1// Copyright 2015 Keybase, Inc. All rights reserved. Use of 2// this source code is governed by the included BSD license. 3 4package engine 5 6import ( 7 "bytes" 8 "testing" 9 10 "github.com/keybase/client/go/libkb" 11 keybase1 "github.com/keybase/client/go/protocol/keybase1" 12 "github.com/stretchr/testify/require" 13 "golang.org/x/net/context" 14 15 "github.com/keybase/go-crypto/openpgp" 16 "github.com/keybase/go-crypto/openpgp/armor" 17) 18 19// TestPGPSavePublicPush runs the PGPSave engine, pushing the 20// public key to api server and checks that it runs without error. 21func TestPGPImportAndExport(t *testing.T) { 22 tc := SetupEngineTest(t, "pgpsave") 23 defer tc.Cleanup() 24 25 u := CreateAndSignupFakeUser(tc, "login") 26 secui := &libkb.TestSecretUI{Passphrase: u.Passphrase} 27 uis := libkb.UIs{LogUI: tc.G.UI.GetLogUI(), SecretUI: secui} 28 29 // try all four permutations of push options: 30 31 fp, _, key := genPGPKeyAndArmor(t, tc, u.Email) 32 eng, err := NewPGPKeyImportEngineFromBytes(tc.G, []byte(key), false) 33 if err != nil { 34 t.Fatal(err) 35 } 36 m := NewMetaContextForTest(tc).WithUIs(uis) 37 if err = RunEngine2(m, eng); err != nil { 38 t.Fatal(err) 39 } 40 41 fp, _, key = genPGPKeyAndArmor(t, tc, u.Email) 42 eng, err = NewPGPKeyImportEngineFromBytes(tc.G, []byte(key), true) 43 if err != nil { 44 t.Fatal(err) 45 } 46 if err = RunEngine2(m, eng); err != nil { 47 t.Fatal(err) 48 } 49 50 arg := keybase1.PGPExportArg{ 51 Options: keybase1.PGPQuery{ 52 Secret: true, 53 Query: fp.String(), 54 }, 55 } 56 57 xe := NewPGPKeyExportEngine(tc.G, arg) 58 if err := RunEngine2(m, xe); err != nil { 59 t.Fatal(err) 60 } 61 62 if len(xe.Results()) != 1 { 63 t.Fatalf("Expected 1 key back out") 64 } 65 66 arg = keybase1.PGPExportArg{ 67 Options: keybase1.PGPQuery{ 68 Secret: true, 69 Query: fp.String()[0:10] + "aabb", 70 }, 71 } 72 73 xe = NewPGPKeyExportEngine(tc.G, arg) 74 if err := RunEngine2(m, xe); err != nil { 75 t.Fatal(err) 76 } 77 if len(xe.Results()) != 0 { 78 t.Fatalf("num keys exported: %d, expected 0", len(xe.Results())) 79 } 80 81 arg = keybase1.PGPExportArg{ 82 Options: keybase1.PGPQuery{ 83 Secret: false, 84 }, 85 } 86 xe = NewPGPKeyExportEngine(tc.G, arg) 87 if err := RunEngine2(m, xe); err != nil { 88 t.Fatal(err) 89 } 90 if len(xe.Results()) != 2 { 91 t.Fatalf("Expected two keys back out; got %d", len(xe.Results())) 92 } 93} 94 95// TestPGPImportPrivImport - import the same key twice, only importing the 96// private key the second time / on the second device (CORE-10562). 97func TestPGPImportPrivImport(t *testing.T) { 98 user, dev1, dev2, cleanup := SetupTwoDevices(t, "login") 99 defer cleanup() 100 101 secui := &libkb.TestSecretUI{Passphrase: user.Passphrase} 102 uis := libkb.UIs{LogUI: dev1.G.UI.GetLogUI(), SecretUI: secui} 103 104 // Import a private key into dev1 105 fp, _, key := genPGPKeyAndArmor(t, dev1, user.Email) 106 eng, err := NewPGPKeyImportEngineFromBytes(dev1.G, []byte(key), false) 107 if err != nil { 108 t.Fatal(err) 109 } 110 m := NewMetaContextForTest(dev1).WithUIs(uis) 111 if err = RunEngine2(m, eng); err != nil { 112 t.Fatal(err) 113 } 114 115 // Make sure that we've imported it successfully 116 xe := NewPGPKeyExportEngine(dev1.G, keybase1.PGPExportArg{ 117 Options: keybase1.PGPQuery{ 118 Secret: true, 119 Query: fp.String(), 120 }, 121 }) 122 if err := RunEngine2(m, xe); err != nil { 123 t.Fatal(err) 124 } 125 if len(xe.Results()) != 1 { 126 t.Fatalf("Expected 1 key back out") 127 } 128 129 // Make sure that