Describe "-f pem -o ${PEM_FILE} username password:" + rm -f "${PEM_FILE}" + It 'writes pkcs8 secret key to a pem file for user "username" with password "password"' + When run keygen -f pem -o "${PEM_FILE}" -t ipfs username password + The path "${PEM_FILE}" should exist + The contents of file "${PEM_FILE}" should include '-----BEGIN PRIVATE KEY-----' + The contents of file "${PEM_FILE}" should include 'MC4CAQAwBQYDK2VwBCIEIA+XqCWjRqCjNe9oU3QA796bEH+T+rxgyPQ/EkXvE2Mv' + The contents of file "${PEM_FILE}" should include '-----END PRIVATE KEY-----' + The status should be success + The stderr should equal "" + End + End + Describe "-f pb2 -o ${PB2_FILE} username password:" + rm -f "${PB2_FILE}" + It 'writes protobuf2 secret key to a pb2 file for user "username" with password "password"' + decode_pb2() { + xxd -ps "${PB2_FILE}" + } + not_xxd() { + ! which xxd >/dev/null 2>&1 + } + Skip if 'You should install xxd' not_xxd + When run keygen -f pb2 -o "${PB2_FILE}" username password + The path "${PB2_FILE}" should exist + The result of function decode_pb2 should include '080112400f97a825a346a0a335ef68537400efde9b107f93fabc60c8f43f' + The result of function decode_pb2 should include '1245ef13632f349a136ef70ffa6e75f97c31ae65aa1da3a9235643d144b0' + The result of function decode_pb2 should include '2e3a80995f01a1ab' + The status should be success + The stderr should equal "" + End + End + Describe "-f pubsec -o ${PUBSEC_FILE} username password:" + rm -f "${PUBSEC_FILE}" + It 'writes base58 public and secret keys to a pubsec file for user "username" with password "password"' + When run keygen -f pubsec -o "${PUBSEC_FILE}" username password + The path "${PUBSEC_FILE}" should exist + The contents of file "${PUBSEC_FILE}" should include 'Type: PubSec' + The contents of file "${PUBSEC_FILE}" should include 'Version: 1' + The contents of file "${PUBSEC_FILE}" should include 'pub: 4YLU1xQ9jzb7LzC6d91VZrYTEKS9N2j93Nnvcee6wxZG' + The contents of file "${PUBSEC_FILE}" should include 'sec: K5heSX4xGUPtRbxcZh6zbgaKbDv8FeVc9JuSNWtUs7C1oGNKqv7kQJ3DHdouTPzoW4duKKnuLQK8LbHKfN9fkjC' + The status should be success + The stderr should equal "" + End + End + Describe "-o ${PUBSEC_FILE} -t duniter username password:" + rm -f "${PUBSEC_FILE}" + It 'writes duniter public and secret keys to a pubsec file for user "username" with password "password"' + When run keygen -o "${PUBSEC_FILE}" -t duniter username password + The path "${PUBSEC_FILE}" should exist + The contents of file "${PUBSEC_FILE}" should include 'Type: PubSec' + The contents of file "${PUBSEC_FILE}" should include 'Version: 1' + The contents of