we only have a public key on dev2 130 uis = libkb.UIs{LogUI: dev2.G.UI.GetLogUI(), SecretUI: secui} 131 m = NewMetaContextForTest(dev2).WithUIs(uis) 132 133 xe = NewPGPKeyExportEngine(dev2.G, keybase1.PGPExportArg{ 134 Options: keybase1.PGPQuery{ 135 Secret: true, 136 Query: fp.String(), 137 }, 138 }) 139 if err := RunEngine2(m, xe); err != nil { 140 t.Fatal(err) 141 } 142 if len(xe.Results()) != 0 { 143 t.Fatalf("Expected 0 keys back out") 144 } 145 xe = NewPGPKeyExportEngine(dev2.G, keybase1.PGPExportArg{ 146 Options: keybase1.PGPQuery{ 147 Secret: false, 148 Query: fp.String(), 149 }, 150 }) 151 if err := RunEngine2(m, xe); err != nil { 152 t.Fatal(err) 153 } 154 if len(xe.Results()) != 1 { 155 t.Fatalf("Expected 1 key back out") 156 } 157 158 // Run import on dev2 159 eng, err = NewPGPKeyImportEngineFromBytes(dev2.G, []byte(key), false) 160 if err != nil { 161 t.Fatal(err) 162 } 163 if err = RunEngine2(m, eng); err != nil { 164 t.Fatal(err) 165 } 166 167 // Secret key should be present 168 xe = NewPGPKeyExportEngine(dev1.G, keybase1.PGPExportArg{ 169 Options: keybase1.PGPQuery{ 170 Secret: true, 171 Query: fp.String(), 172 }, 173 }) 174 if err := RunEngine2(m, xe); err != nil { 175 t.Fatal(err) 176 } 177 if len(xe.Results()) != 1 { 178 t.Fatalf("Expected 1 key back out") 179 } 180 xe = NewPGPKeyExportEngine(dev1.G, keybase1.PGPExportArg{ 181 Options: keybase1.PGPQuery{ 182 Secret: false, 183 Query: fp.String(), 184 }, 185 }) 186 if err := RunEngine2(m, xe); err != nil { 187 t.Fatal(err) 188 } 189 if len(xe.Results()) != 1 { 190 t.Fatalf("Expected 1 key back out") 191 } 192} 193 194func TestPGPImportLocalPrivateThenServer(t *testing.T) { 195 tc := SetupEngineTest(t, "pgpsave") 196 defer tc.Cleanup() 197 198 user := CreateAndSignupFakeUser(tc, "login") 199 secui := &libkb.TestSecretUI{Passphrase: user.Passphrase} 200 uis := libkb.UIs{LogUI: tc.G.UI.GetLogUI(), SecretUI: secui} 201 202 _, _, key := genPGPKeyAndArmor(t, tc, user.Email) 203 204 // Import a private key locally first. 205 eng, err := NewPGPKeyImportEngineFromBytes(tc.G, []byte(key), false /* pushSecret*/) 206 require.NoError(t, err) 207 mctx := NewMetaContextForTest(tc).WithUIs(uis) 208 err = RunEngine2(mctx, eng) 209 require.NoError(t, err) 210 211 // Can we import locally twice? 212 eng, err = NewPGPKeyImportEngineFromBytes(tc.G, []byte(key), false /* pushSecret*/) 213 require.NoError(t, err) 214 mctx = NewMetaContextForTest(tc).WithUIs(uis) 215 err = RunEngine2(mctx, eng) 216 require.NoError(t, err) 217 218 kid := eng.GetKID() 219 220 ss, err := mctx.ActiveDevice().SyncSecretsForce(mctx) 221 require.NoError(t, err) 222 _, ok := ss.FindPrivateKey(kid.String()) 223 require.False(t, ok) 224 225 // Try to import with push secret afterwards - user also wants 226 // to have this key available online. 227 eng, err = NewPGPKeyImportEngineFromBytes(tc.G, []byte(key), true /* pushSecret*/) 228 require.NoError(t, err) 229 mctx = NewMetaContextForTest(tc).WithUIs(uis) 230 err = RunEngine2(mctx, eng) 231 require.NoError(t, err) 232 233 ss, err = mctx.ActiveDevice().SyncSecretsForce(mctx) 234 require.NoError(t, err) 235 privKey, ok := ss.FindPrivateKey(kid.String()) 236 require.True(t, ok) 237 require.NotEmpty(t, privKey.Bundle) 238} 239 240// Test for issue 325. 241func TestPGPImportPublicKey(t *testing.T) { 242 tc := SetupEngineTest(t, "pgpsave") 243 defer tc.Cleanup() 244 245 _, err := NewPGPKeyImportEngineFromBytes(tc.G, []byte(pubkeyIssue325), false) 246 if err == nil { 247 t.Fatal("import of public key didn't generate error") 248 } 249 if _, ok := err.(libkb.NoSecretKeyError); !ok { 250 t.Error(err) 251 t.Errorf("error returned for import of public key: %T, expected libkb.NoSecretKeyError", err) 252 } 253} 254 255func TestPGPImportNotLoggedIn(t *testing.T) { 256 tc := SetupEngineTest(t, "pgpnotloggedin") 257 defer tc.Cleanup() 258 259 u := CreateAndSignupFakeUser(tc, "login") 260 secui := &libkb.TestSecretUI{Passphrase: u.Passphrase} 261 uis := libkb.UIs{LogUI: tc.G.UI.GetLogUI(), SecretUI: secui} 262 263 _, _, key := genPGPKeyAndArmor(t, tc, u.Email) 264 eng, err := NewPGPKeyImportEngineFromBytes(tc.G, []byte(key), false) 265 if err != nil { 266 t.Fatal(err) 267 } 268 m := NewMetaContextForTest(tc).WithUIs(uis) 269 Logout(tc) 270 err = RunEngine2(m, eng) 271 require.Error(t, err) 272 require.Contains(t, err.Error(), "Login required") 273} 274 275func TestIssue454(t *testing.T) { 276 testImportKey(t, "pgp454", keyIssue454, "test") 277} 278 279func TestIssue2147(t *testing.T) { 280 testImportKey(t, "issue2147", keyIssue2147, keyIssue2147Passphrase) 281} 282 283func testImportKey(t *testing.T, which string, armor string, pp string) { 284 tc := SetupEngineTest(t, which) 285 defer tc.Cleanup() 286 287 CreateAndSignupFakeUser(tc, "login") 288 secui := &libkb.TestSecretUI{Passphrase: pp} 289 uis := libkb.UIs{LogUI: tc.G.UI.GetLogUI(), SecretUI: secui} 290 eng, err := NewPGPKeyImportEngineFromBytes(tc.G, []byte(armor), false) 291 eng.arg.OnlySave = true 292 if err != nil { 293 t.Fatal(err) 294 } 295 m := NewMetaContextForTest(tc).WithUIs(uis) 296 err = RunEngine2(m, eng) 297 if err != nil { 298 t.Fatal(err) 299 } 300} 301 302// Issue CORE-2063: check that generated secret key is exported 303// to user's GPG keyring. 304func TestPGPImportGPGExport(t *testing.T) { 305 tc := SetupEngineTest(t, "pgpexp") 306 defer tc.Cleanup() 307 308 u := CreateAndSignupFakeUser(tc, "pgp") 309 uis := libkb.UIs{LogUI: tc.G.UI.GetLogUI(), SecretUI: u.NewSecretUI()} 310 311 // before running, they should have no pgp keys in key family or in gpg 312 me, err := libkb.LoadMe(libkb.NewLoadUserArg(tc.G)) 313 if err != nil { 314 t.Fatal(err) 315 } 316 if len(me.GetActivePGPKeys(false)) != 0 { 317 t.Fatalf("active pgp keys: %d, expected 0", len(me.GetActivePGPKeys(false))) 318 } 319 gpgPrivate, err := numPrivateGPGKeys(tc.G) 320 if err != nil { 321 t.Fatal(err) 322 } 323 if gpgPrivate != 0 { 324 t.Fatalf("private gpg keys: %d, expected 0", gpgPrivate) 325 } 326 327 // this is similar to how cmd_pgp_gen works: 328 genArg := &libkb.PGPGenArg{ 329 PrimaryBits: 1024, 330 SubkeyBits: 1024, 331 } 332 if err := genArg.MakeAllIds(tc.G); err != nil { 333 t.Fatal(err) 334 } 335 arg := PGPKeyImportEngineArg{ 336 Gen: genArg, 337 PushSecret: true, 338 AllowMulti: true, 339 DoExport: true, 340 } 341 m := NewMetaContextForTest(tc).WithUIs(uis) 342 eng := NewPGPKeyImportEngine(tc.G, arg) 343 if err := RunEngine2(m, eng); err != nil { 344 t.Fatal(err) 345 } 346 347 // after running, they should have one pgp keys in key family and in gpg 348 me, err = libkb.LoadMe(libkb.NewLoadUserArg(tc.G)) 349 if err != nil { 350 t.Fatal(err) 351 } 352 if len(me.GetActivePGPKeys(false)) != 1 { 353 t.Errorf("active pgp keys: %d, expected 1", len(me.GetActivePGPKeys(false))) 354 } 355 gpgPrivate, err = numPrivateGPGKeys(tc.G) 356 if err != nil { 357 t.Fatal(err) 358 } 359 if gpgPrivate != 1 { 360 t.Errorf("private gpg keys: %d, expected 1", gpgPrivate) 361 } 362} 363 364// TestPGPImportPushSecretWithoutPassword - the engine should prevent nopw 365// users from importing secret keys 366func TestPGPImportPushSecretWithoutPassword(t *testing.T) { 367 tc := SetupEngineTest(t, "pgpnopw") 368 defer tc.Cleanup() 369 370 user, _ := NewFakeUser("login") 371 arg := MakeTestSignupEngineRunArg(user) 372 arg.StoreSecret = true 373 arg.GenerateRandomPassphrase = true 374 arg.Passphrase = "" 375 _, err := CreateAndSignupFakeUserSafeWithArg(tc.G, user, arg) 376 require.NoError(t, err) 377 378 secui := &libkb.TestSecretUI{} 379 uis := libkb.UIs{LogUI: tc.G.UI.GetLogUI(), SecretUI: secui} 380 _, _, key := genPGPKeyAndArmor(t, tc, user.Email) 381 eng, err := NewPGPKeyImportEngineFromBytes(tc.G, []byte(key), true) 382 require.Nil(t, err, "engine initialization should succeed") 383 m := NewMetaContextForTest(tc).WithUIs(uis) 384 err = RunEngine2(m, eng) 385 require.NotNil(t, err, "import should fail") 386 require.Contains(t, err.Error(), "You need to set your password first before uploading secret keys") 387} 388 389func numPrivateGPGKeys(g *libkb.GlobalContext) (int, error) { 390 gpg := g.GetGpgClient() 391 if err := gpg.Configure(libkb.NewMetaContext(context.Background(), g)); err != nil { 392 return 0, err 393 } 394 395 index, _, err := gpg.Index(libkb.NewMetaContext(context.Background(), g), true, "") 396 if err != nil { 397 return 0, err 398 } 399 400 return index.Len(), nil 401} 402 403func encodeArmoredPrivatePGP(entity *openpgp.Entity) (buf bytes.Buffer, err error) { 404 writer, err := armor.Encode(&buf, "PGP PRIVATE KEY BLOCK", nil) 405 if err != nil { 406 return buf, err 407 } 408 if err := entity.SerializePrivate(writer, nil); err != nil { 409 return buf, err 410 } 411 if err := writer.Close(); err != nil { 412 return buf, err 413 } 414 return buf, nil 415} 416 417func genPGPKeyAndArmor(t *testing.T, tc libkb.TestContext, email string) (libkb.PGPFingerprint, keybase1.KID, string) { 418 bundle, err := tc.MakePGPKey(email) 419 if err != nil { 420 t.Fatal(err) 421 } 422 buf, err := encodeArmoredPrivatePGP(bundle.Entity) 423 require.NoError(t, err) 424 fp := *bundle.GetFingerprintP() 425 kid := bundle.GetKID() 426 return fp, kid, buf.String() 427} 428 429const pubkeyIssue325 = `-----BEGIN PGP PUBLIC KEY BLOCK----- 430Comment: GPGTools - http://gpgtools.org 431 432mQENBFKK2rkBCADbZJNgrtb5AoBb6DFlCoP1PPXniOGwewDdnty7RJ/2Ue3NO+b2 433xcq9ZG2Ex9TsgED0QPUTpdpgZGYHdNQggUPV4LKLaaDoXQ28sjGChKDKe6k6edkT 434pL0wxhPrPSJRtlskHylHtbX/0pYVxdgr4o1UwPOmavt8EXYZazOPfphW+bUw9rpk 435P7VNnVRUDTANIJeaVuwI+iAyHv4PBDBx0Ffuqv4t/qufYGz1ajbn6itkfRSbrsm6 436ruGkr9cxnGoH8ViO6U8ymFQpaXlALE8P5AWM8GSjWleFZJYvW0xlX2aSG+w8mEz0 437+SxH6LJSs70z7DOCadzEfS0hXhNYRsLGkmOTABEBAAG0IVZNIFN0cmFrYSA8d2hv 438aXNzdHJha2FAZ21haWwuY29tPokBOAQTAQIAIgUCUorauQIbLwYLCQgHAwIGFQgC 439CQoLBBYCAwECHgECF4AACgkQnpQQj0+PXPkKpwf9H7e5x+ePbVWlcK7ItTmd8Y/y 440M3Pyt7/w+xyJnTd8q1boc7YSioyH9cv+e3xSohSebmf3q1+INY2UvmPCsvI8jKa4 441k1ELuWPoX8aMs9zimj03pDm8y4zg/uzCnzubB1ufH7wUA4R429zlkfVIVNFK6c7T 442SF6KWQ7hWWhhOGk6A5pCqhSewwQDD+J2AhXCGg31kf7zdWV+w6qGE2UR6/sdU2Yk 443sgKholqh9EqH+iyXLtHP81MO7gM5ZBtyjUSlEhM9ULPbzQVcqJGhOZxMNhWHlPf/ 444l37DX0KIAhthgHAkXCZepAMIFysEz715KRREPfO4R+RFbgQJlkzq3kcQN1tP2LkB 445DQRSitq5AQgA6KHIG5HDpuk5yDu7pXk90/zS8wmOhIkBV/esb7Jtnf1ifCv7//gU 446q7WwSwokC+/wWCei2M98ppLTZJvx21pbdvCK98WLJ2o87T/bY7WvdePovEuYZbJf 447twxNyCzYlD3RgpcFB2O3V6Jck0BJOLrgsdpMCPIm3cozHrcOUn8xFuNB0JTuO3wX 448yRYVwZNKQOjJvTT/be6wp8EhXEm+VrCkCQIm+JxxDXQPh1uFctqB1gBnnVg/E1bF 4492j5sTWXYIC6Z2VnfRddcVI6DAaR6HjZpOyU69/dUoqDyH5M2bHL7SjDiR8Yudbad 