file "${PUBSEC_FILE}" should include 'pub: 4YLU1xQ9jzb7LzC6d91VZrYTEKS9N2j93Nnvcee6wxZG' + The contents of file "${PUBSEC_FILE}" should include 'sec: K5heSX4xGUPtRbxcZh6zbgaKbDv8FeVc9JuSNWtUs7C1oGNKqv7kQJ3DHdouTPzoW4duKKnuLQK8LbHKfN9fkjC' + The status should be success + The stderr should equal "" + End + End + Describe "-i ${PUBSEC_FILE} -t ipfs -pk:" + It 'prints prefixed ipfs public and secret keys for base58 keys read in a pubsec file' + When run keygen -i "${PUBSEC_FILE}" -t ipfs -pk + The output should include 'PeerID: 12D3KooWDMhdm5yrvtrbkshXFjkqLedHieUnPioczy9wzdnzquHC' + The output should include 'PrivKEY: CAESQA+XqCWjRqCjNe9oU3QA796bEH+T+rxgyPQ/EkXvE2MvNJoTbvcP+m51+XwxrmWqHaOpI1ZD0USwLjqAmV8Boas=' + The status should be success + The stderr should equal "" + End + End + Describe '-t gpg username password birthday:' It 'creates a password protected gpg key for user username' Skip "You should implement it !" When run keygen -t pgp username password birthday The status should be success End End - Describe '-g -t duniter -pk username:' - It 'prints prefixed duniter keys for gpg key matching "username"' - When run keygen -g -t duniter -pk username + Describe '-pkg username:' + gpg --batch --import --quiet specs/username.asc + It 'prints prefixed base58 public and secret keys for ed25519 gpg key matching "username"' + When run keygen -pkg username The output should include 'pub: 2g5UL2zhkn5i7oNYDpWo3fBuWvRYVU1AbMtdVmnGzPNv' The output should include 'sec: 5WtYFfA26nTfG496gAKhkrLYUMMnwXexmE1E8Q7PvtQEyscHfirsdMzW34zDp7WEkt3exNEVwoG4ajZYrm62wpi2' The status should be success The stderr should equal "" End + gpg --batch --delete-secret-and-public-key --yes 4D1CDB77E91FFCD81B10F9A7079E5BF4721944FB End - Describe '-g -t duniter -pk username@protected password:' - It 'prints prefixed duniter keys for gpg key matching "username@protected" locked with "password"' - When run keygen -g -t duniter -pk username@protected password + Describe '-pkg username@protected password:' + gpg --batch --import --quiet specs/username_protected.asc + It 'prints prefixed public and secret keys for ed25519 gpg key matching "username@protected" locked with "password"' + When run keygen -pkg username@protected password The output should include 'pub: C1cRu7yb5rZhsmRHQkeZxusAhtYYJypcnXpY3HycEKsU' The output should include 'sec: VWaEdDroSCoagJDsBnDNUtXJtKAJYdqL6XKNiomz8DtiyF44FvpiMmhidXt2j8HhDBKPZ67xBGcZPnj4Myk6cB8' The status should be success The stderr should equal "" End + gpg --batch --delete-secret-and-public-key --yes 6AF574897D4979B7956AC31B6222A29CBC31A087 End - Describe '-g -t ipfs -pk