450ho3x3ekbkRSfm6w1NaqlUk3ZwlfS2mmtOQARAQABiQI+BBgBAgAJBQJSitq5Ahsu 451ASkJEJ6UEI9Pj1z5wF0gBBkBAgAGBQJSitq5AAoJECkBgjGGUFa+pXMIANOnZaWt 452WQ4FiG3cUs6pkGUTK1UuU11d7Oq9/xgL23rf8eFcbPx4MzCAr2B00ybVdgIlMogI 453P6G6Gb3K4WZsO3/qxTlkY/xjRT9xGvairfzpC/pm999sqqLdZOao3rG2rBG8kDXE 4548TrgiVQgbT7f4OHmMN6JndZtEDIP3hcDc1d+YDAOVIG0SfY9e8fGrm7dZGW8mRzE 455tb30T1anWnkwYmLbAKrZ3VgrBQ3mYB0twl9OEoGuGn5yjdfCDcg7kVpyxEAU4qNd 456YpwIdXqc9vod8XJNaJxFAkyuQkZxLvPPYbPPbwalaFEa1kWimtfNbnhEOsmunkMo 457oeOz5pFxSBjw4e5tBgf8DHhh3SFje/lGA6vq/B+h4NpSise8xb/5TevGW/xfIMO7 458UYxzShu2xXoTA2O+ZqYH/SnFrY0GmjWSabSeAJDzxroMwKhBhtwVm65gBh3svdZd 459bri+WozCFabzQXfjeHrj6mgInivvlkq5oBZgndnLSq7XWadigoJYhcLaVqi9dJ3O 4603JBnY8xHf4V9aSTyTEajqBIUN3JBddtnUpr8Y+XGy8uEAmnsQsc16bqleoodUcTp 461pr9YE8HhWfG0w9fddZe9ZYcwFs+Qe6bM+JSFJkB+o47AtEcv9dEhQ0g87oRH+DO5 462/RRJzo7QQNKzG8juDwrYhKQJ6WrSFaT/a6IEGhvvgg== 463=DDQ1 464-----END PGP PUBLIC KEY BLOCK-----` 465 466const keyIssue454 = `-----BEGIN PGP PRIVATE KEY BLOCK----- 467Comment: GPGTools - http://gpgtools.org 468 469lQc+BFVo5d8BEADByJSWkOrCQsjZcPurVIPIDSz6Fz3C7Pu+0/ZDbCDSAtZKINkN 470OEh+YeFXENa5wrKWjXB3A3r9+X73wGztocnHRSJ688Sf6J03jCDneh2CutUELFRV 471MXf3r63Fr3RoemF+D+AN+m5hgj7pVfw614ncBYITMQLLbOLjI2N90BLn6V2Txqg8 472cInL2IIAoT8neySO+/0D86+89tq4OiIIbcBZwvUJS6i8ArZuw2aJC36u9/oAnPNS 473H6K9AF7RJBMOLKExeBOiHSJBhnitlzqYYp24a85stpMX1XEi38pueVufs9lqzOgM 474k6e4cfyNRLLElay2BPZ6IVeK59buj98N9F606EI6bS7nHpeYkW14F27/SuBWQ4gb 475s4eEWdCX2/U401tK/3mma2t7Ybp37vn5x4ER+5g16DmXdhW+GSYCh69CnyJwXJGX 476ZJRLS3mryhGHhZslUEpsJ+T/CY/wOa31T0+g4/9kEbXbYkmBP5eB+If5lvmkYmDR 477I7JMG8OfPjHg9rhzecE217YahQlsMGIW0hTFAzKEpCqdDwCvHdej00DIGELnAxI9 478hdWHtlmx4S7p0yhzE14pGGWm5ByrS21dE6ErF0EDTJPFxUb/q0XnaPiwO3JiQCQM 479P9wqL0WEOW+rVZNW3rt6gPw1qnk7VYQa/ZCiAEq5uzLW4fDqUTytHDps2QARAQAB 480/gMDApFjPLgXJipU4+fmRQXMiYulCTbNqYzj1eE5XVAHbekTfj6ym0fXRqe2rc8z 481eZ3BzW48IFCvxYtxVX2jySabLQiZXhEPEPpyMtf4Oyg/lrmqM+XmlV0QZh5YEitw 482FXgYZnpBh1+QkxJ4k64s5Ux551XE/NKMYDPG+pgjXdYRElrr9gC4kahBG/O0bX0n 483JgTjwIPs9Zj2/tUfjL7jkL2MULsX4Vm01zIoscskQ8SZXYJdpVWTTOCIpCBW2SG8 4841cgiszx1V3vvuYVR1jKSnfqRAvzbbYD+opE04Y9IQ3wL6zxO/zcfGvVtCESEb9cG 485/iQcRvqmvMOHhx5Wot78TFEpwoVaZ412ru6nTWLO9mdHmtYJHHxkCTEOHXyBsRQy 486MJP/IsgmCRaML4BS4ALcdtaZI8YunTlIZaIMBcLSdsLV2yNPvMEFl8ZZ2ygUerpz 487MUe3XY1PlZyXUqrMM8AbzpzHGXhhReNxz28gMiFKoMOeafIdQaKMI5dcv7zyqBfH 488pMRlRDXXn04U8dSy5DT/j5cgmXYf0VHgoX2V02emf/4dmPqNZvztKd+BMDgYHbok 489eZYX+y3nPSwMzfr4Za1pnNKW9gKRI3NMMr+71bAJPNxNV7/JTs7tMYIfJ6IW4Q6h 490gGZ30DA+Xq8HLLH+mmJzQXo4bW0p0UHNOaoND2I/XJt217KVwVKJuUY5cM0JXFJr 491kPuoqX7XVAEzQWLFDjG2Cf5KpCFGkoz1HBgAnLoeFtZFEktK0TgjzsivkceNcs5N 492x/8kirhWCh6Okljqt/Zj0ZwhQjxCHHaabk9Uag3Kd1CokG5EQzkumNkk/horXHoy 4931hUhIGZu34ps/kkbMC522EgZM2k6fFrsB6qdqCM+RdQJ4vFCm//rhkafJs3poIq4 494rYh4n7f4TSgRmE8LH3YgYiWx9618Egj7o/t/XmJZ763Huf6/hvMPi7eftu18LMV1 495k8PBtibIiHRKIJZ5OvdUc2zOUJsKzbD/+Nprx2DxjYEFNSXu+al0pVs/hSIVkeq/ 496T/Dy/w8mD0XDcrh/tUhM5+pCa2aPC13VRb90C7JBdo9BFOYKXsFY4gR+EX5cjfiI 497EwXDVGAz7qdVRKF/VcbLcO1SXeR8yH+Gymef9uKcmvnWBPVycdE++0QqDwI6dIII 498/GhsJscpGfFKC/ulRZBxAmHNiqvSXXdhFNimHRa+9nGSfuiazAEnAnUFUT81bka4 499jFEndk+ZH0+hiFfatqFpKFYb6MNEepXnF8Ocom5Q8pAfhi+OtBS/RJCQkNcjrWmo 500EKWt0TM3FN+iGxRAqolWikByZzNSnCAOS0rqlyzIhb6Hj7GSecNKrmGD0CEXeVmO 501dEG1zxBS9Jyl1uzrwsUDuNVBHH7oeVTPomSdGBjI4IiXaJUVP7vD8DHyEWdIcynx 5020xrIpR1N+ObEyo4W+UMBurqcCbf13YWuZeKhMYMpdEqIifTkuFBIxoTuFdQ6o8tY 503mQR3LKPLPVdydPuUlFL5qurTBBiVvwPCA0ZhRFOXmfGpktRnWU+hDnGZfiLmLAbH 504d2XuBjdvk5Hh2WPDg2wmeIRgMka0ZplUXhxQWWoJONFcsTUH7Hx8L+CZ6q0FSUrM 505qU4dNT7hJQfEBYs0nJ5qLtarfq15bSkV0NH53L20WSubGPBUGIMvXHREsYKq3glh 506l0fN2+BMT3S9bAb4QOBs5CS1fyDuMpPXcL8xSKEGisrNTwXsrtyOMkpCtCc1SQ9Y 5073AFRbuhWXN767PfOgeMBjpfo29/aDceKqUql4ta7zSXPtCBUZXN0SXQgPGdhYnJp 508ZWxoK3Rlc3RAZ21haWwuY29tPokCPQQTAQoAJwUCVWjl3wIbAwUJB4YfgAULCQgH 509AwUVCgkICwUWAgMBAAIeAQIXgAAKCRCW2VLYw145zN2cD/wIJP+7NRAgiHDQEap3 510PSGR/09/QsScpubfNliQrAZDKMN0c6+oB3JQcS4hFczkHUv5kWGRlhTXpoE4H+cP 511pBokcRHxdYNlsYg8kx25vaKqTNCf7tt05nEen3FoL5dv6vnRRbVijpxTPGO0qQtW 512Rl/dSjtlIN3E8J9aiLRWVA8FPGlZscrQKBjVkRbxEKkbNwLX5EDh9BdKb4rGwUSR 513eipxmc4F0pV501sovRloiKQSuDvJM5gCmP6NXvY57Zt4owAJhhLQRE4IlvdkqCJ6 514WlLKzTVcUPhY3O/w0PKeS3tyoju/PBKypFKGyIAugq/nDmfyo/h94GqqAvmsbdG/ 515UnNAiQW/E9RNTdSPzF+anfQAQjI/xvoUzeJ0rwOl3kTOF/nnzgdIpZtwtS55e9Gk 516xjTAlYc307Cj6FRnX0LaY3cT387WRdxoPA4fPULYW9u8LyKVi3Xu+YF8RVFRjVPr 517fJXkGdtfZLEtOMh3iisYzEEghjTC3nKtdyK5qZlSTyz+NSY4g98qNRr04pi20sbp 518deAaxilQbumKds/Ui9USXe7WeysbNDoD9L9BfGxU2w3wwaDuhKAnmkw6/Bh5JlWz 519h5yw2g6WfBmDnRblPYbwu1GvMupcIrF233MOUM+LhYgXDqtg9HYZop45IXy7tLMV 520WFcZdQwjWjv75O4GqTJftFZU650HPgRVaOXfARAAnaEIozvW67pAzXz/C/rLFWpp 52110pTMAaTFThEuEGlVySZTOcSgdQVEDsDzXhI7iPm5tiqCh0kNO9Ga4S8XlZz0Xiq 522CUol3BWywReHnhQhDS9KF+EF4lQGPqfesjG2vw6bA8FWr0h1SCQJYCbWvZb3pUmc 5230V/W879LcyjbKTrzJnglSYvqFkEjw5Cp4psyLCw1L8nYsDPD8qjcDEbgrcKd7vTp 524le1P7FMjZo1sQzDXlL52BIH3zF84p+h/UEwlil4MPpegIqY3tv9LJSiUSWG2Pjxo 525KWbdrChdgt/AfPAFd2NeKNg6GON/4ruGUg7WZN4m7BiPaygYYgBfvhQrfGKfD/j1 526b7LG1U/7f1GMo8goxh1xZqjIAHsKUK0sS9G8L/pGU7k5Ho+6rGpOeyBdbf0RcJi9 527kvQSxcx2Zr619D/v6rL06KH/msfESnaHWGEWx+urtuETL5k7ZvGEtwWSo5b2Zou/ 528mYUrISU3wzkpnngFjguyMUDddKHVGiZtnwEU3JBYaxvE+ZFS+MYIq+ESuyJDsea1 5297+pdQhUW7sR8UWzp9SdNloe19MkeV9GV0OnURL5YAN/EX6IX8yCM39TiYLsTSCZM 530A+1Jpznnle/t7JztbU0c8GvwT647oTrbnv7YhiAc4+JQPWkjxSz6i2QhIGwYBbTw 531Bd2MrbOXKSqLAGjgOfUAEQEAAf4DAwKRYzy4FyYqVOOF3v62+We755Jsnyl4U1Xe 532dmv88aJEqwFoslrVxfaNIwxqa1brdT5GDsEHtxNXnCDoubqxqEHWnbJQv3LAI7Io 533pLVTam1AdaOW0gcg0Wk0TNWpTCXBynPImL7/Z72darqIQ1TaQr0nHv2padv1Ne4C 534gicP1ob78YXxbJxxm4tO9qjG3kzn5QOJBo2N5rpaUdnGLM6LimLCWi9ce3Ai/Z91 535YWcBeTA4UtZXOfoy6ZqehTdT2GxK1mAYV7kkZioVhYSQf2VhZDLheev43W/qo+zP 536LpWyJaDFniEb46uXDNzGwEGgxgjd2mIHE+yskHwQ5WFfuGnmeKHjhFrINS8kn3eJ 537obAId0XihTk8Itt5tLxkiZyrFdJ0Mo8Du3Id7y1tta5aR6UqMJBQn5QA5PN1d403 5380Xwq7/VLa2t25RTXjX1h4sl/CEFmGI+qs7MwmCISjuv0QepnE9edNgygvmMIuW9h 539Ons1XV7H2XRHqpZC6ANNhS0Ng25Juj3YCM/1o68bLYt5uUOmTGqHjw/rYyylaSdp 540gOEfS40pBWDSX0AhH4dDOVyyDfiOhL3+aDU3PmeOE1y4XuY8vVzBzQb8A0gEUQrx 541B43mgF09V98FhaZWjIp+pkeunzT0oDMFQC871Vcf1FRyTOttor8nl/ZCqTEe1+5s 542OhhRoIezZTm6VmbgjxH6rxV2APjoyUXU4aqNIiAecTaDeo+grbpRXsISrr050U6N 543c/13lJhtBZdPeqohTQHhKzpiQkiOHv/a5vvzRNZ3WHtemmm1icqQyVfk4BxZ4hrq 544cTvAyR2MWSlm91k687/vYYJ8nNQ9+fKNnfUDe40Tg7PrqJo9KCLj8XlqaYMMUGW0 545aGfoQwJvQKk9sR4VEAKOnsU4fhU7RsF4tFPXUMrLMqPymIMhS67O+xh0LbSmI0kG 5467hupwGRMEMzhLCLiMTfZlPo7qakaOkV626pPBPkINFFHLFuWnKGroPqzxs85wtvB 547WiNRbld4navQl6HzUFrBqrTzjEUFKWORIEjW+0lD/g/uNTZamWwJAVwKcCQbokby 5487pgubStEd7jOhRsOe+tH1t3T1PUqBt61bVVdy2F5V85UUBRDyV/8b1mS3iyxFdtO 549PQjmHpVxfuz1BVpQQxjRpmyKciDZf6XgaOWr4OUvPnmCJ223Fv7q597FAT8bfMQl 550u7zPKimfhzcuqiAZyP1PjnPjTzui2JtUjPVrE6rh9NWZsQf64GXqh0xywKVNKiCW 551THrnmnkknuz8Oz9b+wbIzocL52MUdaoKbjca7E7lUefbQE6MDmWjNOmMmLNppKSN 552ckR5RbXCYCaorLjihkNEZ8ZzZDEbNHMqgiN1TFXdwSZgOo+UqpWIb4XU26U/PpDg 553VP8P22fbki9kEP+/3FY7eZ5hcUc1m87HP82prSaHQfnCVxqh429bzV5iWgPbaRlS 554IbbOFiMz0whikxuyOwHz2tlI3FW1Mro1g0VOjMBqcFX1kWwfLIIC9VUMdx/2NSk/ 555g1W/dKKrO9fY5F2ANb09ttihp/TQdyVoElPIUvCy+m70DWrFF9b2oqYtwx93vso8 5565PLhquP7CW5d3O2JHN02H2ayImwX0O+ENaQjKRhmMteaGd6MLU5ttubwd6o1FgYO 