username:' - It 'prints prefixed ipfs keys for gpg key matching "username"' - When run keygen -g -t ipfs -pk username - The output should include 'PeerID: 12D3KooWBVSe5AaQwgMCXgsxrRG8pTGk1FUBXA5eYxFeskwAtL6r' - The output should include 'PrivKEY: CAESQOHXwPgzoiDca1ZnvhU/W3zdogZXulkoErnUsqt+ut82GN5k4MIbVvz2m6Vq0ij9fQFPNUz+ZZdv2D31K6mzBQc=' + Describe '-pkg usersame:' + gpg --batch --import --quiet specs/usersame.asc + It 'prints prefixed base58 public and secret keys for rsa gpg key matching "usersame"' + When run keygen -pkg usersame + The output should include 'pub: 4NxSjjys6bo8mhM919MkvNkNPFu4zpFyxu1r7yJ39K87' + The output should include 'sec: 2cLFNeXiqcKKv5BF9JVTwtWmFHLvjDkJkrCyQbST9oYbsQLHsVaUAzbwrv5YfzQcPHu6e6XUzdstKy4kLhgDSGiw' The status should be success The stderr should equal "" End + gpg --batch --delete-secret-and-public-key --yes 845E099CFD17FD07346F9D26CAB2E65557C656DF End - Describe '-g -t ipfs -pk username@protected password:' - It 'prints prefixed ipfs keys for gpg key matching "username@protected" locked with "password"' - When run keygen -g -t ipfs -pk username@protected password - The output should include 'PeerID: 12D3KooWLpybeFZJGkqCHevi3MPujhx1CDbBLfu6k8BZRH8W8GbQ' - The output should include 'PrivKEY: CAESQBiV+XnBNnryoeBs6SNj9e7Cd9Xj6INn24wyxxacylYqo5idwBHJto4Vbbp6NQzuUF+e7aCmrCf6y+BSyL42/i8=' + Describe '-pkg usersame@protected password:' + gpg --batch --import --quiet specs/usersame_protected.asc + It 'prints prefixed public and secret keys for rsa gpg key matching "usersame@protected" locked with "password"' + When run keygen -pkg usersame@protected password + The output should include 'pub: 5kh2uqNTuYsLN7fwSRP3JWM4Hotcpdkb7frRNZwo9BPp' + The output should include 'sec: LdWjjkP7gRzH4k4gNkQs2er26bE2Dhz7cGPE8fMNixe1Uv2ZHbo1QtyZxmDeTP77y6HVLbHNoXdMTHdo6ip9PHk' The status should be success The stderr should equal "" End + gpg --batch --delete-secret-and-public-key --yes 78BC5CD37664E5C1AA85AC97ABC22BF0C070C9AD End - Describe "-g -o ${DUNITER_PUBSEC_FILE} -t duniter username:" - It 'writes duniter keys to file for gpg key matching "username"' - When run keygen -g -o "${DUNITER_PUBSEC_FILE}" -t duniter username - The path "${DUNITER_PUBSEC_FILE}" should exist - The contents of file "${DUNITER_PUBSEC_FILE}" should include 'pub: 2g5UL2zhkn5i7oNYDpWo3fBuWvRYVU1AbMtdVmnGzPNv' - The contents of file "${DUNITER_PUBSEC_FILE}" should include 'sec: 5WtYFfA26nTfG496gAKhkrLYUMMnwXexmE1E8Q7PvtQEyscHfirsdMzW34zDp7WEkt3exNEVwoG4ajZYrm62wpi2' - The status should be success - The stderr should equal "" - End - rm -f "${DUNITER_PUBSEC_FILE}" - End - Describe "-g -o ${DUNITER_PUBSEC_FILE} -t duniter username@protected password:" - It 'writes duniter keys to file for gpg key matching "username@protected" locked with "password"' - When run keygen -g -o "${DUNITER_PUBSEC_FILE}" -t duniter username@protected password - The path "${DUNITER_PUBSEC_FILE}" should exist - The contents of file "${DUNITER_PUBSEC_FILE}" should include 'pub: C1cRu7yb5rZhsmRHQkeZxusAhtYYJypcnXpY3HycEKsU' - The contents of file "${DUNITER_PUBSEC_FILE}" should include 'sec: VWaEdDroSCoagJDsBnDNUtXJtKAJYdqL6XKNiomz8DtiyF44FvpiMmhidXt2j8HhDBKPZ67xBGcZPnj4Myk6cB8' - The status should be success - The stderr should equal "" - End - rm -f "${DUNITER_PUBSEC_FILE}" - End - Describe "-g -o ${IPFS_PEM_FILE} -t ipfs username:" - It 'writes ipfs keys to file for gpg key matching "username"' - When run keygen -g -o "${IPFS_PEM_FILE}" -t ipfs username - The path "${IPFS_PEM_FILE}" should exist - The contents of file "${IPFS_PEM_FILE}" should include '-----BEGIN PRIVATE KEY-----' - The contents of file "${IPFS_PEM_FILE}" should include 'MC4CAQAwBQYDK2VwBCIEIOHXwPgzoiDca1ZnvhU/W3zdogZXulkoErnUsqt+ut82' - The contents of file "${IPFS_PEM_FILE}" should include '-----END PRIVATE KEY-----' - The status should be success - The stderr should equal "" - End - rm -f "${IPFS_PEM_FILE}" - End - Describe "-g -o ${IPFS_PEM_FILE} -t ipfs username@protected password:" - It 'writes ipfs keys to file for gpg key matching "username@protected" locked with "password"' - When run keygen -g -o "${IPFS_PEM_FILE}" -t ipfs username@protected password - The path "${IPFS_PEM_FILE}" should exist - The contents of file "${IPFS_PEM_FILE}" should include '-----BEGIN PRIVATE KEY-----' - The contents of file "${IPFS_PEM_FILE}" should include 'MC4CAQAwBQYDK2VwBCIEIBiV+XnBNnryoeBs6SNj9e7Cd9Xj6INn24wyxxacylYq' - The contents of file "${IPFS_PEM_FILE}" should include '-----END PRIVATE KEY-----' - The status should be success - The stderr should equal "" - End - rm -f "${IPFS_PEM_FILE}" - End - gpg --batch --delete-secret-and-public-key --yes 4D1CDB77E91FFCD81B10F9A7079E5BF4721944FB - gpg --batch --delete-secret-and-public-key --yes 6AF574897D4979B7956AC31B6222A29CBC31A087 End - -rm -rf "${TEST_DIR}" diff --git a/specs/usersame.asc b/specs/usersame.asc new file mode 100644 index 0000000..3fb1e71 --- /dev/null +++ b/specs/usersame.asc @@ -0,0 +1,43 @@ +-----BEGIN PGP PRIVATE KEY BLOCK----- + +lQVYBGMm1LsBDACyxQGa52gZPuOG8XGl6IbN9rwCAEmLKLSuCtj2O7N7/m08Xwih +sv39wem+rKgpl56hdBDtdrYAMntzN0mOt9ddWdvenjFxMHYyWs1hdA2SEbSbgRYu +EpUc+lomZbAjQQdpOCYxfOIKpQQpVRMYsvM3Sa77wc2gWqi9/jB5SSd6ltFozwzQ +qefd6PImY2OOIRZrqJ+XAJftySRbdAJz0ENvGNsjch8odpOFRze36iy3Y8Rlmhwu +d81coufQRLUh+pqscZ9DBSIlLWXodjEW/vM6/x/U3Lgjdp2m7/XOfbuJW+ldxr2f +6oIMAykD+m9WzLPYZZpvgbR9NzuFPCDosm1NEUwUbQil86hke1n6bNmJlxu753Xe +xSRCTHzKUQxwm3B8g5Uy1jPJJnz6WgkTM07AjsU9jBUhbtj8ZdjbsgT3A/+QKOc7 +j+u4C3DBa28fKbeHvcd9rA5Kuqbm8I4gRI4V6hLAFe6Q4BPV9vZmfCumSQkU4wml +D6a/+0frSuGYL1UAEQEAAQAL/1OlnMenaW0OoRW+GahAsfrjbTseeUr04/3fs38b +ljL5bJFoAjju8KtwtXdzgEfd2uq+zUDfX++dr2fMwc1Wth3G8vsqWAYXX+bV1+22 +iLcFM9XjQ8aRCVaCyfXXdOA6CEaycCSNw5KpfdX9Ka9P5D/FaWwBVb6nTPeBXZsS +oLdapGd/IgbsyUJrQgq2TJnvX3dGck4MiApKKInmMVORakwsfDUMrAmZ2hLtrOOQ +XhX9R6MmxfL0OZIT45Xu4DYi9L4u0ylhI9Ll/OTjsCPCjp3cSfJkUNhRgi/BWnAI +OQbEYVUNkPZah9bw2KvR1fJPP56azexxNSAHN1ucirPbGV9k32LBkA232qNQZuUw +v1XaazPEJys1COjlK01Twa/zOvv1V4/fIzHrzbsE+rPj4lnt78jGaylziPgJRrzU +4cAqZEDAdOfsUOcnA2ahUzZYpYscUGmo5O+0DCXvdtG51YyLCO1skgvKXrXpqYHN +OQnc2HUHYL2KZjLZ92zA3fLSTQYAyzELmubOKTbcV/CA4idm1TWwBkSaNH63jKvD +3eMroEdu+rJ7Iqt22yuGvcEzgrNzH2QYb5rGiKvMuuzhktRfDVzMElDPLHVOUggN +FjuH7Kne/fAN+F26o457ApafpS9S6H3BkPu2xaOh+I3fCnHUU4gN1mfbINn/FYsS +RKI/9X1x8bpX3TsoRAymc5J0f2Rmv0tjHc5j3WSkqceLY3b/Fg0XFD+A0Ha+W3Wp +K2wecO2/3fWWkXyEV5+piMsoGUsbBgDhOxbOdahgbYTOmoAVS97GYrZ4MhczD/RR +SQ993AdkIVeJpid1S2oMYTEVMJykbaeO2hUz6SddSaUluVwZq2vjK7LYEZlG7+kX +6Oriz1BfV++pLR6GI2PLJ4cOa8RyFovVFibN6w8iF0Ys5M1i1lBCoZq8wF1u9wYA +P33EYzjyTBHr1Mmeno4tx1HVQks6v9kt4S+jfACo6vOfB8L0f0qKWROLIhw8adBc +4//4y9sXzf0atjPY5uDQKLVlHAgsJk8GAJGhc9JkTNIL78M9SqETtcoHMpBzknzQ +NMD/1+njJSvfWRmP/Bc6ZngDVIjDCCBeJSrr61zPwZzFehqHWw5RUXT0+lNCIsXa +J+yz56d8SCWuHsnH+AgdNu4rup2K/YXgBRMk6Kb0DdQv+ceHFjKxTPbMH+i21ZRJ +rfqrqE+sBlkC3yFYeDK1eC7pvu4x1fXrhTdW8yNygUhb3xa56RYO7O0Ws6XgBavy +mCkEZTrWdGL7j00YSiHXyhQazuyENg85eev6tAh1c2Vyc2FtZYkBzgQTAQoAOBYh +BIReCZz9F/0HNG+dJsqy5lVXxlbfBQJjJtS7AhsDBQsJCAcDBRUKCQgLBRYCAwEA +Ah4BAheAAAoJEMqy5lVXxlbfancL/0yRTHxb0q4InoB8p+vKh8D0V+FgvO0IBFgl +tkwHYhO2XxCLAkJbBf8MoPdJmKyEGQ15IffQzHMaqguDsPMcgxkR/cKruIxjg1rG +wH+cjX1L/B2DelSZ+zlqt4lE6WPKEBqk9ip3xf5UVdCEa1g5Izg4CtR+zsCpEUh+ +qtCPt1ZvdFKOiEQ/Ba1yGtfIfvTObJqiC0ANWXxTvjRW0SvrdwqUoXc757kqEfpc +Txpb1sy/9EOGXrnQMkD6KITTdbPRwEiNiRljKGz8BKsXgzHei3+NoOz4F7Fb6qUF +//Zs5NaL9RX9qHR8HCtG6ltkSFwmRMJJfBKBd9u/hjbaXZD1QJQCWIy4IOd5l7rX +qD/vUNfjFz+B/s/ISB4da86F5W7eSCeMtHYfVzPYPEHOBVJgKVHvrvhqZ6pStsaC +791Wu5QwLPaKa9U3WdBf1FzAnY4OIcu5X3x3J6IcCs/4upCNI0JsYEv+m0tRwXnk +JqR+/wF8rj8gruJhoryVvMawv90AgQ== +=wJqs +-----END PGP PRIVATE KEY BLOCK----- diff --git a/specs/usersame_protected.asc b/specs/usersame_protected.asc new file mode 100644 index 0000000..273f357 --- /dev/null +++ b/specs/usersame_protected.asc @@ -0,0 +1,44 @@ +-----BEGIN PGP PRIVATE KEY BLOCK----- + +lQWGBGMm34cBDACy3LnyItnEMAgWLX/kX8vIanQqx3bQJ2zzDT9kZibTKLxk7N0o +7Q0/6epK5DOOcK2EzlagHVo/c1s0tq5+7wYXFtBmBAGRWUxXuB31perGyXTpTOOk +1A23YNxFH74AmDLeLm9TReteJUzNAxvS84LK9k84npgB3HP9EMxGTuU6F89dKbdG +M8AWbfOCh7l0RTluSAHgzQz7eMn3BfSbqUc7X4Ru6X4Ipgk+x9dz8X6eOoV90Pic +8L9nMer5JrVRn1FP7iG6zoFPhclQRDSLbr4S3lImqvSV96TX641cE/WLdaBEx/Yz +IK6+uCcux8XvkUwc1RGYeuVN1BJh4R3ivPw6q1+e2MO43vBv72Uen8ALdRzkeRDm +L6hbmYEZr4bySE8iBk++r1WPsWIqP36fBMmowq1UTjngFUJMpylAcvgCL3ILQUfd +WIuJbvDBsPAQqpDw3hh6pCsbviv2lMBChRcvJ9CQbxYp3ROHb+l4jdDUA7Sbo4eG +b9qln+7Doh8oJPEAEQEAAf4HAwL1tLvuFx2Ryu5NMwmo/flBwaz8UGeaO1SFsWQW +TZYQxQORo/4WoHkpQdbH1DZBvtb+rhwrxADgGvCgtz+ONmOe6vmC0s92Wzjz27aj +4s+MfeqNElWYQeZDqtFbS2+Vra4FZm6wnBCr+6BO9IS1q78j8J01FrpVbTZyUvv1 +JD+ZieN1neAImgrGPgSaTl3yJXMG43ydAWkYIvNX22w7H1cuBx3/mtJVSQQZD9Qt +EQcjqwaIlLsQ2pRCGokhiPeiYPjgoBFKIcIKuKIaPaJTVvAW8rrHrFPQ5E7GkxDW +An3uOG6Qgid6LLaWtu3HAoba/lJ6OIuoiS6oumEXb86852q+AftJsjK4m1DS6BW8 +2e2EwF6r3YwjOhemiGkYRBR661mD32dLGe+7lwMa5duo4qtOuWTz+YI19uaeSbA2 +U+b5QEhcrwkRM1vyfsBFzl73WjzaDygbrdU8VQGIs8fqdWzVwR1qSE24DV8oMAAy +APGFChU+N63rzf+o/FAnDTs1KI7h/ZYnFJJzhG5ckFpoaw74e0ciosXvqEPtUbLr +AUXZ80XIcK9HwF93Ghu5Z/7T8HaavqeOD6rnvxU42IaS0qVbBsCmqP3xEQ4cBHFr +F2rhZkeCEpwWBpykxzzWwYbdL86AmGjUOoNYGJxCzgUx2+2JLaOAlzIS0jANIX7u +JSRsbgMEqgM4MAJBwLSGW96s/knK95BLDDiogXr61inj7iatw3//i7RXNknWpsx4 +yEd08R5uiB1q6U/hq9aGz6bh25WsCLjhwDRxxSa5DBhM6zAmBCClrhG+G2dnCi4L +II52R9Ll5bIJrg7WilVaJelVqJGtzmb3dU85d6BJ66oAI6f2Ogc/6Y4vMcMFqxIr +TUw1C17DZFckkiM01SiHh6vIsUQNKSzo/AyMvJxUM6musinWCDaSwsMJbjn+8Jkx +TGoAUokPKv5iUJgQ16HWLFzzEonw+C6j6s19UIxXPDIR0dKVguUo7/m7/Onyyumh +IymxPbDYHAZac4NL4Y7al8LdhftRRklWklLQ8MjvBZ8iOpgbPUYe22iKZd/7K3u+ +Li8JGA1Po2dH7K2Ynv1FYi/Tx5VYupZKQMG1py07UveBIs84OQ94xvbrOp/BonGE +xVKZkphRL8EibRkez2inDtw4jj2E6sTWvJhXBXJjn+xzwVM7DOv29026V+YpTbZB ++ZcWMJTJGUXZjep9xIyMzeDuZbNnOM4S+eGKjnbNrQw11lbYNuMkXGp8mUDQ+A1b +U0qb1r0MMf+2FCozRACMyiBQn1IE3HEVN1PDEgMtCHzBFZZ2PyGuw4DjcsD/XuDc +vQI8XEURJ3qCCBh7AY1S933H7nIwlrT3vLQSdXNlcnNhbWVAcHJvdGVjdGVkiQHO +BBMBCgA4FiEEeLxc03Zk5cGqhayXq8Ir8MBwya0FAmMm34cCGwMFCwkIBwMFFQoJ +CAsFFgIDAQACHgECF4AACgkQq8Ir8MBwya0i7gwAhPlGytdELitd1wC/9zxxP2YH +bvXR2spJt8UGckYSzWwz7oxbVdswS7MPDgzOCKRafeLKrZKFk0il1EuhtYsVxXhk +WTw/BAkbnUv01lmAr8EAtGKxujZ1KCO9hCWYc8YKI0/J4Nb56itGqj6QNen4K1PX +8IV7eVbDg2ZfsV8he/Bp9cS9Qrw0hdC6f/3Y5FBgLWrB/SW/CN03HwP+NXimAPOw +k30L5hhHIjxZS4iCq8RiVqmmZrsG0BbUJdJyGDyz5d8mWld0PQYiKW1E7LUFu6AP +kJQPLCgtikVbHwuMG2QqQWhUrvtUtqmvswEaa94z/fAMlenJaX5WQ/+Q9vIQOOF6 +b1NBsUoP5PZg08xNk51pDj4Hn6eV5ajLuf0nLKUOBCHwqDR92+Opt7deAwiujr9c +7BdWikUOa5AXBSvFizUqR0sZ3rSZBfNKzIxx+hy5ohCJyBj+qxTtH3wGL7jPzHrx +yJ6FU2+RPR8KHtLY4a91udaWA/TN7T/ciECBk5pg +=74Lj +-----END PGP PRIVATE KEY BLOCK-----