557DxJ7raE/2b+LNM8EfPquw7K4i/IFS3PyYxPpmiX1qETbak3VMYmrSDrzCfwzQgjI 5582Z0IWoJVlir1wr+BY0naA1dlZO4+k3tjsn1Xbya/4dOa1PiAkrQ4u5PHmlQXUFnn 559ZbtRP4kCJQQYAQoADwUCVWjl3wIbDAUJB4YfgAAKCRCW2VLYw145zAS5EACOp5ux 560bvlLIrfXqm/dgQdTNWa1erY3aNmzBbfZ3+e/vatGHs2P9oaYQhhElhX6mI2uG3fe 561OLU1oD6UP8OHMo1s/gMNFqYooWCI0EQUT1zRjgV7PnQE550hOY2T1Gnh51UBqvTs 562OZXQki4cJnq7ppglIw3nG06hSemxEv1SfrS/776bbXJ7gmBT5SBkY5PsztSMPdQq 563iVnQ103//jay3vrXZRxJqiYjfwxrGQyqYbhTkIWe2QmrK4uAOgIOBc7fmMa+rDiI 564y5WKphaC9ELBH2JyFcPsIZZJOBAF/iTG89lyv6MuxBwOcW/gYP562vNRLhDVP+s7 565CXC+1cPY7w33V3fQdHdV2461v1BjVH6VWtKEt8SaOHvkc/3AyZ1gc3Uc8hcUgwN6 566iefcAFhj2iOzMmVQ1bVot3ue43rK7kZeXpuHGjz2+PxfbrOIOCGBwRRQPz0h72/k 567fHXtkcxrhL0StmYAAooSpq2yNVRPRJ2tsXKK06ovtdgJRL9MFrND88bjLMsbxXA7 568ejqLyhhGTnPydDtFrzsGkw3Qz5r1K2p88A2mGkix3/H0CnkcSSTxI/ID2OQndQOZ 5690+fFJjM8GzlFJYkW61yqV4kFBNmRPFd1/mM6ofRbJ/ec6LUQkV6of9mRtSHtNTzZ 570LpRtxqDTDVA6H/R+dqEhg/ni2jAapEr4VzIbew== 571=bXrj 572-----END PGP PRIVATE KEY BLOCK-----` 573 574const keyIssue2147 = `-----BEGIN PGP PRIVATE KEY BLOCK----- 575Version: GnuPG v1 576 577lQO9BFaQGgkBCADSJa2YgO+2eW6MqXhmiTRD+p71x0Fp3ZbqRljVaW3htQN3H+ZR 578tta/6HnJ4mO+ZA+qdqI+RbXpJ7cZ8f85ymRWfFzHmCUmrRkCN5jNvSJ1oIIZS+Mv 579zBn5EI3x5LinyailBBWl9Qi0pP5MQ1DO4P6YZKSxb6JlVZesO8GsX7b+3O6ltqWa 580HmDQ3UueSWxDFMIztFgRyESGYex4rQr8MgB7TMUdogLhzS2CCkveJAOxG4Nbbs+3 581kz+nYQboz12ttKA8FZikPVkBIrHngtu98KQJzgAx921xILPdHQyvQwwo2q5lXc91 582ZXGFxcmU/FC11vO/Yqbh27ZszQSH1JSw6OkhABEBAAH+AwMCj0VK7RBqY3pgP+jL 583KgNuQROvXIdmQ/U9DTLcAaxJPWW+s6PhA79QRDLZ8phliAbPLU9LkcfhNbl+r0ct 584kh4ZOTBVn46jW5nzAuHwXWUIisTN/gD3SviA7Wb9roQhM1YZP65G+8J5lvWjL2sq 585vcCYwOFJAksmOpUcqTH72MTCutWjW9RYxVYpnb+6qRg1OX2KfVrsyqcLSD59znmf 586pSLrAwr7gLW6eVUl4GBdjW6KY44A6qQUDxS3/+Dx3cYaxuZ4dPn7DLjMFUQOx47n 587+EialH4sjuCYo3mrkg15fDgf+s1sHebDL7JpO/rrXLheWQgtcGbPihkcTkKpjwgt 588uACZ3+7xar42l/UwBJkir1zfWuSs65SiUWiSau+fR6EPlmeFe/BWlh+FYk5rFqBn 589AtkfzALSUAqnz1QlsPrMyFT/WQEm9XISsH5oh9B3w94fnQiH4AkjrlbDdbxtPFt2 590d99LggNWE98+Wlkw7R9D/48j8BJQbmIGCQjijaubFThJyjBmSZGvGbH47qmcfFVb 591WgA4dRp8wWx4N5vYLr/B3jL+cFka1zJiPAjfP9vJfW7v7MCN8VR19rNw88kK0loL 592M9IA6gZkXV++s5SB66LSWmphFE68WaMP6wQcSV4TxCbXHcE0DNoXc6ft5ZH0RO5D 593k0RnWrQhsNCehRkFf3AzNjXyc0gT2H9p0wm2u5Z3++Qm7gL+jDsk7CcRmqXWmLkN 594LDfjtRAw61BfFEVfDJF86jPs+rW71e8BxTgzsiz1wPOGeoHXCriNRqmwZh5GI7C5 595M9ZHwXg/6eA9/0rOP5p4uxd3grO91b3sqJfznQmdXyQWL5WljtlkmhW4+TM1Jz6e 596l/5bbq2vmeTmtBspwDzu70c4/p9fGauXt1z8I0cdsB6YZxvkA7U9TTkYBbhe7F4/ 597tDJTaWduaW5nIFN1YmtleSAoUFcgaXMgJ2FiY2QnKSA8c2lnbmluZ0BzdWJrZXku 598Y29tPokBOAQTAQIAIgUCVpAaCQIbAwYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AA 599CgkQvWyOzMD6SQk9vgf/WdWHXJJ/PIp9e+E+80DlVWvuJEsMz05HOfSJMxBq2OPb 6004XMHO6ySvs7TtlQPYpBXvicOkiWh0xkfYA1iHwT47a/8sO1Xsrw3/Tejjt4hQpcZ 601H7D5vBImcrRGsu6Ul4RPV27FwrDv1+D/qa0ZakYEZWkcparqos9jYJQxeOn0zfB1 602hUgKSe/bPb+k+dO0ufJ2umLLzk/8xXxvSbLaV2DLm8JRP+IOzpF/14mGbVzl0dSD 603Bv9AkvtD7ctQ8gEjAGC/X3p4k0HsuKtGD7tUVf80pmELuWAU6DXTp0sSm5VuOgpu 6049bc793DVofrcf6dpqVK7rI/Sb9JVPmKIO1Is2fdfJp0DvgRWkBoJAQgAqGqUdLPj 6050GUvKvj0RxWyDj8TCe9W18NMhJDmhRmgsMY7UsHZSwOvFWn2ih8oJ7vMYpaviFQM 606vMO84Bwr6ELA89lusZtz7d77vH9L/OF1skYp47oNdOpkSr8cDG2gdYIkW9jurn8a 60703Dmfa/F4eF/s3OQUWIMJfhOAHvVENhlmFpN3H9Wi/X5SYznyvD8PW+VT45sRKdC 608f+Qume3aza53mBZeqkP1AqC/pYHv4sntbLdHRS3VS1nT966nklj7XzqS7SC9x7C6 609wbnH+l001/C4A0YjGfKriZA03N06vlBtksfkkPA3QVt/n1HixA1F07haKKXjJ9J0 610qKwCvGe55fBZXwARAQAB/gMDAo9FSu0QamN6YMO9Wa0MgK1Lk2Xjotk/+JNJHNDV 611sg5nW6iecj2riexU6nMq/jlTWmZFnsZW1csQS3B1erkPKx5D0ANOTdEn2NOMCvEu 612JG6yKU+dIKre68oxbqvUzNmZbF8lJCM7KgaTlBrR5IM1aifdlu3cARGQ+BfPUsB1 613rTA7fkPij6GVPuzobcXJDTOpM0S4MbJtr5Ca/YbnuBT+P/caHWTEYQsOmKrUEhNL 614DzgehEXrzrg1A3m89psXvCcbxXPTF5w8lOG+Rwyu/UbEli2ET2trOSl5ihARrxSP 615FJ27tB7RJ56f3dEI20bq50GrVqbmH8/i/vktIKfP5N0aFW2aMrIehtnj4acxwErG 6164Zd20xQLDQSIRa9j7yIJM5tjuKtA73qU0f90/pXnLMexhv/Ad4PQrVKJCemcQjMB 617GR8qaEA8TOYyJ8lMmW29M1mzrEQP8oAFVY4DUlj2cOOpNn8AYFlu7S+ia8RsKGVk 618FJKNutWI3128z2riZRRHbQstuZ6OfTPUA47ziGWXDzwmH5Cg8yPSpK+OLMIItn7m 619B3ek9WYc+1fz8mr4xDwlWciBXWYSkBE5YjF78lGG9P/J//fNO+HyYPXGbi5GvV9P 620Mz1G6zMUBv+7jp5z7Q2i/NDLryYQjv25VqflX0eZr6MX42Lu2pN6NLcIz30IK7nd 6219O6LdCyHdvw2YZv1pHPYkK301jYAKJ+7YTsSYF+WGLQP3TwRp4272vCnRO8yxBL6 622YHd9ptVQoeA3zRw/ZooYJDfIRWPNYGLjUlmqXQ8ZFZOpT1pnZ5NEzkw2wUakJAVE 623Wddr8I4QP1HmYa0R3YtCNZn7m3ipVaOQ2X7PjRnmxNHR2waLHb7nebukgS0uGIhy 624kh88gB5T5C1VhhwjSgTziYO1vkeA0qDGwoE/Kj5dq9+JAR8EGAECAAkFAlaQGgkC 625GwwACgkQvWyOzMD6SQn/egf/V7m2jniuaOh25pbdgYBaq6lNdg3qESbz8JNf5cUe 626daMN9Kk1NdUk+MQIo22UxiYrHzbI7J44STHLni0WVLXXJAxkbZqSKba4f5bdI/XS 62778eNgpOLU3gtczkaw5QALkBGMD1+GB+aGtqs6jVjYWXQkwch3Tq2nxClRreBikkk 628/ph4c0wrhJ+DqQK9TMhmEyf/kKtUhijmx/I4Z53ivgvRloMzi9G1c3PF3IT4Qcq7 629PZ9aDO3zh7pL5TFNVyfFGLejDZuCF/hCmMfo2IR9IYfhz3eSuu6rl/dPsxRKk/Si 630axKpr1IfOnGW0Wccdi2iO87bRDYNpb23U02Wte00oXLOFJ0DvgRWkBofAQgAr8Rw 631PuUM7uXv/2o0eLqrvcfFUuqyOfYNcQOki+x+Kq0PUOprMYqgMGWoy5VQfAo/vT0l 632xPsyriPlDerPRtNVxyk7RfSQ1qJTPrXIh+SZPB2HUWNlEAR9xBOeqcBE7Lg+c88p 633eYezpel9l8M1o2OLLQDEBd1X17JeEpxQ79ja+lLR0vocANE0XOkDrX8aegRYj1nv 634XZdaTFNy1EMO9pysitdfcUzcB/RHDiF1h/q68Q/6QbYReOTWTehiTntdqdrxHboF 63502B6TwmS2FbzDhFYjDQbHjGnw+jC0NIEL7ZaZMwxYk+YZ3Vxl9Spw1SW8b7jAXmD 636990sV3508cKsJvOkPQARAQAB/gMDAhJ/H5nhnlQqYDu0k1ysacEyah5pnqnUHD+C 637WAD/JSiBaUt77HLV1fK2otMHFiWNmPEyFdoNtAks7f9ZaFYLr3QZLH1qZrgeEB+P 638D7q7/2FOuPqM6m5odZw/zXSsCyZ4hNseDl3+m8586NVvO2fGB2zv8BxNn6wDF08i 639elddkODoBjv7ORCcNMDQ4sqFZo5vjl7jOfjTyoR/uHAclTRz89Z7UVdAgmh8c6ZO 640TwUn5L/gNIi6Ij9L3WdWcXep5OGSI1ssLn98AHLhgw/oLD0Mko8LcvrtMr10Q5E5 641yZAq+lcM6s+2si5Rf7OG5hbCWzwa4NSRa6kxX0oOE7UHmQbwS8nh3gZjoVAA0IBU 642Jdi2KI8vb/GyOF5v85kLbSV0CdLQlhQ//ngOw2PZafSOdsqGMeCYbLx5nXRqc5vk 643l4WzvlbS2p8CFChU3w42WrSFtZFTT9yUFMt3q5ZHIle3cYGMajNJWKd63sFwDig3 644xkLs+XOvk7jFp5yHok2A74FD3UPpXDUP9rCl6ArAnPPuBdA8CtgXYFZKfiuMG7mA 645UbUwcxcVN81QYa/G0YLjwaP0WKMqVjvseHl2bG8RAuTQ9MTCYrVUOwPMGc3y53xB 646Js/ov+Gs1iNZxfon40MNBWehesMOhBC22UJqEfIYlcDOcsKAmQQrniOXMCtiQVcz 647yC/6Rd0RjdPnpiCh43P6bXaLXLPpa8ZApKHpJeFr0BWjWTYR55W8OkUFf/zNZPCB 648s6Q8B9GgGN2xeOsS6dd1Ln73QW/aGau2Lroz1lUhcIRr0S+sEw3yZa5neq0WucVq 649JDvNVEeIBtLD0gsfd2HztOa5ssWhkUMMu4Rv4ka7tvmHPcMdtMQ06s3bmFwgXAgu 650T08ba2YSjEkrOfy66EGHBgD3X7jkk5bdrImYcRhVng0sMriJAj4EGAECAAkFAlaQ 651Gh8CGwIBKQkQvWyOzMD6SQnAXSAEGQECAAYFAlaQGh8ACgkQQmelf+PWuOGDVggA 652pDln7bRjUf38APDozEYp1AisaDlD/5Bt1x0aiv4ufTdDnfCM3MJLdgHVHPbKxsY/ 653e8xVpIlVNhLI2B26w9escRN0e2KyxS0/keQn8wLQ/BvBt8dv97jZimbM3um9Sg8z 654ka/Wi8dLqSQuB1aE3NycMeIawyxIp9ELZgPKwxXB5c/4Ko7iOqKXwcoZ1Gfk0kWd 655gLz42L0VB6Nq+6UJY6gnW3L/BO+o93YREnB/z1jepyiQyCm2M+gR5vyGehrrnMTg 656+C0yQ+fOprf1rNQWX+xCCLWrCU7g8wUIXu0jcPvnfPj4Fqybn+gjoxtWIfBsAzcb 657bV1GT8mQN9SRLCoR+SPSy0SKB/4gmoNxJfonm7toKN5ipj9i+Y+KXhoGfJjekTbF 658w51NCjXaPTcO/ptyr8H6Fi5q57H0MCgmzII3QJ2M1LwYxAYwxIfhc1MDRo4kHY6j 659H6Zge9DgKrkwSgY1NRkby3NbHRCJqwnNwzkQCAUDmsI0F1TKfLSYTPLpHyDIAf5z 660o9+wYt81lNVECPEPPNmG7m6si6MehB5I7jA45VMNza2ihMmwvwwEUUiQxznqq9vV 661QhXuxxCGUQPvxWiySDS8uiCTsmJtoDHoOfXRb4H1O2dG3ZuqJwGKGSL92aIlhMTM 6627cKYNswhbVA0TtzXUaqQ36c09G6XMtnhXPdua9k2blQBhJA7 663=aaae 664-----END PGP PRIVATE KEY BLOCK----- 665` 666const keyIssue2147Passphrase = "abcd" 667